0% found this document useful (0 votes)
896 views

MCQ in Computer Science

This document contains a practice test on digital logic concepts with 7 multiple choice questions. The questions cover topics like logic gates (OR, AND, NAND gates), binary addition, flip-flops, and circuits that can be used as parallel to serial converters. The answers to the questions are provided at the end.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
896 views

MCQ in Computer Science

This document contains a practice test on digital logic concepts with 7 multiple choice questions. The questions cover topics like logic gates (OR, AND, NAND gates), binary addition, flip-flops, and circuits that can be used as parallel to serial converters. The answers to the questions are provided at the end.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 686

MOST POPULAR AROUND THE WORLD

SUCCESS

PRACTICE BOOK» NOT FOR SALE


SERIES

COMPUTER SCIENCE
BOOST YOUR KNOWLEDGE

DESIGNED FOR SURE SUCCESS


MCQ EDITION
NARAYAN CHANGDER

6 + S
1 O N
S
73 STI ER
E W
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2

Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.

JAI SHREE RAM

NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:

PRACTICE BOOK» NOT FOR SALE


my guiding light, my shining star,
forever

It is my deepest gratitude and warmest


affection that I dedicate this Ebook.

To my mother JOYTSNA CHANGDER


who could not see this Ebook.

who has been a constant source of Knowledge and in-


spiration. Mom, Covid did not take you, it took our
many dreams. wherever you are we will meet again.
Disclaimer

The aim of this publication is to sup-


ply information taken from sources be-
lieved to be valid, reliable and authen-
ticate. The author bear no responsibil-
ity for any damage arising from inad-
verent omissions, negligence or inac-
curacies (typographical or factual) that

NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.

nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:

PRACTICE BOOK» NOT FOR SALE


1. If you require practice sets on various sub-
jects, kindly send us a message on Facebook
with the subject name. Our team will be happy
to create them for you. Message us on Face-
book at https://www.facebook.com/
narayanchangder
2. Additionally, you can access all of my books
with answers on Google Play Books at »>
https://play.google.com/store/books/
author?id=Narayan+Changder
3. Answers are given at the end of every page
to help you identify your strengths and weak-
nesses.
4. It shows you how to build your own techni-
cal and pedagogical skills to enable them to
create their own materials and activities for
students.
5. It helps you to see how you can make the
transition from classroom teaching to blended
and online teaching.
6. It’s the cheapest good quality ebook that you
can buy online on google play books.

NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents

1 Computer Science . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 Digital logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Computer Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.3 Computer architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.4 Data Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
1.5 Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
1.6 Operating system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
1.7 Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
1.8 Database management system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
1.9 SQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
1.10 theory of computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
1.11 compiler design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
1.12 system software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
1.13 Software Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
1.14 Computer networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
1.15 Computer graphics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
1.16 machine learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
1.17 Cloud computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
1.18 web technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
1. Computer Science

NARAYAN CHANGDER
1.1 Digital logic
1. An OR gate has C. Digital counter
A. Two inputs and one input D. Decoder
B. One input and one output 5. On a JK Flip Flop, if both J and K are
C. One input and two outputs left high, what happens to the FF on each
D. Two inputs and two outputs PGT?
A. Changes state
2. How many total gates would be required
to draw this circuit? Use ONLY 2 input B. Invalid
AND and OR gates.F = AB’C + B’C + A’ C. No change
A. 3 D. none of above
B. 5
6. In Binary 1 + 1 =?
C. 7
A. 1
D. 8
B. 10
3. A NAND gate is the combination of which C. 11
two gates?
D. 2
A. OR and AND
B. AND and NOT 7. What is a Flip-Flop?

C. NOT and OR A. a 2 state device which offers basic


memory for sequential logic operations,
D. OR and NAND heavily used in banks called “registers”
4. which of the following circuits can be used B. a logic device used to invert a value
as parallel to serial converter? C. a storage device that works with non
A. Multiplexer binary numbers
B. Demultiplexer D. none of above

1. A 2. C 3. B 4. A 5. A 6. B 7. A
1.1 Digital logic 3

8. The time interval immediately following 13. Find out the write option associated with
the active transition of the CKL signal dur- XOR Gate
ing which the synchronous control input

PRACTICE BOOK» NOT FOR SALE


A. minterm(0, 2)
must be maintained at the proper level is
called? B. minterm(0, 3)

A. Setup time C. maxterm(0, 3)


D. maxterm(0, 2)
B. Hold time
C. Clock time 14. The two input MUX would have
D. none of above A. 1 select line
B. 2 select lines
9. A full adder is used for all other digits
in addition, how many logic gates will it C. 3 select lines
use? D. 4 select lines
A. 3 15. How many different states does a 3-bit
B. 4 asynchronous counter have?
C. 5 A. 2

D. 2 B. 4
C. 8
10. What is a negative to asynchronous sys-
D. 10
tems?
A. Difficult to design 16. The Output of two input AND gate is high

B. More complex operation A. Only if both inputs are high

C. Expensive to fabricate B. Only if both inputs are low


C. Only if one input is high and the other
D. none of above
is low
11. What are the colors of a 10k ohm resistor D. If at least one of the inputs is low
with 10% tolerance?
17. What can be used to prevent switch
A. Brown, Black Black, Silver bounce effecting the output?
B. Brown, Brown, Red, Silver A. NAND Latch
C. Brown, Black, Orange, Gold B. NOR Latch
D. Brown, Black, Orange, Silver C. Mechanical switch

12. What is a single ended device that pro- D. none of above


duces the state opposite to the input 18. The output of a gate is only 1 when
called? both inputs are 1.
A. Buffer A. OR
B. Inverting buffer B. NOT
C. Op-Amp C. NAND
D. none of above D. AND

8. B 9. C 10. A 11. D 12. B 13. C 14. A 15. C 16. A 17. A 18. D 19. C
1.1 Digital logic 4

19. How many logic gates are used in a half C. 6 input MUX
adder?
D. 4 input MUX
A. none
B. 1 25. When a flip flop is designed to be clocked
by a logic HIGH1 or Logic LOW 0 level, it
C. 2 is said to be?
D. 3 A. Level Triggered

NARAYAN CHANGDER
20. A “universal” basic memory device used B. Edge Triggered
in banks called registers
C. Clock Signals
A. J-K Flip-Flop
D. none of above
B. D-Type Flip-Flop
C. S-R Flip-Flop 26. Convert 43 to binary

D. none of above A. 100011


B. 101011
21. A J-K flip-flop is in a “no change” condi-
tion when C. 110101
A. J = 1, K = 1 D. 01011
B. J = 1, K = 0
27. Digital Signals have how many defined lev-
C. J = 0, K = 1 els? a. 0 b. 1 c. 2 d. infinite
D. J = 0, K = 0 A.
22. OR gate with schematic “bubbles” on its B.
inputs performs the same functions as C.
gate.
D.
A. NOT
B. EX-OR 28. What does the “+” sign represent in the
C. NAND OR formula?

D. NOR A. Addition
B. OR operation
23. An AND gate has 7 inputs.How many input
words are in its truth table? C. Subtraction
A. 16 D. none of above
B. 32
29. How many clock pulses will be required to
C. 64 completely load serially a 5-bit shift regis-
D. 128 ter?
A. 1
24. If 4 input MUXes drive a 4 input multi-
plexer, it results a B. 5
A. 16 input MUX C. 7
B. 8 input MUX D. 6

20. A 21. D 22. C 23. D 24. A 25. A 26. B 27. C 28. B 29. B 30. C
1.1 Digital logic 5

30. The output of an exclusive-NOR gate is 1, 35. Demultiplexer is also called


Which input combination is correct? A. Data selector

PRACTICE BOOK» NOT FOR SALE


A. A = 1 B = 0 B. Data distributor
B. A = 0 B = 1 C. Data encoder
C. A = 0 B = 0 D. Data decoder
D. none of the above 36. Which logic family provide minimum power
dissipation
31. On a master-slave flip-flop, when is the
master enabled? A. TTL
B. CMOS
A. when the gate is LOW
C. ECL
B. when the gate is HIGH
D. JFET
C. both of the above
D. neither of the above 37. When subtracting B from A computers add
the inverse of B to A. This process is
32. A NAND gate is called a universal logic el- called?
ement because A. Binary two
A. All digital computers use NAND gates B. two’s enough
B. All the minimisation techniques are ap- C. two’s compliment
plicable for optimum NAND gate realisa- D. two’s too many
tion
38. OR gate requires how many “1” inputs to
C. Everybody use this gate output a “1”?
D. Any logic function can be realized by A. 1
NAND gates alone
B. 2
33. What is it called when an input reverses C. 0
the outputs, then remains in an existing D. none of above
condition (stay limbo) producing an unde-
sirable condition after? 39. Logic gates are digital
A. Invalid A. .. Switches
B. No change B. .. Footprints
C. Reset C. .. Binary

D. none of above D. .. RAM

40. The number of min terms for an expression


34. A OR A = A is called:
comprising of 3 variables?
A. Associative Law A. 8
B. Identity Law B. 3
C. Idempotant Law C. 0
D. Absorption Law D. 1

31. B 32. D 33. A 34. C 35. B 36. B 37. C 38. B 39. A 40. A 41. A
1.1 Digital logic 6

41. If you design the following circuit using 4:1 C. XOR function
multiplexer, then what will be the first in-
D. NAND function
put to the MUX. (Take A, B as selection
line)F(A, B, C)=minterm(1, 3, 4, 7) 47. to 1 MUX would have
A. C
A. 2 inputs
B. C’
B. 3 inputs
C. 1
C. 4 inputs

NARAYAN CHANGDER
D. A
D. 1 inputs
42. AND-OR realisation is equivalent to
A. SOP 48. A gate gives the output as 1 only if all
the inputs signals are 1.
B. POS
A. AND
C. K-map
B. OR
D. None of these
C. EXOR
43. is an electronic circuit which makes log-
ical decisions based on the combination of D. NOR
digital signals present on its inputs.
49. What is a single ended device which has a
A. Digital Logic Gate gain of 1, mirroring the input at the output
B. Boolean Algebra called?
C. Digital Circuit A. Buffer
D. None of these B. Inverter
44. Which among the below stated boolean ex- C. Flip Flops
pressions do not obey De-Morgan’s theo- D. none of above
rem?
A. X+Y = X . Y 50. How many AND gates are required to im-
B. X.Y = X + Y plement the Boolean expression?

C. X.Y = X.Y A. 1
D. None of the above B. 2
C. 3
45. Which of the following combinations can-
not be combined into K-map groups? D. 4
A. Corners in the same row
51. Which of the following memories uses one
B. Corners in the same column transistor and one capacitor as basic mem-
C. Diagonal corners ory unit?
D. Overlapping combinations A. SRAM

46. NOR function is dual of B. DRAM


A. AND function C. Both
B. OR function D. None

42. A 43. A 44. C 45. C 46. D 47. C 48. A 49. A 50. C 51. B 52. A
1.1 Digital logic 7

52. Which of the following gate types below C. J = 1, K = 1


is NOT considered a universal gate? a. D. J = 1, K = 0
XORb. NANDc. NORd. None of the above

PRACTICE BOOK» NOT FOR SALE


A. 58. input values will cause an AND logic
gate to produce a HIGH output.
B.
A. At least one input is HIGH
C.
B. At least one input is LOW
D.
C. All inputs are HIGH
53. What is a quantity that may, at different D. All inputs are LOW
times, be equal to either 0 or 1?
A. Boolean Constants and Variables 59. The Boolean expression for a 3-input AND
gate is
B. Timing diagrams
A. A )X = AB
C. Decimal numbering
B. B) X = ABC
D. none of above
C. C) X = A + B + C
54. If 3-input OR gate has 8 input possibilities D. D) X = AB + C
how many possibilities will result in HIGH
output? 60. OR-AND realisation is equivalent to
A. 1 A. SOP
B. 7 B. POS
C. 2 C. K-map
D. 8 D. None of these

55. In an SR latch built from NOR gates which 61. What two possible values can you achieve
condition is not allowed? from Boolean constants and variables?
A. S=0, R=0 A. 1 and 0
B. S=0, R=1 B. 1 and 2
C. S=1, R=0 C. Only 1
D. S=1, R=1 D. none of above

56. What is the output of an OR gate if the 62. A flip flop can store
inputs are 1 and 0? A. 1 bit
A. 0 B. 2 bits
B. 1 C. 4 bits
C. OFF D. 8 bits
D. 2
63. What is used to overcome the disadvan-
57. In the toggle mode a JK flip-flop has tage in a RS flip flop where while the HIGH
clock signal is still present, if there is any
A. J = 0, K = 0 changes to the S or R input, the Q output
B. J = 1, K = 1 will change?

53. A 54. B 55. D 56. B 57. B 58. C 59. B 60. B 61. A 62. A 63. A
1.1 Digital logic 8

A. Edge triggered 69. What does AOI stand for?


B. Clock triggered A. American Organization of Integrated
C. Positive going transition Circuits
D. none of above B. Association of ICs
C. Association of Industrial Engineers
64. The Boolean expression Y = (AB)’ is logi-
cally equivalent to what single gate? D. AND OR INVERTER
A. NAND

NARAYAN CHANGDER
70. The NOR gate output will be high if the
B. NOR two inputs are
C. AND A. 00
D. OR B. 01
C. 10
65. How many flip-flops are required to con-
struct a decade counter? D. 11
A. 10 71. How man gates can you fit on IC chip?
B. 8 A. 1
C. 5 B. 4
D. 4 C. 10
66. Which of the following would be consid- D. none of above
ered an output?
72. If P, Q, R are the inputs of a Full Adder
A. switch then the sum is given by
B. lightbulb A. P AND Q AND R
C. button B. P XOR Q OR R
D. enter key
C. P XOR Q AND R
67. An adder where all the bits of the two D. P XOR Q XOR R
operands are added simultaneously
73. is an idealized or physical device imple-
A. Parallel Adder
menting a Boolean function.
B. Half Adder
A. Digital Computer
C. Serial Adder
B. Logic Gate
D. Full Adder
C. Digital Circuit
68. The time interval immediately preceding D. None of these
the active transition of the CLK signal dur-
ing which the control input must be main- 74. Time needed for a gate to change its state
tained at the proper level is what? is called
A. Setup time A. Rise time
B. Hold time B. Decay time
C. Clock time C. Propagation time
D. none of above D. Operating time

64. A 65. D 66. B 67. A 68. A 69. D 70. A 71. B 72. D 73. B 74. C 75. A
1.1 Digital logic 9

75. The inputs of a NAND gate are connected B. 8


together. The resulting circuit is
C. 16

PRACTICE BOOK» NOT FOR SALE


A. Not Gate
D. 32
B. Nor Gate
C. And Gate 81. If J = K (J and K are shorted) in a JK flip-
flop, what circuit is made
D. Or Gate
A. SR Flip Flop
76. What must synchronous control inputs be
used in conjunction with to trigger a flip B. D Flip Flop
flop circuit? C. T Flip Flop
A. Clock signal
D. M S J K Flip Flop
B. Set state
C. Reset state 82. Which of the following gate will give a 0
when both of its inputs are 1?
D. none of above
A. AND
77. Digital circuit can be made by the repeated
use of B. OR
A. OR Gate C. NAND
B. NAND Gate D. EXOR
C. AND Gate
83. What are considered the universal gates?
D. Ex-OR Gate
A. NOR and NAND Gates
78. IC 7432 is for which of the following
gate? B. XOR and XNOR Gates

A. NOR C. NOT and OR Gates


B. OR D. none of above
C. AND
84. which device has one input and many out-
D. EX-OR puts
79. A digital circuit has a total time period of A. flip flop
4 seconds. During this period, the circuit is
B. multiplexer
ON for 1 second. What is the Duty Cycle
of this circuit? C. demultiplexer
A. 1 second D. counter
B. 3 seconds
85. A NOT gate has
C. 75%
A. Two inputs and one input
D. 25%
B. One input and one output
80. How many rows will be there be in a 4
input truth table? C. One input and two outputs
A. 4 D. Two inputs and two outputs

76. A 77. B 78. B 79. D 80. C 81. C 82. C 83. A 84. C 85. B 86. A
1.1 Digital logic 10

86. When A and B represent the inputs of an 92. A bi-stable multivibratior circuit within the
Exclusive OR logic gate, its output O will sequential digital logic family of devices
be able to store single bit of binary data is
A. O=AB’+A’B called?

B. O=AB+A+B A. Flip Flop


C. O=A+B+(AB)’ B. Binary store
D. None of these C. Computer software

NARAYAN CHANGDER
87. Jhonson Counter is also called D. none of above

A. Ring Counter 93. If A and B are the inputs of a half adder,


B. Twisted Ring Counter the carry is given by
C. Decade Counter A. A XOR B
D. Ripple counter B. A AND B

88. The boolean expression of an OR gate is C. A XNOR B


D. A OR B
A. A.B
94. A collection of flip-flops used to move
B. A’B+AB’ data(bits) within a register is a
C. A+B A. Shift Register
D. A’B’ B. Bit Register
89. The word Demultiplex means C. Flip Register
A. One into many D. none of above
B. Many to one
95. What is a Hertz? Hz
C. Distributor
A. Unit of measurement-1 Hz = 1 per sec-
D. One into many as well as Distributer ond
90. If P and Q are the inputs of half substrac- B. Unit of measurement-1 Hz = 1 per
tor, then the borrow is given by milli second
A. P XOR Q C. Unit of measurement-1 Hz = 1 fre-
B. P OR (NOT Q) quency
C. P AND Q D. Something they drive a dead person in
for a funeral
D. P AND (NOT Q)

91. Which of the following is a combinational 96. In a clocked SR latch the outputs of the
circuits latch change when:
A. Multiplexer A. Clock is 0
B. Demultiplexer B. Clock is 1
C. Encoder C. Does not depend on clock
D. All of them D. None of the above

87. B 88. C 89. D 90. D 91. D 92. A 93. B 94. A 95. A 96. B 97. A
1.1 Digital logic 11

97. NOT gate also known as 103. Binary 10101010 = in decimal?


A. Inverter A. 85

PRACTICE BOOK» NOT FOR SALE


B. NAND B. 170
C. NOR
C. 180
D. None of these
D. 75
98. How many outputs will a decimal to BCD
encoder have? 104. If an expression contains both AND and
A. 4 OR operations, which is performed first,
unless there is parentheses in the expres-
B. 8
sion?
C. 10
A. AND
D. 12
B. OR
99. Decoder is a
C. Both operate
A. combinational circuit
D. none of above
B. sequential circuit
C. complex circuit 105. In Boolean algebra, the bar sign (-) indi-
D. gate cates

100. Which gate produces a HIGH output A. OR operation


whenever the two inputs are the same B. AND operation
level?
C. NOT operation
A. XNOR Gate
D. None of the above
B. XOR Gate
C. NAND Gate 106. The gate which is known as the coinci-
D. none of above dence gate is

101. AND Gate requires how many “1” inputs A. OR


are required to get a “1” output? B. AND
A. 0 C. XNOR
B. 1
D. XNOR
C. 2
D. none of above 107. Karnaugh map is used to

102. Which segments of 7-segment display A. Minimize the number of flip-flops in a


would required to active to display the dec- digital circuits
imal digit 2? B. Minimize the number of gates only in a
A. a, b, d, e, and g digital circuits
B. a, b, c, d, and g C. Minimize the number of gates and fan
C. a, c, d, f, and g in a digital circuits
D. a, b, c, d, e, and f D. Design gates

98. A 99. A 100. A 101. C 102. A 103. B 104. A 105. C 106. C 107. C 108. A
1.1 Digital logic 12

108. Total number of outputs in full adder is 114. One that is not the Outcome of magnitude
comparator is
A. 2
A. a+b
B. 3
B. a<b
C. 4
C. a=b
D. 1
D. a>b
109. Why is it considered impossible to obtain 115. Which of the following is a digital switch

NARAYAN CHANGDER
a clean voltage transition from a switch? which selects one of the many inputs to a
A. Contact bounce single output.
B. Intermittent action A. Multiplexer
C. Human error B. Demultiplexer
D. none of above C. Encoder
D. Decoder
110. Multiplexer is also called
116. How many NAND circuits are contained
A. Data Distributor in a 7400 NAND IC?
B. Data Selector A. 6
C. Data Encoder B. 4
D. Data Decoder C. 8
D. 1
111. The Output of two input OR gate is high
A. Only if both inputs are high 117. What is the circuit number of the IC that
contains four two-input AND gates in stan-
B. Only if both inputs are low dard TTL?
C. Only if one input is high and the other A. 7402
is low
B. 7408
D. If at least one of the inputs is low
C. 7432
112. NAND gate means D. 7486
A. Inversion followed by AND gates 118. How many input and output required for
B. AND followed by an Inverter gate multiplexer?
C. AND followed by an OR gate A. Many input and one output

D. None of these B. One input and many output


C. One input and one output
113. Where is data stored in FF? D. None of the above
A. Register
119. How long does a propagation delay
B. Counters last?
C. Synchronization A. 100nsec
D. none of above B. 100msec

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 13

C. 100psec B. Invert input signal


D. none of above C. Act as a universal gate

PRACTICE BOOK» NOT FOR SALE


120. Convert 1011 in binary to decimal D. None of the above
A. 11
122. A logic state can only be
B. 10
C. 12 A. On or 1
D. 9 B. Off or 1

121. The only function of NOT gate is to C. 1 or 0


A. Stop signal D. In and Out

1.2 Computer Organization


1. The fastest memory in the computer sys- 5. ADD R1, R2, R3
tem is A. One address instruction
A. ROM B. Two address instruction
B. RAM C. Three address instruction
C. Cache D. none of above
D. None of these 6. Virtual memory is
2. What year was the PCIe Launch? A. Memory on the hard disk that the CPU
uses an extended RAM
A. 2004
B. in RAM
B. 2007
C. only necessary if you do not have any
C. 2010 RAM in your computer
D. 2017 D. a backup device for floppy disk
3. A PowerPoint Presentation will have 7. The registers, ALU and the interconnection
which file extension between them are collectively called as
A. .ppt
B. .power A. PROCESS ROUTE
B. INFORMATION TRAIL
C. .doc
C. INFORMATION PATH
D. .xls
D. DATA PATH
4. A field is a
8. A 1:8 DMUX uses (number) of select
A. piece of information lines.
B. collection of data A. 2
C. group of records B. 3
D. none of above C. 4

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 14

D. 8 14. acts as interface between user and


computer.
9. Which of the following medium is used be- A. Keyboard
tween CPU & RAM TO speed up the pro-
cessing power of a CPU? B. Mouse
C. Scanner
A. Virtual Memory
D. Input Unit
B. Flash Memory
15. The periods of time when the unit is idle is

NARAYAN CHANGDER
C. cache memory
called as
D. Main Memory
A. Stalls
10. It is a computer program that combines B. Bubbles
various object files together in order to C. Hazards
make an executable file.
D. Both Stalls and Bubbles
A. Assembler
16. is a:
B. Compiler
A. Quad two input OR Gate IC
C. Linker B. Quad two input AND Gate IC
D. Loader C. Dual four input OR Gate IC

11. separated the programming task from D. Triple three input OR Gate IC
computer operation tasks. 17. When we work on any document on PC, it
A. Algorithms is stored temporarily on-
B. Data processors A. RAM
B. ROM
C. High-level programming languages
C. CPU
D. Operating systems
D. Flash Memory
12. Communication system that transfers data
18. The fetch and execution cycles are inter-
between components inside a computer, or
leaved with the help of
between computers
A. Modification in processor architecture
A. Control Unit (CU)
B. Arithmetic and Logic Unit (ALU) B. Clock
C. Bus C. Special unit
D. Memory D. Control unit
19. use ultraviolet light is used to erase
13. Identify the pointing device
data.
A. Keyboard
A. RAM
B. Mouse B. ROM
C. Light pen C. PROM
D. Touch sensitive screen D. EPROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 15

20. Which is used to provide result of process- 26. This is a small, very fast, memory that
ing? stores the data from frequently used main
memory addresses. It lies between the

PRACTICE BOOK» NOT FOR SALE


A. Moitor
CPU and main memory.
B. Keyboard
A. Control Unit (CU)
C. Input Unit
D. Output Unit B. Arithmetic and Logic Unit (ALU)
C. Bus
21. is the brain of the computer.
A. Input unit D. Cache Memory
B. Processing Unit
27. is also known as flash memory (Pen
C. Memory Unit Drive)
D. Output Unit A. RAM
22. What does the hardwired control genera- B. ROM
tor consist of?
C. EEPROM
A. Decoder/encoder
D. EPROM
B. Condition codes
C. Control step counter 28. The gates required to build a half adder are
D. All of the mentioned
23. convert data into a form which can be A. EX-OR gate and NOR gate
recognized by computer B. EX-OR gate and OR gate
A. Memory unit C. EX-OR gate and AND gate
B. Input Unit
D. EX-NOR gate and AND gate
C. Output Unit
D. CPU 29. A user-generated interrupt (e.g. moving
a mouse) would be given a higher one
24. takes photograph, stores it and sends of these to ensure that the user interface
it as input to the computer does not lag in being updated:
A. Keyboard
A. priority
B. Mouse
B. service
C. Bar code reader
C. frequency
D. Web camera
D. none of above
25. Which sends the control signals to the de-
vicesinvolved in the execution of the in- 30. Attanasoff-Berry Computer used:
structions?
A. 45 Vacumm tubes
A. ALU
B. CU B. 48 Vacumm tubes

C. Register C. 47 Vacumm tubes


D. CPU D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 16

31. Use speech synthesizer software to 37. If a new processor has 85% if the capac-
provide voice output itive load of old processor, it supply volt-
A. Monitor age is reduced by 20% and new proces-
sor results in a 25% shrink in frequency.
B. Speaker What is the impact on power consump-
C. Plotter tion?
D. Printer A. 0.408
B. 0.5

NARAYAN CHANGDER
32. Which store data permanently?
A. Storage device C. 0.49
B. Secondary Storage devices D. none of above
C. Auxiliary memory devices 38. In digital logic, a counter is a device which
D. All the above
A. Counts the number of outputs
33. How many types of file organization are
there? B. Stores the number of times a particu-
lar event or process has occurred
A. 3
B. 5 C. Stores the number of times a clock
pulse rises and falls
C. 4
D. Counts the number of inputs
D. 6
39. This is the brains of the computer where
34. The format is usually used to store most calculations take place.
data.
A. Central Processing Unit (CPU)
A. BCD
B. Arithmetic and Logic Unit (ALU)
B. DECIMAL
C. Bus
C. HEXADECIMAL
D. Memory
D. OCTAL

35. The first computing machine to use the idea 40. Which is the simplest type of file organiza-
of storage and programming was called tion?
A. Direct Access
A. the Madeline B. Indexed Sequential
B. EDVAC C. Serial
C. the Babbage machine D. Random
D. the Jacquard loom
41. output device is also called as display
36. is made up of integrated circuit screen.
A. Memory unit A. Monitor
B. Input Unit B. Speaker
C. Output Unit C. Plotter
D. All the above D. Printer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 17

42. Which is most commonly used output de- 48. Data are stored in in hard disk
vice A. Sector

PRACTICE BOOK» NOT FOR SALE


A. Monitor B. Track
B. Speaker C. Format
C. Plotter D. Platter
D. Printer
49. A step-by-step solution to a problem is
43. In a computer, the subsystem serves called
as a manager of the other subsys-tems. A. hardware
A. ALU B. an operating system
B. input/output C. a computer language
C. memory D. an algorithm
D. control unit
50. In cache memory, the word is written
44. store data in frames into cache and main memory at the same
A. Hard disk time.

B. Magnetic tapes A. copy-back

C. Floppy disk B. write-through

D. CD ROM C. copy-both
D. write-back
45. During the execution of a program which
gets initialized first? 51. What is used to controls the movement of
A. MDR the cursor?

B. IR A. Keyboard

C. PC B. Mouse

D. MAR C. Scanner
D. Joystick
46. holds data and intsruction.
A. Memory unit 52. is the main memory of computer?

B. Input Unit A. RAM

C. Output Unit B. ROM

D. All the above C. PROM


D. EPROM
47. A sequence of control words corresponding
to a control sequence is called 53. Interface for graphics cards in the 1960s
A. Micro routine A. VLB
B. Micro function B. AGP
C. Micro procedure C. AGP Pro
D. None of the mentioned D. PCI

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 18

54. The expression for the Sum output of a Full C. Bus


Adder is similar to the expression of: D. Memory
A. Sum of Half Adder
60. The computer which provide continuous in-
B. Difference of Half Subtractor formation
C. Difference of Full Subtractor A. Hybrid computer
D. none of above B. Analog computer
55. Which among is the largest memory unit C. Digital Computer

NARAYAN CHANGDER
A. Peta D. none of above
B. Yotta 61. To read the control words sequentially
C. tera is used.
A. PC
D. Exa
B. IR
56. The controls the I/O devices and trans-
C. UPC (MPC)
fer of data to and from the primary stor-
age. D. None of the mentioned
A. LU 62. What is information
B. AU A. collection of programs
C. ALU B. collection of instruction
D. CU C. collection of data
D. collection of software
57. In a computer, the subsystem per-
forms calculations and logical opera- 63. The form factor of motherboards that are
tions. commonly used today is
A. ALU A. ABC
B. input/output B. AT
C. memory C. ATX
D. control unit D. Micro ATX

58. How many AND, OR and EXOR gates 64. Which is your school name
are required for the configuration of full A. campion
adder? B. sda
A. 1, 2, 2 C. rajagiri
B. 2, 1, 2 D. matha
C. 3, 1, 2
65. enables the processor to access data
D. 4, 0, 1 quickly whenever they are needed.
59. This is a component of a computer’s CPU A. CU
that directs operation of the processor. B. Cache
A. Control Unit (CU) C. Memory
B. Arithmetic and Logic Unit (ALU) D. Register

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 19

66. Interrupts form an important part of 72. is a large multilayered printed circuit
systems. board inside a computer that contains CPU,
BIOS, ROM chip and the CMOS setup infor-

PRACTICE BOOK» NOT FOR SALE


A. Batch Processing
mation.
B. Multitasking
A. Motherboard
C. Real-time processing
D. Multi-user B. RAM
C. ROM
67. Low throughput
A. Multi Processor D. Cache
B. Uni processor
73. is stores critical programs that boots
C. Intel Processor the computer
D. none of above A. RAM
68. Which of these is not a system utility pro- B. ROM
gram?
C. PROM
A. Memory and CPU monitor
D. EPROM
B. Defragmentation software
C. A graphics card driver 74. An is a wildcard character. it repre-
D. Diagnostic software in case of com- sents one or more characters.
puter crash A. asterisk (*)
69. What kind of laser does Blu-ray disc use? B. question mark (? )
A. Blue-red laser C. curly braces ({})
B. Blue-green laser
D. exclamation mark( ! )
C. Blue-violet laser
D. Purple-green laser 75. In Register Transfer Language, is used
to denote “Add the numbers in A and B
70. Which of the following is NOT a transla- and place the sum in A”.
tor?
A. B ← A + B
A. Assembler
B. Compiler B. A + B ← A

C. Interpreter C. A ← A + B
D. Executable D. A + B → B

71. which bus carries out signals to carry out 76. The register used to store the flags is
operations for communication such as read called as
/write
A. Flag register
A. address
B. control B. Status register

C. data C. Test register


D. none of above D. Log register

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 20

77. Which is not an example of a structured 83. How many select lines will a 16:1 MUX
data base require?
A. oracle A. 2
B. MS access B. 3
C. Mongo DB C. 4
D. Mysql D. None of the above

NARAYAN CHANGDER
78. To increase the speed of memory access in 84. Arithmetic and logic instruction
pipelining, we make use of A. Data storage
A. Special memory locations B. Data Processing
B. Special purpose registers C. Memory access
C. Cache D. none of above
D. Buffers
85. Total number of inputs in a half adder is
79. Which is not a type of file organization?
A. Direct Access A. 2
B. Serial B. 3
C. Random C. 4
D. Relative D. 1

80. is used for backup of hard disk 86. Von Neumann architecture is
A. Hard disk A. SISD
B. Magnetic tapes B. SIMD
C. Floppy disk C. MIMD
D. CD ROM D. MISD

81. The Input devices can send information to 87. One of the first computers based on the
the processor. von Neumann model was called
A. When the SIN status flag is set A. Pascal
B. When the data arrives regardless of B. Pascaline
the SIN flag C. ABC
C. Either of the cases D. EDVAC
D. Neither of the cases
88. Starting from the source code, which of
82. provides visual display of data(Image these will start running the program quick-
and text). est?
A. Monitor A. Interpreter
B. Speaker B. Bytecode on a virtual machine
C. Plotter C. Compiler
D. Printer D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 21

89. What part of the CPU is being de- 95. This is the part of a CPU that carries out
scribed.Carries out arithmetic operations arithmetic and logic operations.
and performs logical comparisons.

PRACTICE BOOK» NOT FOR SALE


A. Central Processing Unit (CPU)
A. ALU B. Arithmetic and Logic Unit (ALU)
B. Control Unit C. Bus
C. Cache D. Memory
D. none of above
96. Main memory works in conjunction with
90. store data and program temporarily.
A. Hard disk A. CPU
B. Pen drive B. RAM
C. Memory Unit C. Graphics
D. CD Rom D. None of these

91. Which of the following is lowest in mem- 97. In A or B and C what operation occurs
ory hierarchy? first?
A. Cache memory A. A or B
B. Secondary memory B. B and C
C. Registers C. Both simultaneously
D. RAM D. none of above

92. According to the von Neumann model, 98. is generally used to increase the appar-
are stored in memory. ent size of physical memory.
A. only data A. Secondary memory
B. only programs B. Virtual memory
C. data and programs C. Hard Disks
D. address D. Disks

93. The format of a file can be known from its 99. The model is the basis for today’s com-
file puters
A. extension A. Leibnitz
B. file format B. von Neumann
C. file extension C. Pascal
D. none of above D. Charles Babbage

94. The PC register holds what? 100. If a unit completes its task before the al-
lotted time period, then
A. The data for the next instruction
A. It’ll perform some other task in the re-
B. The address for the next instruction maining time
C. The accumulated memory location B. Its time gets reallocated to a different
D. The instruction for the next instruction task

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 22

C. It’ll remain idle for the remaining time 106. What is the part of the CPU called that
performs calculations?
D. None of the mentioned A. ALU
B. Control Unit
101. In a computer, the subsystem stores
data and programs. C. Program Counter
D. Memory
A. ALU
107. To get the physical address from the log-

NARAYAN CHANGDER
B. input/output
ical address generated by the CPU, is
C. memory used.
D. control A. MAR
102. is a set of instructions in a computer B. MMU
language that tells the computer what to C. TLB
do with data. D. Overlays
A. An operating system
108. Translates low level assembly language
B. An algorithm mnemonic into machine code
C. A data processor A. Assembler
D. A program B. Compiler
C. Interpreter
103. directs and controls the activities of
thecomputer system. D. none of above

A. ALU 109. is the computer calculator.


B. CU A. ALU
C. Register B. CU

D. CPU C. Internal Memory


D. CPU
104. How many types of the counter are
there? 110. The small extremely fast, RAM’s are
called as
A. 2
A. CACHE
B. 3
B. HEAPS
C. 4
C. ACCUMULATORS
D. 5 D. STACKS
105. What is used to feed data and program? 111. The CPU has two modes privileged and
A. Keyboard non-privileged. In order to change the
mode from privileged to non-privileged,
B. Mouse is needed.
C. Scanner A. a hardware interrupt
D. Joystick B. a software interrupt

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 23

C. either hardware or software interrupt 117. read image or text printed on a paper
and translate the information into a form
that the computer can use

PRACTICE BOOK» NOT FOR SALE


D. a non-privileged instruction
A. Keyboard
112. Which acts as interface between com- B. Mouse
puter and user?
C. Scanner
A. Monitor
D. Joystick
B. Printer
118. The informs the CPU about the loca-
C. Input Unit tion of the data residing in the memory.
D. Output Unit A. Data bus
B. Address bus
113. is thin strip coated with magnetic ma-
terial C. Cache

A. Hard disk D. Control line

B. Magnetic tapes 119. The contention for the usage of a hard-


ware device is called
C. Floppy disk
A. Structural hazard
D. CD ROM
B. Stalk
114. Choose the odd one C. Deadlock
A. Windows D. None of the mentioned

B. Solaris 120. A bus scores over a multistage switching


network in which one of the following as-
C. Linux
pects
D. Outlook A. Reliability
115. A is also a wildcard character. it rep- B. Speed
resent only one character. C. Scalability
A. question mark (? ) D. Cost of Performing
B. asterisk ( & ) 121. Where, data will remain intact even
C. asterisk ( * ) when the computer is turned of
A. Secondary Storage device
D. none of above
B. Primary Storage device
116. The type of control signal is generated C. Motherboard
based on
D. RAM
A. contents of the step counter
122. In computer subtraction is generally car-
B. Contents of IR ried out by
C. Contents of condition flags A. 10’s complement
D. All of the mentioned B. 1’s complement

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 24

C. 2’s complement C. Register Addressing Mode


D. none of above D. none of above

123. A counter circuit is usually constructed of 128. The computer used in Intensive care unit
A. Analog Computer
A. A number of latches connected in cas- B. Hybrid Computer
cade form
C. Digital Computer
B. A number of NAND gates connected in

NARAYAN CHANGDER
D. none of above
cascade form
C. A number of flip-flops connected in 129. A computer system is the integration of
cascade A. Hardware
D. A number of NOR gates connected in B. Software
cascade form
C. Both a and b
124. Program is translated line by line as the D. Either a and b
program is running
130. The ALU makes use of to store the
A. Assembler intermediate results.
B. Compiler A. Register
C. Interpreter B. Accumulator
D. none of above C. Stack
125. A MUX with 2 select lines can handle D. Heap
(number) of output line(s)
131. The address of the address of the
A. 2 operand is specified in addressing
B. 4 mode.
C. 8 A. immediate

D. 1 B. direct
C. indirect
126. A 17th-century computing machine that
could perform addition and subtraction D. relative
was the 132. Which of the register/s of the processor
A. Pascaline is/are connected to Memory Bus?
B. Jacquard loom A. PC
C. Analytical Engine B. MAR
D. Babbage machine C. IR
D. BOTH PC & MAR
127. In the addressing mode, the instruction
contains the address of memory which 133. One way to make a four-bit adder to per-
refers the address of the operand form subtraction is by
A. Direct Addressing Mode A. Inverting the output
B. Indirect Addressing Mode B. Inverting the carry-in

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 25

C. Inverting the B inputs 140. Which of these is NOT a stage of the FDE
D. Grounding the B inputs cycle?

PRACTICE BOOK» NOT FOR SALE


A. Fetch
134. It is known that we get more throughput
by performing operations in parallel B. Execute
A. Pipelining via Parallelism C. Decide
B. Performance via Parallelism D. Decode
C. Performance via Pipelining 141. The small extremely fast RAM is called
D. none of above as
135. Two complement representation of (-3) A. Heap
A. 1101 B. Stack
B. 1010 C. Cache
C. 0011 D. Accumulator
D. none of above 142. is volatile memory
136. which is not a type of OS user interface A. RAM
A. command based B. ROM
B. touch based C. PROM
C. graphical based D. EPROM
D. machine learning
143. Which is the high speed used to store
137. have been developed specifically for data?
pipelined systems.
A. ALU
A. Utility software
B. CU
B. Speed up utilities
C. Register
C. Optimizing compilers
D. Hard disk
D. None of the mentioned
144. Identify the most common input device?
138. store result of processing.
A. Keyboard
A. RAM
B. Mouse
B. ROM
C. PROM C. Scanner

D. EPROM D. Joystick

139. use laser beam to store and retrieve 145. prints text or images on paper or
data other media
A. Hard disk A. Monitor
B. Magnetic tapes B. Speaker
C. Floppy disk C. Plotter
D. CD ROM D. Printer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 26

146. Re-organises the files by putting the re- 151. The ALU works on the instructions and
lated files next to each other data held in the
A. Encryption A. Notebook
B. Compression B. Registers

C. Defragmentation C. Copy Pad


D. I/O devices
D. Auto-Update
152. Based on the functionalities, computer

NARAYAN CHANGDER
147. Highly encoded schemes that use compact hardware are classified into cate-
codes to specify a small number of func- gories.
tions in each micro instruction is
A. 3
A. Horizontal organisation B. 4
B. Vertical organisation C. 5
C. Diagonal organisation D. 6
D. None of the mentioned 153. can be programmed using PROM pro-
grammer or a PROM burner
148. The names of students in a class arranged
by last name is what type of file organiza- A. RAM
tion B. ROM
A. Indexed Sequential C. PROM
B. Serial D. EPROM

C. Sequential 154. provide communication between the


user and the computer.
D. Direct Access
A. Memory unit
149. Part-BWrite a program to evaluate the B. Input Unit
arithmetic statement:Y=(A+B)*(C+D) us-
C. Output Unit
ing three address
D. CPU
A. ADD R1, A, BADD R2, C, DMUL Y, R1,
R2 155. Any picture, presentation or document is
called
B. MUL R1, A, BADD R2, C, DADD Y, R1,
R2 A. file
C. ADD R1, A, BMUL R2, C, DMUL Y, R1, B. folder
R2 C. data
D. none of above D. none of above
156. FORTRAN and COBOL are examples of
150. Which is not an input unit?
A. Keyboard A. hardware
B. Mouse B. operating systems
C. Monitor C. computer languages
D. Scanner D. algorithms

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 27

157. Fast-look-ahead carry circuits found in 163. Find the odd one?
most 4-bit full-adder circuits which A. Keyboard

PRACTICE BOOK» NOT FOR SALE


A. Determine sign and magnitude B. Monitor
B. Reduce propagation delay C. Speaker
C. Add a 1 to complemented inputs
D. Printer
D. Increase ripple delay
164. The set of wires, which carry information
158. MICR stands for in a controlled manner, is called
A. Magnetic Interface Character Resolu- A. System bus
tion
B. Public bus
B. Magnetic Ink Card Reader
C. Private bus
C. Magnetic Ink Character Reading
D. None of these
D. Magnetic Ink Code Register
165. Which registers can interact with the sec-
159. A full adder logic circuit will have ondary storage?
A. Two inputs and one output A. MAR
B. Three inputs and three outputs B. PC
C. Two inputs and two outputs
C. IR
D. Three inputs and two outputs
D. RO
160. CISC stands for
166. In signed magnitude binary division if
A. Complete Instruction Sequential Com- the dividend is (111000)2 and divisor is
pilation (10011)2 then the result is
B. Computer Integrated Sequential Com- A. (00100)2
piler
B. (10100)2
C. Complex Instruction Set Computer
C. (11001)2
D. Complex Instruction Sequential Compi-
lation D. (01100)2

161. Software are called as 167. You can think of it as a one column table
A. Physical entities A. Serial
B. Non physical entities B. Indexed Sequential
C. Set of program C. Direct Access
D. None of the above D. Sequential

162. What type of memory is primarily used 168. Floating point representation is used to
as cache memory? store
A. SRAM A. Boolean Values
B. DRAM B. Whole numbers
C. RAM C. Real Integers
D. ROM D. Integers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 28

169. Division by zero causes an interrupt. 175. Which of following are known as univer-
A. implicit sal gates?
A. NAND & NOR
B. internal
B. AND & OR
C. infinity
C. XOR & OR
D. external
D. EX-NOR & XOR
170. What is used for voice input?
176. The situation wherein the data of

NARAYAN CHANGDER
A. Keyboard operands are not available is called
B. Microphone A. Data hazard
C. Light pen B. Stock
D. Touch sensitive screen C. Deadlock
D. Structural hazard
171. Produce voice output(audio data)
177. Which file organization can easily access
A. Monitor
records
B. Speaker
A. Serial
C. Plotter B. Sequential
D. Printer C. Direct Access
172. The truth table for an S-R flip-flop has D. Indexed Sequential
how many VALID entries? 178. In zero address instruction method, the
A. 1 operands are stored in
B. 2 A. registers
C. 3 B. accumulators
D. 4 C. push down stack
D. cache
173. Which memory device is generally made
of semiconductors? 179. Breaking logical memory into blocks of
the same size is called as:
A. RAM
A. Frames
B. HARD DISK
B. Pages
C. FLOPPY DISK
C. Segments
D. CD DISK
D. Blocks
174. The first automatic electronic digital com- 180. The control unit controls other units by
puter was called generating
A. Pascal A. CONTROL SIGNALS
B. Pascaline B. TIMING SIGNALS
C. ABC C. TRANSFER SIGNALS
D. ENIAC D. COMMAND SIGNALS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 29

181. present information from a com- C. PROM


puter. D. EPROM

PRACTICE BOOK» NOT FOR SALE


A. Memory unit
187. An interrupt breaks the execution of in-
B. Input Unit structions and diverts its execution to
C. Output Unit A. Interrupt service routine
D. CPU B. Counter word register
182. A universal logic gate is one which can be C. Execution unit
used to generate any logic function. Which D. control unit
of the following is a universal logic gate?
A. OR 188. read Image or text as input.

B. AND A. Keyboard

C. XOR B. Mouse

D. NAND C. Scanner
D. Joystick
183. In which operation carry is obtained?
A. Subtraction 189. Which register is being described? Holds
the memory address about to be used by
B. Addition the CPU
C. Multiplication A. MAR
D. Both addition and subtraction B. MDR
184. Which register is being described? Holds C. Accumulator
the memory address of the instruction for D. Program Counter
each cycle
A. MAR 190. TB is equivalent to

B. MDR A. 1024 KB

C. Accumulator B. 1024*1024 MB

D. Program Counter C. 1024 MB


D. 1000 GB
185. Which translator will create the fastest
running program, provided all other things 191. A compiler converts
are equal? A. High level language to machine lan-
A. Interpreter guage
B. Bytecode on a virtual machine B. source code to object code
C. Compiler C. Both 1) and 2)
D. none of above D. none of above

186. is burnt (pre-recorded) at manufac- 192. Physical entities of the computer is called
turing time. as
A. RAM A. Hardware
B. ROM B. Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 30

C. Input Unit C. Cannot be determined


D. Program D. none of above
193. is the design and writing of a pro- 199. What does PC stand for in Computer Ar-
gram in structured form. chitecture?
A. Software engineering A. Program Counter
B. Hardware engineering B. Personal Computer

NARAYAN CHANGDER
C. Algorithm development C. Placement Counter
D. Instructional architecture D. Probably Correct
194. On switch off a computer, stored data 200. Which of the following is used to hold
gets erased. ROM, RAM, CPU and expansion cards?
A. RAM
A. Computer Bus
B. ROM
B. Mother Board
C. PROM
C. Cache
D. EPROM
D. None
195. Identify the function of CPU?
201. In S-R flip-flop, if Q = 0 the output is said
A. Perform computation to be
B. Decision making A. Set
C. Control different devices B. Reset
D. All the above
C. Previous state
196. A new switching device was used in sec- D. Current state
ond generation
202. How many AND gates are required to re-
A. Vacuum tubes
alize Y = CD + EF + G?
B. Transistors
A. 4
C. Diodes
B. 5
D. none of above
C. 3
197. In addressing mode, the operand D. 2
value is directly specified.
A. Relative 203. What is a trigger pulse or clock pulse?
B. Direct A. A pulse that starts a cycle of operation
C. Indexed
B. A pulse that reverses the cycle of op-
D. Immediate
eration
198. The functionality of a NAND Gate can be C. A pulse that prevents a cycle of opera-
obtained by cascading ICs 7408 and 7404 tion
A. True D. A pulse that enhances a cycle of oper-
B. False ation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 31

204. The pipelining process is also called as 209. Translates source code from high level
languages into object code and then into
machine code

PRACTICE BOOK» NOT FOR SALE


A. Superscalar operation
A. Assembler
B. Assembly line operation
B. Compiler
C. Von Neumann cycle
C. Interpreter
D. None of the mentioned
D. none of above
205. The logic circuits whose outputs at any in-
stant of time depends only on the present 210. What is used for fast and error free en-
input but also on the past outputs are try
called A. Keyboard
A. Combinational circuits B. Mouse
B. Sequential circuits C. Bar code reader
C. Latches D. Scanner
D. Flip-flops
211. What is used provide data and program?
206. The faster, costlier and relatively small A. Keyboard
from of storage managed by computer sys-
tem hardware is: B. Mouse

A. Main Memory C. Output Unit

B. Flash Memory D. Input Unit

C. Cache memory 212. Which is not a function of OS


D. Virtual Memory A. process management
B. managing memory
207. What part of the CPU is being de-
scribed.Very fast memory which stores C. logical operation
regularly used instructions. CPU can ac- D. allocating resources
cess instructions held here quicker than
from RAM 213. What is VDU?
A. ALU A. Output device
B. Control Unit B. Input device
C. Cache C. Storage device
D. none of above D. None of the above

208. A file is a 214. Built in memory of computer is


A. data container A. EROM
B. storage unit B. ROM
C. set of records C. RAM
D. collection of data D. PROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.2 Computer Organization 32

215. Known as Automatic sequence Con- 221. In a computer, the subsystem accepts
trolled data and programs and sends pro-cessing
results to output devices.
A. Mark III computer
A. ALU
B. Mark I Computer
B. input/output
C. Mark II Computer
C. memory
D. none of above D. control unit

NARAYAN CHANGDER
216. Early Buses 222. Ripple counters are also called
A. ISA A. SSI counters
B. PCI B. Asynchronous counters
C. VLB C. Synchronous counters
D. VLSI counters
D. AGP
223. Element of instruction
217. C, C++, Java languages are
A. Destination operand address
A. High Level Language B. operand address
B. Assembly Language C. memory address
C. Machine Language D. none of above
D. none of above 224. Which register is being described? Holds
the data / instructions that have been
218. A register that keeps track of the next fetched from memory
instruction to be executed is called a
A. MAR
A. Program Counter
B. MDR
B. Instruction Register C. Accumulator
C. Accumulator D. Program Counter
D. Data Register 225. What is the name of the register that
stores the instruction that the CPU is exe-
219. memory is made up 1.44MB
cuting at the moment?
A. Hard disk A. Current Instruction Register
B. Magnetic tapes B. Program Counter
C. Floppy disk C. Memory Data Register
D. CD ROM D. Accumulator

220. CPU consists of ? 226. Locations for source and destination


operands
A. ALU
A. Main or virtual memory
B. CU B. Secondary memory
C. Internal memory C. Primary memory
D. All the above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 33

227. ALU perform and C. EEPROM


A. Computation D. EPROM

PRACTICE BOOK» NOT FOR SALE


B. Compare two number
233. is a multimedia file format used to
C. Both a and b store videos and audios.
D. None of the above A. MP4
228. The 8-bit encoding format used to store B. MP3
data in a computer is C. GIF
A. ASCII D. none of above
B. EBCDIC
234. Store large amount of data for a long pe-
C. ANCI riod of time?
D. USCII
A. Memory unit
229. Processor support parallelism concept B. Input Unit
A. Uni processor C. Output Unit
B. Multi Processor D. Secondary storage device
C. intel Processor
235. Indexed addressing mode
D. none of above
A. MOV BX, [SI+16]
230. File extension of image B. MOV BX, [SI+8],
A. .jpge
C. MOV BX, [I+16],
B. .jgpe
D. none of above
C. .jpeg
236. Which of these is a not a computer man-
D. .pjeg
ufacturer?
231. Which among the following is the HEXIN- A. Microsoft
VERTER IC
B. Oracle
A. 7404
C. Apple
B. 7408
D. IBM
C. 7402
D. 7400 237. use ultraviolet light is used to erase
A. RAM
232. use electrical charge is used to erase
data. B. ROM
A. RAM C. PROM
B. ROM D. EPROM

1.3 Computer architecture

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 34

1. Why are active RFID tags larger than pas- 7. The register used as a working area in CPU
sive tags? is
A. They contain a battery A. Program Counter
B. THey are a better design B. Instruction Register
C. They requrie a larger ariel C. Instruction Decoder
D. They are older technology D. Accumualtor
2. Half Adder is an combinational circuit that 8. Read the statement below and select the

NARAYAN CHANGDER
performs the arithematic addition of correct response.This is used as extra stor-
number of bits age when the main memory ( RAM ) is
A. 3 full.
B. 2 A. Level 1 Cache
C. 1 B. ROM
D. Any C. Level 2 Cache
D. Virtual Memory
3. Where do modern PCs store CMOS set-
tings? 9. Connection lines that connect the internal
A. .BIOS parts of the microprocessor chips is called
B. Flash ROM A. Wires
C. NVRAM B. Integrated circuits
D. Southbridge C. Bus
D. Electric signals
4. USB is an example of a unit
A. Input 10. What should I add to increase the perfor-
mance of my computer?
B. Storage
A. a faster battery
C. Display
B. add more ROM
D. Output
C. add more RAM
5. Which register holds the data fetched from D. add a bigger hard drive
the main memory?
A. MAR 11. Dynamic pipeline allows
B. MDR A. .Only stream line connection
C. PC B. function to evaluate
D. CIR C. Multiples functions to evaluate
D. To perform fixed function
6. From what location are the first computer
instruction available on boot up 12. Which one is Primary Memory
A. boot.in A. RAM
B. CPU B. ROM
C. config.sys C. Both
D. ROM BIOS D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 35

13. Computer component which is fastest is C. Total Attempt / Number of Misses


A. RAM D. Total Attempt / Number of Hits

PRACTICE BOOK» NOT FOR SALE


B. Register 19. More RAM allows us to
C. Cache A. Crash our PC
D. hard disk B. Install programs
C. Run more programs at one time
14. You just deleted a shortcut to an important
work presentation. What happened to the D. None of the above
data in the presentation? 20. Choose the correct Answer1. Can AND and
A. Nothing OR gates have >2 inputs2. Can NOT gate
B. It’s in the Recycle Bin/Trash have only one input
A. Only 1 is True
C. It’s deleted
B. Only 2 is True
D. It’s in the recovery partition
C. Both 1 and 2 are True
15. The memory implemented using the semi- D. None of them are True
conductor chips is
21. When we use the reservation station and
A. Cache
Tomasulo’s scheme, instruction execution
B. Main is divided onto:
C. Secondary A. Five steps like using standard pipeline
D. Registers
B. Three steps:Issue, Execute, Write Re-
16. ‘C’ in CPU denotes(SBI PO 2011) sult
A. Computer C. Four steps:Fetch, Decode, Execute,
B. Central Write Result
C. Common D. No correct answer

D. Circuitry 22. Which of these statements about Von Neu-


mann architecture is true?
17. What is the difference between Harvard A. Only data is stored in primary memory
and Von Neumann?
A. Harvard has separate stores for data B. Only instructions are stored in primary
and memory, VN does not memory
B. Processing capacity; VN is faster C. Data and instructions are both stored
C. VN has separate stores for data and in primary memory
memory, Harvard does not D. none of above
D. Processing capacity; Harvard is faster 23. What can effect the running of the CPU?
18. The formula to calculate the Miss Rate is A. How much RAM there is
B. How quick the programs are
A. Number of Hits / Total Attempt C. How big the hard drive is
B. Number of misses / Total Attempt D. What hardware is attached

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 36

24. Which of the following is FALSE about the 29. In a computer RAM stands for
fetch process? A. Readily available memory
A. PC contains the address of the next in- B. read and more memory
struction.
C. Random Access memory
B. The contents of PC is copied to MDR.
D. remember all memory
C. The address of PC is incremented to 1
to fetch the next instruction. 30. If the instruction, Add R1, R2, R3 is exe-
cuted in a system that is pipe-lined, then

NARAYAN CHANGDER
D. none of above
the value of S is (Where S is a term of the
25. addressing mode is most suitable to Basic performance equation)?
change the normal sequence of execution A. 3
of instructions.
B. 2
A. Relative C. 1
B. Indirect D. 6
C. Index with Offset
31. What is the location of the internal regis-
D. Immediate ters of CPU?
26. This sends signals such as “I/O Read” A. Internal
A. Control Unit B. On-chip
B. Arithmetic Logic Unit C. External
C. Accumulator D. Motherboard
D. Cache 32. Which if the following is not a function of
an operating system?
27. Consider a direct mapped cache with block
size 4 KB. The size of main memory is 16 A. interface between the user and the ma-
GB and there are 10 bits in the tag. Find chine
the number of bits in physical address. B. coordinate software applications
A. 34 bits C. coordinate hardware components
B. 32 bits D. monitor system health
C. 16 bits 33. ROM has the capability to perform
D. 8 bits A. Write operation only
28. Consider a direct mapped cache of size B. Read operation only
32KB with block size 32 bytes. The CPU C. Both write and read operation
generates 32 bit addresses. The number
D. Erase operation
of bits needed for cache indexing and the
number of tag bits respectively are .( 34. What component holds the address of the
GATE 2005 ) next instruction (7-9)
A. 10, 17 A. Memory Address Register
B. 10, 22 B. Memory Data Register
C. 15, 17 C. Program Counter
D. 5, 15 D. Accumulator

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 37

35. In general, the have the smallest bit A. Improving the IC technology of the
size and the have the largest. logic circuits

PRACTICE BOOK» NOT FOR SALE


A. EEPROMs, Flash B. Reducing the amount of processing
done in one step
B. SRAM, mask ROM
C. By using the overclocking method
C. DRAM, PROM
D. All of the mentioned
D. mask ROM, SRAM
41. People are;
36. When power is supplied to the system
then to maintain data with the life of bat- A. instructions that control processing
tery, computer BIOS contains the follow- B. individual facts input into a system
ing. C. software not fully understood by most
A. CPU users
B. RAM D. users of a system
C. CMOS 42. Data and Instructions in use are stored in
D. DRAM the
A. Processor
37. The register which holds the address of the
location to or from which data are to be B. Embedded System
transferred is called C. Hard Disk Drive
A. Index Register D. Main Memory
B. Instruction Register 43. Which of these is one type of register?
C. Memory Address Register A. Program counter
D. Memory Data Register B. HLL counter

38. carries signals relating to addresses be- C. RAM


tween processor and memory D. ROM
A. MAR 44. Sends data between the processor, the
B. MDR memory unit and the I/O devices
C. address bus A. address bus
D. data bus B. data bus
C. MAR
39. Which of the following is NOT an operat-
ing system? D. MDR

A. Windows 45. What is the purpose of the memory ad-


dress register?
B. IOS
A. It memorises everything
C. Android
B. It hold address of next memory loca-
D. Adobe Photoshop
tion
40. The clock rate of the processor can be im- C. It holds address of data item to be re-
proved by trieved from memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 38

D. it holds the data to be decoded in the 51. The register that points to the next instruc-
next cycle tion in the fetch execute cycle
46. Which Register would be first to be ac- A. MAR
cessed during the Fetch-Decode-Execute B. PC
cycle? C. MDR
A. PC D. Accumulator
B. MAR
52. What are the utilities is an OS called that

NARAYAN CHANGDER
C. MDR enable programs such as a screen reader?
D. CIR A. Accessibility options
47. control unit determines the address of the B. Reading options
next instruction be executed and loads it C. User options
into the program counter.
D. User account settings
A. Instruction Interpretation
53. Which one is a difference between Cache
B. Instruction regulation
and RAM?
C. Instruction composition
A. Cache is nearer to the CPU than RAM
D. Instruction sequencing
B. Cache is slower than RAM
48. What is the name of the unit that store C. Cache is cheaper than RAM than RAM
instructions and data during the Fetch-
D. None of the above
Execute Cycle?
A. Control unit 54. Magnetic disks contained on a hard drive
are called:
B. Registers
A. blocks
C. Arithmetic unit
B. platters
D. Logic unit
C. cylinders
49. All the arithematic and logical operations
D. none of above
in CPU are performed by
A. ALU 55. Which of the following is a component of
the CPU?
B. CU
A. Arithmetic and logic unit
C. Both ALU and CU
B. Control Unit
D. none of above
C. Cache memory
50. The device which is used to connect a pe- D. All of the above
ripheral to bus is called . Control register
B. Interface C. Communication protocol D. 56. The simplified form of the expression
None of these AB+ABC’ is
A. Control Register A. AB
B. Interface B. A(B+C)’
C. Communication Protocol C. A(B+C)
D. None of these D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 39

57. Used to carry the address to which the B. ARM9TDMI


data is being transmitted.
C. ARM10TDMI

PRACTICE BOOK» NOT FOR SALE


A. Data Bus
D. none of above
B. Address bus
C. Control Bus 63. The part of a processor in which instruc-
tions are executed is known as?
D. none of above
A. Core
58. In ARM Processor, Data Bus is bit and
Address Bus is Bits B. Centre

A. 16, 32 C. Execution
B. 32, 32 D. Instruction Centre
C. 32, 16 64. The address bus is
D. 16, 16
A. Uni-directional and controlled by the
59. Carries the addresses of data between the CPU
processor and memory B. Bi-directional and controlled by the
A. Address bus CPU
B. Data bus C. Uni-directional and controlled by the
C. Control bus memory

D. System bus D. Uni-directional and controlled by the


memory
60. What does the CU do?
A. controls the flow of data within the 65. Which of these happens in the Execute
CPU stage?

B. It controls the input and output of data A. The Program Counter is incremented
so that the signals go to the right place at by 1
the right time B. The value in the Current Instruction
C. It controls and monitors the hardware Register is decoded
attached to the system C. The value in the Accumulator is stored
D. All of the above in memory

61. In which register is the instruction decoded D. The data at the address in the Program
during the decode process? Counter is fetched from memory
A. PC 66. State True or False.1. “MOVE Y, A” is a
B. MDR two address instruction.2. “MUL T, D, E”
is a three address instruction.
C. CIR
D. MAR A. 1-True, 2-False
B. 1-False, 2-True
62. is the highest performance ARM Pro-
cessor C. 1-False, 2-False
A. ARM7TDMI D. 1-True, 2-True

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 40

67. During the second stage of FDE cycle car- 72. ROM stands for
ried out by the CPU.Once the instruction A. Read Only Memory
has been fetched, the CPU will need to un-
derstand the instruction to action it.This is B. Read On Memory
called C. Roam On Monday
A. Fetches D. None of these
B. Decodes 73. Amdhal Law says that(software ap-
proach)

NARAYAN CHANGDER
C. Executes
D. Runs A. Speedup is limited by parallel fraction
of the program
68. The Central Processing Unit or CPU con-
B. There are no any speedup limitation
tains two sub-Components which are
C. Speedup increase linearly with the
A. Main memory & Bus number of used proccessors
B. The Arithmetic/Logic Unit (ALU) and D. No correct answer
the control unit (CU)
C. Input & Output Devices 74. Which of the following is not part of the
CPU?
D. none of above
A. ALU
69. Choose the correct word to complete B. CU
this sentence:“Using addressing, the
C. MAR
operand holds the memory address of the
value to be operated on” D. ROM
A. Immediate 75. Which of the following would not be con-
B. Direct sidered metadata for a spreadsheet file?
C. Indexed A. Read-only attribute
D. Indirect B. Calculation inside the file
C. Name of the file
70. Which storage device stores data using
magnetic technology? D. Full size

A. Solid state 76. Which of these processors are specifically


B. Internal Hard disk made for gaming?

C. USB A. Intel core 2 duo


B. AMD Ryzen 9 3990GE
D. External hard disk
C. Intel celeron dual core
71. Firmware in which software and hardware
D. AMD A6 1200
are integrated on a circuit board is often
used in what type of system? 77. ARM processor has total registers
A. Point of Sales System A. 16
B. Desktop System B. 24
C. Embedded System C. 32
D. Operating System D. 37

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 41

78. RTN stands for 84. What is a bus?


A. Register Transfer Notation A. A circuit that connect one part of CPU

PRACTICE BOOK» NOT FOR SALE


B. Register Transmission Notation to other components.
C. Regular Transmission Notation B. A type of long term memory
D. Regular Transfer Notation C. A type of permanent memory

79. Program counter contain D. A method of transport

A. Address of program count 85. One of the dedicated registers in the pro-
B. Address of the next instruction to be cessor that holds the location of where
fetched data will be read or written to as the re-
sult of an operation is called the
C. Program pointer
A. Memory Address Register
D. IR pointer
B. Memory Buffer Register
80. Ways in which addresses gets specified by
instructions, called C. Current Instruction Register

A. Addressing modes D. Program Counter


B. Registers 86. contains the registers, including ALU (al-
C. Data mode lows arithmetic) and logic (AND, NOT, OR
etc.)
D. Memory mode
A. control unit
81. If a system is 64 bit machine, then the
length of each word will be B. memory

A. 4 bytes C. processor
B. 8 bytes D. interrupt
C. 16 bytes 87. Shields computer from harm
D. 12 bytes A. email virus
82. Computer bus line consists of B. Software virus
A. Registers C. Trojan horse
B. accumulators D. Anti-virus software
C. Set of parallel lines
88. Memory Data Register (MDR)
D. Computer clock
A. Stores the address of the next instruc-
83. Gustafson Law’s (speedup) says that: tion in memory
A. Speedup is limited by sequential frac- B. Stores the address of where the next
tion of the program item will be fetched from
B. There are no any speedup limitation C. Stores data fetched from memory, or
C. Speedup increase linearly with the waiting to be stored in memory
numbers of used processors D. Stores the result of arithmetic calcula-
D. No correct answer tions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 42

89. how many visible register are there C. CPU Soft menu
A. 23 visible register D. Power management Setup
B. 20 invisible register 95. The physical component of a computer
C. 32 visible register which we can see and touch is known as
D. 44 visible register
A. Software
90. If a processor clock is rated as 1250 mil- B. Hardware

NARAYAN CHANGDER
lion cycles per second, then its clock period
is C. Data

A. 1.9 * 10-10 sec D. Information

B. 1.6 * 10-9 sec 96. When a computer is first powered up, the
initiating programs are loaded into mem-
C. 1.25 * 10-10 sec
ory from the chip.
D. 8 * 10-10 sec
A. RAM
91. Little Endian byte order puts byte having B. ROM
address? x . . . x000? at the C. Cache
A. Least significant position D. none of above
B. Middle significant position
97. What was Von Neumanns first name?
C. Most significant position
A. Terry
D. Both a and b
B. Adam
92. The instructions are transferred from the C. John
main memory and stored temporarily in D. Philip
small memories within the CPU called reg-
isters. 98. In a six-stage pipeline assuming that there
A. Executing of instructions are no branch instructions. If we want to
execute 15 instructions. What is the time
B. Decoding of instructions required to execute these instructions?
C. Storing of results A. 15
D. Fetching of instructions B. 20
93. The decoded instruction is stored in C. 21
A. IR D. 19

B. PC 99. What are 3 types of registers in CPU


C. Registers A. Program Counter Register, Instruction
Register, Status Register
D. MDR
B. Program State Register, Instruction
94. From where can the boot option be se- Register, Status Register
lected?
C. Program State Register, Instruction
A. Advanced BIOS Features Register, Flag Register
B. Advanced Chipset Features D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 43

100. Mobile Phone and Digital Camera uses C. high-level languages


A. Arduino D. flowcharts

PRACTICE BOOK» NOT FOR SALE


B. Raspberry pi 106. Which one below RAID level is better in
C. ARM Processor term of dependency?
D. AVR Controller A. RAID 0
B. RAID 1
101. The addressing mode, where you directly
C. RAID 2
specify the operand value is
D. RAID 5
A. Immediate
B. Direct 107. In which mapping technique, a main mem-
ory block can reside in any available cache
C. Definite line.
D. Relative A. Indirect
102. The most frequently usedinstructions of a B. Associative
computer program are likely to be fetched C. Direct
from(PNB PO 2008) D. Set associative
A. Hard disk
108. What is held in ROM?
B. Cache memory A. Operating System
C. RAM B. Data currently in use
D. ROM C. Bootstrap Loader
103. Linux us defined as a , which is also D. Instructions frequently used
the core of an operating system. 109. During the third stage of FDE cycle car-
A. Distribution ried out by the CPU.When the instruction
has been decoded, the CPU can carry out
B. Version
the action that is needed. This is called
C. Kernel the instruction.
D. Shell A. Fetches
104. What is an embedded system? B. Decodes

A. A system that has many processors C. Executes


D. Runs
B. A computer designed to perform more
than one task 110. Using arithmetic means of execution
C. A small computer that forms part of a times,
larger system A. we can easily predict the execution
D. none of above time
B. we cannot predict the execution time
105. Machine code was the fitst coding lan-
C. depending on the workload, some-
guage used, this next progressed to using
times we can predict the execution time
A. mnemonics and sometimes not
B. pseudocode D. no correct answer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 44

111. During the normal PC boot process, which B. MDR


of the following is active first?
C. Accumulator
A. RAM BIOS
D. Program Counter
B. CMOS
C. ROM BIOS 117. Which register stores the intermediate
arithmetic and logic results in a CPU?
D. Hard disk information
A. MDR

NARAYAN CHANGDER
112. The stages required for processing are
B. AC
known as the
C. PC
A. Fetch-Execute-decode
B. Process-decode-fetch D. CIR

C. Fetch-Decode-Execute 118. Which type of ROM can be erased by UV


D. Process light?
A. ROM
113. What kind of pen should you always
have available? B. mask ROM
A. dry erase C. EPROM
B. blue/black ink pen D. EEPROM
C. pencil
119. The device that connects various com-
D. permanent marker puter components
114. CPU can directly understand this lan- A. Memory
guage
B. Bus
A. C
C. Hard Disk
B. Assembly language
D. I/O Module
C. Machine language
D. JAVA 120. The law which gives importance to the
order of execution is
115. The control unit
A. Commutative Law
A. Controls the flow of data around the
CPU and also decodes instructions B. De Morgan’s Law

B. Only controls the flow of data around C. Order Law


the CPU D. Associative Law
C. Only decodes instructions
121. Data are read and written in contiguous
D. Controls how much power is directed blocks called
to all components within the computer
A. logical records
116. b Which register is being described?
B. virtual records
Stores the results of the calculations done
by the ALU C. physical records
A. MAR D. memory records

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 45

122. The 9’s complement of 381 is A. CPU


A. 355 B. MMU

PRACTICE BOOK» NOT FOR SALE


B. 508 C. Logical cache
C. 618 D. physical cache
D. 390 128. A bus used to support local disk drives
123. What it means that the cache is set asso- and other peripherals
ciative? A. Local bus
A. It means that each block has only one B. cache controller
place it can appear in the cache C. Expansion bus
B. It means that block can be placed in a D. SCSI
restricted set of places in the cache
129. The computer uses the to store tem-
C. It means that block can be placed any-
porary information that is being created
where in the cache
and used by open programs
D. No correct answer
A. RAM
124. Von Neumann was a B. ROM
A. Programmer C. Hard Disk
B. Mathematician D. CPU
C. Physicist
130. This would perform an operation such as
D. Artist 5+8
125. The CPU addressing mode (with an in- A. Control Unit
struction) where you place the memory ad- B. Arithmetic Logic Unit
dress to be operated on is called
C. Cache
A. Direct addressing
D. Accumulator
B. Immediate addressing
131. Which of the following bus systems is
C. Indirect addressing
used to designate the source or destination
D. Sequential addressing of the data on the bus itself?
126. Carries out the calculations and logical de- A. control bus
cisions. The results of its calculations are B. data bus
stored in the accumulator. C. address bus
A. CPU D. system bus
B. Control Unit
132. What is the purpose of the Memory Data
C. Arithmetic and Logic Unit Register (MDR)?
D. Memory Address Register A. Holds data read from memory to be de-
127. Which of the following component trans- coded
lates logical address into a physical ad- B. Hold the location of memory to use in
dress in main memory. fetch cycle

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 46

C. Holds next memory address to be pro- C. Instruction Decoder


cessed D. Accumualtor
D. It does nothing
139. This holds the number of the current in-
133. value of PC incremented by 1The above struction being worked on
is part of.. A. Memory Address Register
A. fetch B. Program Counter
B. decode C. Memory Data Register

NARAYAN CHANGDER
C. execute D. Accumulator
D. none of above 140. Microprocessors can be used to make(SBI
134. The O in ROM stands for Clerk 2009)
A. Computer
A. One
B. digital system
B. Open
C. Calculators
C. Only
D. All of these
D. Often
141. The mathematical calculation component
135. Which is not part of a hard disk drive? internal to the processor is called the
A. Spindle A. Arithmetic Logic Unit
B. Platter B. Calculator
C. Read/write head C. Arithmetic Calculus Module
D. Valve D. Mathematical Logic System
136. Width of object like a double-word will 142. Each instruction in ARM machines is en-
be having a size of coded into Word
A. 2 bytes A. 2 byte
B. 4 bytes B. 3 byte
C. 7 bytes C. 4 byte
D. 8 bytes D. 8 byte

137. This DOESN’T happen during the Fetch 143. Processors have a speed measured in
part of the cycle A. Hertz
A. Address Bus is used B. Bits
B. Program Counter increments by one C. Bytes
C. Arithmetic operations are performed D. Seconds
D. Main Memory is addressed 144. Boot Strap process is
138. The register used as memory for the ALU A. Load system files to RAM
is B. Checks the computer connections
A. Program Counter C. Clean up the computer memory
B. Instruction Register D. Prepare the computer ready

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 47

145. In ARM Processor, Operating system 151. Which type of addressing mode is used
runs in inStore R3, SUM

PRACTICE BOOK» NOT FOR SALE


A. Privileged mode A. Index mode
B. Non Privileged mode
B. Immediate mode
C. Protected mode
C. Absolute mode
D. Virtual mode
D. Register indirect mode
146. it’s job is to perform arithmetic and
logic operations on data and 152. How is memory accessed in RISC architec-
A. The Arithmetic/Logic Unit(ALU) ture?
B. Bus A. load and store instruction
C. Input Device B. opcode instruction
D. none of above
C. memory instruction
147. The instruction execution flow in the
D. bus instruction
pipeline processor is represented by
A. Flow chart 153. WHAT IS THE SOCKET OF AMD “AMD
B. Data flow diagram RYZEN 3”
C. Time space diagram A. LGA 775
D. .Reservation table B. AM4
148. is a technique used to make a proces- C. FM2+
sor work at a faster speed than its original
specification. D. LGA 1151
A. overclocking
154. decoded instruction passed as a set of
B. throttling control signals to appropriate components
C. super clock of the computer systemThe above is part
of
D. multicore
A. fetch
149. Which one of the following is the small-
est memory? B. decode
A. Main Memory C. execute
B. Cache D. none of above
C. Registers
D. External Memory 155. The output that is obtained, on the screen
is called as
150. ROM and RAM are both
A. VDU
A. Types of Memory
B. Hard copy
B. Types of Computer
C. Types of Food C. Soft copy
D. Types of Work D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 48

156. The two phases of executing an instruc- 161. The bus used to connect the monitor to
tion are the CPU is
A. Instruction decoding and storage A. PCI bus
B. Instruction fetch and instruction exe- B. SCSI bus
cution C. Memory bus
C. Instruction execution and storage D. Rambus
D. Instruction fetch and Instruction pro- 162. Size of the memory mainly depends

NARAYAN CHANGDER
cessing on the size of the address bus.
A. Main
157. Which of below is not a category in RAID
Levels? B. Virtual

A. Independent Access C. Secondary


D. Cache
B. Software Polling
C. Parallel Access 163. A single 1-0 transmission is referd as
A. clock pulse
D. Stripping
B. clock synchronous
158. It acts as a temporary storage area that C. clock cycle
the computer’s processor can retrieve data
from easily. This statement refers to D. clock rate

A. Control Unit 164. The PROM is more effective than ROM


chips in regard to
B. Cache
A. Cost
C. Cookies
B. Memory management
D. none of above C. Speed of operation
159. Who developed the basic architecture of D. Both Cost and Speed of operation
computer? 165. The computer uses the to start the
A. Blaise Pascal computer and launch the operating system
B. Charles Babbage A. RAM

C. John Von Neumann B. BIOS


C. HDD
D. None of the above
D. DVD
160. Which of the following is a job of the con-
166. The ultimate goal of a compiler is to
trol unit?
A. Reduce the clock cycles for a program-
A. To start up the computer
ming task
B. To manage the fetch decode execute B. Reduce the size of the object code
cycle
C. Be versatile
C. To create presentations
D. Be able to detect even the smallest of
D. To carry out calcul errors

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 49

167. Which is bigger? 173. L2 cache is slower and larger than L1


A. 12Mb cache .

PRACTICE BOOK» NOT FOR SALE


B. 12MB A. True
C. 12GB B. false
D. 12TB C. all are true
D. ambiguous
168. While using the iterative construct
(Branching) in execution instruction 174. Fred, a co-worker, heard about new soft-
is used to check the condition. ware called Lollipop. Which operating sys-
A. TestAndSet tem is the referring to?
B. Branch A. iOS
C. TestCondn B. OS X
D. None of the mentioned C. Android

169. Which type of data hazard is not possi- D. Chrome OS


ble? 175. Carries address of the next instruction
A. WAR that will be fetched
B. WAW A. Address Bus
C. RAR B. Data Bus
D. RAW C. Control Bus
170. The address space in ARM is D. System Bus
A. 224 176. Which of the following is true?
B. 264 A. Cache capacity is higher than RAM’s.
C. 216 B. Cache cannot be changed; RAM can.
D. 232 C. Cache capacity is less than RAM.
171. What could cause a fixed disk error? D. Cache cannot store the more fre-
A. No-CD installed quently used instructions.
B. Bad RAM 177. Which one below RAID level is better for
C. Slow processor backup disk?
D. Incorrect CMOS settings A. RAID 0
B. RAID 1
172. The main advantage of multiple bus or-
ganisation over a single bus is C. RAID 2
A. Reduction in the number of cycles for D. RAID 3
execution
178. Which statement is FALSE about static
B. Increase in size of the registers random access memory (SRAM)
C. Better Connectivity A. Faster than DRAM and more expensive
D. None of the mentioned than DR AM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 50

B. Frequently small amount used in cache C. To make sure that the CPU runs prop-
memory for high-speed access used erly.
C. Non Volatile D. To make the CPU faster.
D. none of above
184. When the CPU fetches data it makes use
179. The communication line between CPU of a vital path called?
memory and peripherals is called a A. The Address walk
(UBI Clerk 2011)

NARAYAN CHANGDER
B. The Address Bus
A. Bus
C. The bus
B. line
D. The address plane
C. media
185. The memory on the processor chip is
D. All the above
called:
180. What is the purpose of the accumulator? A. RAM
(4-6)
B. Hard Disk
A. To perform arithmetic operations
C. Cache
B. To hold the results of a calculation
D. Floppy Disk
C. To hold the accumulation of instruc-
tions that have happened 186. What is this process called:The CPU
D. none of above makes sense of the instruction it has just
fetched.
181. means current data or instruction that A. Decode
is being fetched may be needed soon.
B. Execute
A. Temporal Locality
C. Process
B. Spatial Locality
D. Fetch
C. Memory Reference
D. Space Reference 187. In K-MAP the simplified version of F(A, B,
C, D) = Σ (8, 9, 10, 11) is
182. The main advantage of semiconductor
A. A’B’
RAM is its ability to:
B. A’B
A. retain stored data when power is inter-
rupted or turned off C. AB
B. be written to and read from rapidly D. AB’
C. be randomly accessed 188. Which register stores the address which
D. be sequentially accessed data will be fetched from?
A. MAR
183. What are registers used for?
B. MDR
A. To check that students are in school.
B. To temporarily hold bits of data C. PC
needed by the CPU. D. CIR

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 51

189. The processor is connected to the main C. A tri-directional path between internal
memory and other internal computer com- components
ponents. They are the

PRACTICE BOOK» NOT FOR SALE


D. A bi-directional buffer between inter-
A. Address, Data and control buses nal components
B. Address, input and control buses 195. Which one is an example of flash mem-
C. Address, Data and output buses ory?
D. Input, output and control buses A. SD Card
B. RAM
190. How many locations in a memory if size
of the address is 8 bits C. ROM
A. 16 locations D. Cache
B. 64 locations 196. During boot-up, the memory test:
C. 256 locations A. Is a superfluous step that should be ig-
D. none of above nored
B. Checks and verifies that contiguous
191. Find the odd one out memory is installed
A. BCD C. Is an operational error
B. XS3 D. Displays what memory is installed, but
C. Gray Code nothing else
D. Parity Bit 197. A processor performing fetch or decoding
of different instruction during the execu-
192. Which type of addressing mode is used
tion of another instruction is called
inLoad R2, 1000(R5)
A. Super-scaling
A. Index mode
B. Pipe-lining
B. Immediate mode
C. Parallel Computation
C. Absolute mode
D. None of the mentioned
D. Register mode
198. What is a mnemonic?
193. Which type of data transfer is not al-
A. A binary machine code instruction
lowed in interconnection structures
B. A memory address
A. Memory to processor
C. A meaningful abbreviation used in as-
B. Memory to memory
sembly language
C. I/O to processor
D. none of above
D. Processor to I/O
199. PerformanceX = 1/ Execution Time x
194. The data bus is given relation shows that
A. A bi-directional path between internal A. Performance is increased when execu-
components tion time is decreased
B. A uni-directional path between inter- B. Performance is increased when execu-
nal components tion time is increased

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 52

C. Performance is decreased when exe- C. MSI


cution time is decreased
D. ASUS
D. None
205. During the transfer of data between the
200. The PC increments to point to the next processor and memory we use
instruction at which point?
A. Cache
A. Once the current instruction has been
fetched B. TLB

NARAYAN CHANGDER
B. Once the current instruction has been C. Buffers
decoded D. Registers
C. Once the current instruction has been
executed 206. The is software that supports a com-
puter’s basic functions, such as scheduling
D. It doesn’t point to the next instruction tasks and executing applications
201. The instruction, Add Loc, R1 in RTN is A. Operating System
A. Add SetCC Loc+R1 B. Hard Drive
B. R1=Loc+R1 C. RAM
C. Not possible to write in RTN D. ROM
D. R1<-[Loc]+[R1]
207. Define CPU
202. Carries control signals/commands from
A. Ears of the Computer
the CPU (and status signals from other de-
vices) in order to control and coordinate all B. Body of the Computer
the activities within the computer
C. Nose of the Computer
A. Address bus
D. Brain of the Computer
B. Data bus
C. Control bus 208. An address bus contains 16 lines. How
many possible address locations are
D. System bus there?
203. Signal from hardware or software indi- A. 16
cating that an event has occurred or that a
B. 32
process needs attention
C. 65, 536
A. polling
D. 512
B. interrupt
C. buffer 209. are numbers and encoded characters,
D. CIR generally used as operands.
A. Input
204. Which company makes cheap and good
processors B. Data
A. Intel C. Information
B. AMD D. Stored Values

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 53

210. How many bits are in a single byte? 216. During the first stage of FDE cycle carried
A. 4 out by the CPU.The CPU an instruction
from main memory (RAM or Cache Mem-

PRACTICE BOOK» NOT FOR SALE


B. 8 ory)
C. 12
A. Fetches
D. 16
B. Decodes
211. The expression delayed load is used in
C. Executes
the context of
A. Processor-printer communication D. Runs

B. Memory-monitor communication 217. The main virtue for using single Bus struc-
C. Pipelining ture is
D. None of these A. Fast data transfers
212. The addressing mode which makes use of B. Cost effective connectivity and speed
in-direction pointers is C. Cost effective connectivity and ease of
A. Indirect addressing mode attaching peripheral devices
B. Index addressing mode D. None of the mentioned
C. Relative addressing mode
218. What is the meaning of Volatile mem-
D. Offset addressing mode ory?
213. VLSI stands for A. If it is powered off, it loses its data
A. Very Large Scale Integration B. It holds its data regardless of power
B. Very Large Stand-alone Integration
C. None of the above
C. Volatile Layer System Interface
D. none of above
D. None of the mentioned
214. Which among the foloowing is/are NOT 219. Which of the following is not a way to
correct open the Start menu on a Windows-based
computer?
A. X + 0 = X
A. Ctrl+S
B. X . 1 = X
B. Ctrl+Esc
C. 1 + X = 1
D. 0 . X = X C. Click the Start button
D. Press the Start key on the keyboard
215. The memory which is used to store the
copy of data or instructions stored in
220. What is a graphics card?
larger memories, inside the CPU is called
A. A monitor
A. Level 1 cache B. Speeds up processor
B. Level 2 cache C. Its a card that shows pixels on a mon-
C. Registers itor
D. TLB D. A piece a junk

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 54

221. cWhat part of the CPU is being de- 227. Computers are binary machines, instruc-
scribed.Executes instructions and controls tions are, sequences
the flow of data
A. Decimal
A. ALU
B. Binary
B. Control Unit
C. Images
C. Cache
D. Text
D. none of above

NARAYAN CHANGDER
222. Which one of the bus is bidirectional? 228. What kind of coding will NOT be covered
in this class?
A. Address bus
A. Java Script
B. Data bus
B. Google Apps Script
C. Memory bus
D. All the above C. Python
D. Scratch
223. RAM stands for
A. Rapid Access Memory 229. PCIe provides lower latency and higher
B. Random Awareness Memory data transfer rates than busses such
as PCI and PCI-X.
C. Rapid Awareness Memory
A. serial
D. Random Access Memory
B. parallel
224. Carries signals relating to addresses be-
tween the processors and the memory. C. integrated

A. Address bus D. synchronous


B. Data bus 230. The von Neumann architecture stores
C. Control bus data and program code in the same inter-
D. none of above nal memory. There is another architecture
that stores data and program code in sep-
225. What is the job of the control unit? arate memories. What is this architecture
A. It carries out calculations called?

B. It stores information. A. Harvard


C. It does nothing. B. Hartford
D. It controls the input and output of data C. Hacienda
to make sure that it gets to the right place. D. Haiku
226. Which of the following memories below
is often used in typical computer opera- 231. An 24 bit address generates an address
tion? space of locations.

A. FDD A. 1024
B. HDD B. 4096
C. DRAM C. 248
D. None of these D. 16, 777, 216

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 55

232. Which bus makes bridge between proces- B. Memory Buffer Register
sor and external peripheral through cache C. Accumulator
controller

PRACTICE BOOK» NOT FOR SALE


D. Program Counter
A. Expansion bus
B. Memory bus 238. What is the purpose of Cache?
C. high speed bus A. Performs Arithmetic and Logical oper-
ations
D. Local bus
B. Decodes and directs instructions to be
233. What acts as an intermediary between carried out
the processor and the Main Memory?
C. Stores frequently used data and in-
A. Clock structions
B. Cache D. Processes graphical functions
C. Bus
239. What is a system bus?
D. User
A. A circuit that connect one part of CPU
234. You are going to purchase a new iPhone. to other components.
Which operating system will be instead on B. A type of long term memory
it?
C. A type of permanent memory
A. iOS
D. A type of public transport that’s always
B. OS X late
C. iPhone OS
240. In the following indexed addressing
D. ion know mode instruction, MOV 5(R1), LOC the ef-
fective address is
235. What is a classroom supply that you
should have everyday? A. EA = 5+R1
A. Folder with pockets B. EA = R1
B. Crayons C. EA = [R1]
C. Calculator D. EA = 5+[R1]
D. Ruler 241. On which OS would you use the
Ctrl+Window Switcher key to create a
236. Current day processors function using
screen capture?
three main operations. In order they are
A. Windows
A. Fetch, decode and execute
B. Execute, fetch and decode B. Linux

C. Clear, Fetch and execute C. Mac OS X

D. Fetch, assemble and execute D. Chrome OS

237. Which of the following registers holds 242. In the case of, Zero-address instruction
the intermediate arithmetic and logic re- method the operands are stored in
sults. A. Registers
A. Memory Address Register B. Accumulators

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 56

C. Push down stack 248. If computer A execute a program in 10


D. Cache seconds and computer B runs same in 15
seconds, how much faster is computer A
243. Can you perform an addition on three than computer B
operands simultaneously in ALU using Add A. 1.4 times
instruction? B. 1.5 times
A. Yes C. 1 time

NARAYAN CHANGDER
B. Not possible using Add, we’ve to use D. 5.1 times
AddSetCC
249. Memory Address Register (MAR)
C. Not permitted
A. Stores the address of the next instruc-
D. None of the mentioned tion in memory
244. What is the program counters job? B. Stores the address of where the next
item will be fetched from
A. To count the programs
C. Stores data fetched from memory, or
B. It contains the memory address of the waiting to be stored in memory
next instruction to be loaded
D. Stores the result of arithmetic calcula-
C. It stores instructions tions
D. It carries out the calculations 250. What does the control unit do?
245. The time interval between pulses is called A. It controls and monitors communica-
a . tions between the computer and any hard-
ware attached
A. clock cycle
B. It holds the data and programs that
B. clock pulse the CPU currently needs
C. processor interval C. It holds the data and programs that
D. control cycle the CPU currently needs
D. All of the above
246. What doesn’t affect the performance of
the computer 251. Which of the following file systems does
not have a built-in security?
A. Clock Speed
A. ext3
B. Number of Cores
B. ext4
C. The number of instructions in the pro-
gram C. FAT

D. Cache Size D. HFS


252. Simplified form of the boolean expres-
247. What is Cache memory? sion (X + Y + XY) (X + Z) is
A. memory that is stored on Hard Disk. A. X + Y + Z
B. very fast memory inside the CPU. B. XY + YZ
C. Random Access Memory C. X + YZ
D. none of above D. XZ + Y

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 57

253. The three steps to processing instructions 258. The time delay between two successive
given by a currently running program initiations of memory operation
A. Memory access time

PRACTICE BOOK» NOT FOR SALE


A. Fetch, decode, execute
B. Fetch, perform, operate B. Memory search time

C. Collect, decode, operate C. Memory cycle time


D. Instruction delay
D. Collect, analyse, execute
259. From the hard drive’s perspective, mov-
254. *Consider a direct mapped cache with ing a file is a analogous to which of the
block size 4 KB. The size of main memory following actions?
is 16 GB and there are 10 bits in the tag.
A. Copy and paste
Find the number of bits in line number.
B. Cut and paste
A. 16 bits
C. Delete and paste
B. 8 bits
D. Renaming
C. 12 bits
260. Windows, Icons, menus and Pointers are
D. 32 bits all part of this? (1-4)
255. One of the dedicated registers in the pro- A. Graphical User Interface
cessor that contains bits that are set and B. Command Line Interface
cleared depending on the result of an oper- C. Menu Interface
ation is called the
D. No User Interface
A. Status register
261. This doesn’t happen during the Decode /
B. Setting register Execute part of the cycle
C. Super register A. Current Instruction is held in the CIR
D. Sorting register B. Results are held in the Accumulator
C. Status Register updated
256. CCD sensors are used to read the inten-
sity of the light from a laser, to make an D. Instructions are transferred from
identical pattern in the computer memory. Main Memory
What does the acronym CCD stand for? 262. Stores the results of calculations made by
A. Charge-coupled device the ALU.
B. Current-coupled device A. Program Counter
C. Charge-created device B. Memory data register
C. Accumulator
D. Charge-coupled detector
D. Current Instruction register
257. MRU stands for
263. A in RAM stands for
A. Least Recently Used A. Access
B. Most Recently used B. Accessible
C. Random C. Against
D. First In First Out (FIFO) D. All

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 58

264. In ARM Thumb instruction are bit size C. 8080


A. 8 D. 8088
B. 16
270. What doesn’t affect the performance of
C. 32 the computer (1-4)
D. 64
A. Clock Speed
265. ARM core uses architecture B. Number of Cores

NARAYAN CHANGDER
A. CISC C. Cache Size
B. ARM is architecture neutral
D. The number of instructions in the pro-
C. RISC gram
D. none of others
271. The function of program counter (PC)
266. Firmware refers to holds
A. Any hardware that can’t easily break A. Temporary
B. A combination of hardware and soft- B. Address for Memory
ware
C. memory Operand
C. A type of software that is updated to
make a computer work better D. Address of Instruction
D. Hardware used in kitchens 272. The transfer between CPU and Cache is
267. What is a collection of wires called that
sends data and addresses around the A. Word transfer
CPU?
B. Block transfer
A. A bus
C. Set transfer
B. A connection
D. Associative transfer
C. A link
D. A cable 273. The main circuit board in a computer is
called the
268. What enables different parts of the CPU
to work on different tasks at the same A. RAM
time B. dongle
A. Hyper Threading C. motherboard
B. Multiplier D. power supply unit
C. Cores
274. This would reduce the number of mem-
D. Bus Speed
ory/processor transfers
269. Microprocessor 8085 is the enhanced ver- A. Arithmetic Logic Unit
sion of with essentially the same con-
struction set B. Control Unit
A. 4800 C. Accumulator
B. 6800 D. Cache

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 59

275. What is the name of the register that C. 32


stores the address of the next instruction D. 64
to be fetched?

PRACTICE BOOK» NOT FOR SALE


A. Program Counter 281. Generally is used to hold the data
temporarily.
B. Memory Address Register
C. Accumulator A. ROMs

D. Current Instruction Register B. EPROMs


C. Buffers
276. The stack pointer in the microprocessor is
a D. Magnetic disks
A. 16 bit register that points to stack 282. The provides information about hard-
memory locations ware installation, configuration and hard-
B. 32 bit accumulator ware status
C. memory location in the stack A. Device Manager
D. flag regsiter used for the stack B. Control panel
277. If a computer has a word length of 64 C. Add new hardware
bits, how many ASCII-encoded characters D. Program manager
can be stored in one word?
A. 2 283. Which of the following is an example of
‘main memory’.
B. 4
A. Hard Drive
C. 8
D. 1 B. USB Drive
C. RAM
278. An optimizing Compiler does
D. ROM
A. Better compilation of the given piece
of code 284. RISC stands for
B. Takes advantage of the type of proces- A. Restricted Instruction Sequencing
sor and reduces its process time Computer
C. Does better memory management B. Restricted Instruction Sequential Com-
D. None of the mentioned piler
279. Mouse is a device C. Reduced Instruction Set Computer
A. Processing D. Reduced Induction Set Computer
B. Output 285. which of these is a “stored program” Ar-
C. Display chitecture?
D. Input A. Von Neumann
280. How many bits in a Byte B. Harvard
A. 8 C. both
B. 16 D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 60

286. What does IPO model stand for? 292. What is the CU
A. Inputs, Processes, Outputs A. Central Unit
B. Ingenuity, Processes, Outputs B. Central Processing Unit
C. Inputs, Protocol, Output
C. Control Unit
D. Information, Processes, Outputs
D. Credit Union
287. The ALU performs what type of opera-
293. The banked registers are used for

NARAYAN CHANGDER
tions
A. Arithmetic A. Switching between supervisor and in-
B. Logical terrupt mode

C. Shift B. Extended storing


D. All of these three C. Same as other general purpose regis-
ters
288. Which one of these is a register used dur-
ing on going calculations D. None of the mentioned
A. MAR 294. When the used CT routing, total commu-
B. MDR nication time can be expressed by the fol-
C. Accumulator lowing equation (1-number of communica-
tion lines used, m-the size of the mes-
D. PC sage)
289. What is the function of a bus? A. tcomm = ts+(mtw+lh)l
A. Connects the components of a com- B. tcomm = ts + mtw + lh
puter
C. tcomm=(ts+mtw+lh)l
B. Transmits data, address and control
signals between the components of com- D. none of above
puter
295. With which of the following file systems
C. Both A and B
can you not rename a file when it’s open?
D. none of above
A. ext3
290. Are phones allowed in class?
B. ext4
A. Yes-Always
C. XFS
B. No-Never
D. NTFS
C. Sometimes-with teacher permission
D. none of above 296. When something is loaded from memory
where to you store the memory address?
291. The core of the operating systems is
A. The CIR
A. Unix
B. Kernel B. The MAR
C. Command.com C. The MDR
D. CHKDSK D. The ALU

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 61

297. How does clock speed affect computer B. Google Hangouts


performance?
C. Google Groups

PRACTICE BOOK» NOT FOR SALE


A. The higher the clock speed the slower
the computer will run. D. Google Drawings

B. It improves the amount you can store 303. Is this a valid example of the
on the computer. Input-Process-Output Model? In-
C. The higher the clock speed the better put:Scanning picture.Process:Editing the
the performance. picture.Output:Printed poster with pic-
ture.
D. It will make loading program slower
A. Yes.
298. What is the name of the unit in the CPU
that performs arithmetic and logic opera- B. No.
tions? C. I don’t know.
A. ALU
D. none of above
B. CU
C. MAR 304. Which chip contains the system BIOS and
can hold data permanently, even without
D. MDR
electricity?
299. When a processor attempts to read a A. Flash ROM
memory and is present in cache is called
B. NVRAM
A. cache copy
C. RAM
B. cache hit
C. cache miss D. ROM

D. write hit 305. The addressing mode/s, which uses the


300. What is the purpose of the accumulator? PC instead of a general purpose register is

A. To perform arithmetic operations


A. Indexed with offset
B. To hold the results of a calculation
B. Relative
C. To hold the accumulation of instruc-
tions that have happened C. Direct
D. none of above D. Both Indexed with offset and direct
301. What does the ALU do?
306. The control unit interprets the instruction
A. Logic operations stored in the instruction register, turning
B. Nothing it into a signal that can be understood by
the ALU.
C. Deletes calculations
A. Executing of instructions
D. none of above
B. Decoding of instructions
302. What program in the Google Suite will
you explore in course work this year? C. Storing of results
A. Google Expeditions D. Fetching of instructions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 62

307. Which architecture is best suited to stor- 312. If the RAM is upgraded from 512MB to
ing a program in read only memory (ROM) 4GB, what will be the biggest benefit?
A. Harvard A. The operating system will be faster
B. Von Neumann B. There will be more hard drive space
C. Both C. More programs and data can be
opened at the same time
D. none of above
D. The computer will be quicker if you

NARAYAN CHANGDER
308. What is the form of the boolean expres- open a document
sions AB+ B’C’ =Y?
313. Define ALU
A. Product-of-sums.
A. Perform anything that we ask the com-
B. Sum-of-products
puter to do
C. Karnaugh map
B. Performs basic arithmetic, logical, or
D. Matrix I/O operations

309. Accumulator C. Turns off the computer

A. Stores the address of the next instruc- D. Does not perform anything
tion in memory
314. A CPU which is able to carry out a
B. Stores the address of where the next thousand million instructions per seconds
item will be fetched from would have a clock speed of
C. Stores data fetched from memory, or A. 10GHz
waiting to be stored in memory
B. 1GHz
D. Stores the result of arithmetic calcula-
C. 100MHz
tions
D. 1000GHz
310. Solid state drives have no moving parts
and use what memory cells to store the 315. General purpose machines are based on
data? which architecture?
A. NAND A. Harvard
B. AND B. Von Neumann
C. NAN C. They can be either
D. EXOR D. none of above

311. In ROM BIOS, the acronym BIOS stands 316. When Performing a looping operation,
for: the instruction gets stored in the
A. Basic Intuitive Output Set A. Registers
B. Basic Input Organizational System B. Cache
C. Basic Input Output System C. System Heap
D. Basic Industry Operating System D. System stack

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 63

317. Which came out first? Intel core 2 duoOr- B. Stores the address of where the next
Intel pentium 4 item will be fetched from

PRACTICE BOOK» NOT FOR SALE


A. Intel core 2 duo C. Stores data fetched from memory, or
B. Intel Pentium 4 waiting to be stored in memory
C. Both came out at the same time D. Stores the result of arithmetic calcula-
D. I don’t know. tions

318. The instruction, Add #45, R1 does 323. When using Branching, the usual sequenc-
A. Adds the value of 45 to the address of ing of the PC is altered. A new instruction
R1 and stores 45 in that address is loaded which is called as
B. Adds 45 to the value of R1 and stores A. Branch target
it in R1 B. Loop target
C. Finds the memory location 45 and adds
C. Forward target
that content to that of R1
D. None of the mentioned D. Jump instruction

319. General purpose registers in the proces- 324. Which of the following is NOT one of the
sor are used for control lines?
A. storing data for arithmetic, logical or A. Read
shift operations
B. Amend
B. storing data permanently
C. storing output from the data bus, after C. NMI
being processed D. Reset
D. general purpose processing
325. What register is connected directly to the
320. What does “Secure” means? data bus?
A. Protected from danger or harm A. Memory Address Register
B. Protested by danger or harm
B. Memory Data Register
C. Presented with danger or harm
C. Program Counter
D. Provide information about computer
data D. Current Instruction Register

321. What does MAR stand for? 326. If the processing speed goes up from
A. Main Address Register 1GHZ to 4GHZ and the number of cores
B. Memory Address Register goes from 1 to 2-what is the exact effect
on the performance of the computer?
C. Massive Address Register
A. Quadrupled
D. Minimal Age Readable
B. Eight Times faster
322. The Program Counter
C. Sixteen times faster
A. Stores the address of the next instruc-
tion in memory D. Doubled

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 64

327. Which of the following is TRUE about the 332. A truth table of the n variables has
READ operation? Minterms
A. Contents of memory are copied to A. N2
MDR
B. (n-1)2
B. Contents of MDR are copied to memory
C. 2n-1

C. Contents of memory are copied to MAR D. 2n

NARAYAN CHANGDER
333. Which register holds the memory address
D. Contents of MAR are copied to memory of the next instruction that would be exe-
cuted?
328. Typical processor speed of 2016
A. MDR
A. 16Hz
B. AC
B. 100MHz
C. 4GHz C. PC

D. 300GHz D. CIR

329. You need to prepare a brand-new replace- 334. What is the name given to the memory
ment hard drive for storage. What is the which works on time sharing principle in
first step needed to get it ready? order to create an illusion of infinite mem-
ory space?
A. Format the drive
A. Register
B. Install an OS
C. Install a file system B. Primary memory

D. Create a partition C. Virtual memory


D. Cache memory
330. The system clock provides
A. the frequency of the CPU operations 335. Your friend Michel just purchased a
Chromebook and wants to know where his
B. the time of day
files are stored. What do you tell him?
C. the speed the? ? ?
A. On the hard drive
D. ? ? ?
B. In the system RAM
331. What happens during the execution pro- C. In the cloud
cess?
D. Chromebooks do not store files
A. Processor sends control signals to the
memory unit and peripherals according to 336. The instruction, Add R1, R2, R3 in RTN is
the decoded instruction.
B. Processor decodes the instruction in A. R3=R1+R2+R3
the PC.
B. R3<-[R1]+[R2]+[R3]
C. Processor decodes the instruction in
the CIR. C. R3=[R1]+[R2]
D. none of above D. R3<-[R1]+[R2]

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 65

337. are used to overcome the difference 342. Which part of the processor processes
in data transfer speeds of various de- and manipulates data?
vices.

PRACTICE BOOK» NOT FOR SALE


A. The registers
A. Speed enhancing circuitry B. The ALU
B. Bridge circuits C. The control unit
C. Multiple Buses D. Cache
D. Buffer registers 343. How much time do students have to
submit work when returning from an ab-
338. Which part of the CPU holds the memory sence?
address of the next instruction in the cy-
A. one day
cle?
B. two days
A. Accumulator
C. one week
B. Memory Address Register
D. two weeks
C. Memory Data Register
344. WAW hazard is a consequence of:
D. Program Counter
A. Data dependence
339. Calculate the overall speed of this CPU B. Antidependence
Intel i7:3.4 GHzDual Core C. Output dependence
A. 6.8 GHz (6 800 000 cycle per second) D. Control dependence
B. 3.4 GHz (3 400 000 cycle per second) 345. Which among the following is not of the
C. 13.6 GHz (13 600 000 cycle per second) bus types?
A. Address Lines
D. 6.7 MHz (6 700 cycles per second) B. Data Lines
C. Memory Lines
340. Pipe-lining is a unique feature of
D. Control Lines
A. CISC
346. Every task in a computer follows an
B. RISC
cycle
C. ISA A. IPO
D. ANNA B. CPU

341. The standard SRAM chips are costly as C. Memory


D. CU
A. They use highly advanced micro- 347. The 2’s complements of binary number
electronic devices 010111.1100 is
B. They house 6 transistor per chip A. 101001.1100
C. They require specially designed PCB’s B. 101000.0100.
C. 010111.0011
D. None of the mentioned D. 101011.0011

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 66

348. which is a form of permanent memory C. Control bus


that holds all the instructions the computer D. none of above
needs to start up and does not get erased
when the power is turned off. 354. The Second stage in The Fetch-Execute cy-
A. RAM cle is
B. The Network Interface Card (NIC) A. Fetch Instructions
C. The CUP B. Restore results

NARAYAN CHANGDER
D. ROM C. Execution Cycle

349. The ROM chips are mainly used to store D. Decode Instructions

355. The fetched instruction is moved to which


A. System files of the following register?
B. Root directories A. PC
C. Boot files B. I/O buffer register
D. Driver files C. MAR
350. Which of these busses is unidirectional? D. CIR
A. Address bus 356. In K-Map right order of two variables AB
B. Control bus in F(A, B, C, D) in SOP
C. Data bus A. A’B’-A’B-AB-AB’
D. none of above B. A’B’-A’B-AB’-AB
351. Which is not an integral part of com- C. AB-AB’-A’B-A’B’
puter? D. A’B’-AB’-A’B-AB
A. CPU
357. Consider a direct mapped cache with
B. Mouse block size 4 KB. The size of main memory
C. Monitor is 16 GB and there are 10 bits in the tag.
Find the number of bits in block offset.
D. UPS
A. 8 bits
352. Register + branch address gives you the
B. 12 bits
A. Stack address
C. 16 bits
B. Queue address
D. 32 bits
C. Program counter
D. Whole memory 358. CPU can directly understand this lan-
guage(PNB Clerk 2011)
353. Carries signals relating to the control and
A. C
coordination of all activities within the
computer. B. Assembly language
A. Address bus C. Machine language
B. Data bus D. JAVA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 67

359. What does CPU stand for? 365. Which of the following bus is unidirec-
A. Central Program Unit tional?

PRACTICE BOOK» NOT FOR SALE


B. Central Processing Unit A. Address bus

C. Computer Program Unit B. Control bus

D. Computational Pink U C. Data bus


D. none of above
360. A source program is usually in
A. Assembly language 366. Register:stores the most recently fetched
instruction, waiting to be decoded.
B. Machine level language
A. Memory data register
C. High-level language
D. Natural language B. Memory address register
C. Accumulator
361. The sign magnitude representation of bi-
nary number + 1101.011 is D. Current instruction register

A. 01101.011 367. CMOS sensors are used as well as CCD


B. 11101.011 sensors in cameras. CCD sensors are re-
ported as being more reliable, yet have
C. 00110.100
A. a much higher power consumption
D. 10010.100
than CMOS
362. stores all of your files including B. a much lower power consumption than
movies, word documents, and music files CMOS
A. RAM C. less lifetime
B. CPU D. a tendancy to burn out
C. Hard Disk
368. Which of the following OSs use the NT
D. ROM kernel
363. The bus that is one directional only A. Windows 7
A. Control bus B. Windows 3.11
B. Address bus C. Mac OS X
C. Data bus D. Chrome OS
D. none of above
369. In replacement algorithm method is
364. Which of the following can affect the per- to replace the block in the set that has
formance of a CPU? been in the cache longest.
A. Cache size A. FIFO (First-in-first-out)
B. Number of cores B. LRU (Least-recently-used)
C. Clock Speed C. LFU (Least-frequently-use)
D. All of the above D. FILO (First-in-last-out)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 68

370. is the brain of the computer and af- C. 00011


fects the overall performance fo the com- D. 11100
puter
A. CPU 376. Select the slowest CPU

B. Hard Disk A. Intel CPUQuad Core3.0 GHz

C. RAM B. AMD CPUDual Core4.5 GHz

D. ROM C. AMD CPUDual Core5.0 GHz

NARAYAN CHANGDER
D. Intel CPUSingle Core3.9 GHz
371. Processors don’t do the following
377. What should you do everyday when en-
A. Operate in Hz
tering and starting class?
B. Execute Data
A. Line book bags along glass wall
C. Execute Instructions
B. Sharpen pencils
D. Process Data
C. Listen to music
372. RAM is memory, meaning that when D. Start eating a snack
the system is shutdown, the contents of
RAM are erased. 378. What is the function of Memory Address
Register (MAR)?
A. non-volatile
A. Stores the data for read/write opera-
B. extra tions.
C. volatile B. Stores the address of the data for
D. secret read/write operations.

373. What does ALU stand for? C. Stores the sum of two bits when they
are added.
A. Arguable Logic Unit
D. Stores the address of the next instruc-
B. Arithmetic Larger Unit tion
C. Arithmetic Logic Unit
379. programs that control or maintain
D. Arithmetic Logic Utility the operations of the computer and its de-
vices.
374. Most PCs give a single beep on boot-up
to indicate they are OK hardware wise. A. Software
You boot your PC and don’t get a beep. B. System Software
What should you check first?
C. Application software
A. system board
D. Utility program
B. RAM
380. The control unit controls other units by
C. microprocessor
generating(IBPS clerk 2011)
D. speaker
A. Control signal
375. Representation of-29 in binary is B. transfer signal
A. 11101 C. timing signal
B. 00010 D. command signal

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 69

381. What register do you store the data in? D. Decoding the data in MDR and placing
A. CPU it in IR

PRACTICE BOOK» NOT FOR SALE


B. The MAR 387. What is the purpose of the CPU?
C. The MDR A. To store data
D. ALU
B. To create data
382. Select an example of an embedded sys- C. To process data
tem
D. All of the above
A. Smartphone
B. Cruise Control 388. Built-in set of machine code instructions
C. Laptop of computer are called
D. Computer A. instruction set

383. In Which architecture do the instructions B. transfer of data


and data share the same bus? C. logical operations
A. Harvard D. logical set
B. Von Neumann
389. The number of digits is reduced by
C. Both
for octal and for Hexa decimal when
D. none of above we convert from binary. This is the rea-
son that the system tend to store values
384. It is a point of address which can access
in these formats
using software
A. Locality refernce A. 1/5 and 1/8
B. address line B. 1/8 and 1/16
C. port C. 1/3 and 1/4
D. cache line D. 8 and 16
385. What register is connected directly to the 390. The circuit used to store 1 bit of informa-
address bus? tion
A. Memory Address Register
A. Logic Gates
B. Memory Data Register
B. Flip flop
C. Program Counter
C. Latch
D. Current Instruction Register
D. Decoder
386. The Instruction fetch phase ends with
A. Placing the data from the address in 391. A dynamic RAM consists of
MAR into MDR A. 6 Transistors
B. Placing the address of the data into B. 2 Transistors and 2 Capacitors
MAR
C. 1 Transistor and 1 capacitor
C. Completing the execution of the data
and placing its storage address into MAR D. None of These

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 70

392. What is clock speed measured in? C. Cache


A. Cycles per minute D. Accumulator
B. Cycles per second 398. Which part of the CPU holds the immedi-
C. Cycles per hour ate results of the calculations of the ALU?
D. none of above A. Accumulator

393. Which of the following is not a form of B. Program Counter

NARAYAN CHANGDER
memory? C. Memory Address Register
A. Instruction Cache D. Memory Data Register
B. Instruction Register
399. Peter, a friend of yours, has a piece of
C. Instruction Opcode software that was written for Mac OS X.
D. Both (A) and (B) Which of the following OSs will that soft-
ware run on?
394. Hard drives use what substance for mag- A. Mac OS X only
netising the bits for the storage of binary
1 or 0? B. Mac OS X and Linux
A. Ferrous particles C. Mac OS X and Chrome OS
B. Nitrous particle D. Mac OS X, Linux, and Chrome OS
C. Iodised particles 400. The transfer between Main memory and
D. Silicon particles Cache is
A. Word Transfer
395. Which if these is closest to 1 million.
B. Block Transfer
A. Kilo (K)
C. Byte Transfer
B. Mega (M)
D. Bit Transfer
C. Giga (G)
D. Tera (T) 401. Assume x=$s2, y=$s0, z=$s1 and find
x= (y/z).
396. EDSAC stands for
A. nor $s2, $s0, $s1
A. Electronic display storage automatic
B. nor $s1, $s0, $s2
calculator
C. nor $s2, $s1, $s0
B. Electronic delay storage automatic cal-
culator D. are $s0, $s1, $s2
C. Electronic delay storage automatic cir- 402. Second-level system bus that connects
cuit the memory subsystem to the chipset and
D. Electronic display automatic circuit the processor is referred to as

397. This would perform an operation includ- A. cache bus


ing the word “And” B. processor bus
A. Arithmetic Logic Unit C. standard I/O bus
B. Control Unit D. memory bus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 71

403. Which of the following is not one of C. To create a document


the operations carried out by the arith- D. To make copies from others
metic/logic unit in a processor?

PRACTICE BOOK» NOT FOR SALE


A. Add 409. When using the Big Endian assignment to
store a number, the sign bit of the number
B. Subtract
is stored in
C. Logical
A. The higher order byte of the word
D. Decode
B. The lower order byte of the word
404. Which type of addressing mode is used C. Can’t say
inAdd R4, R6, #100
D. None of the mentioned
A. Index mode
B. Immediate mode 410. The register that is part of ALU
C. Absolute mode A. MAR
D. Base with index mode B. MDR
C. CIR
405. Tape units have access.
D. Accumulator
A. Sequential
B. Random 411. If a bus has 24 lines, it has an address-
C. Associative able range (or maximum number of ad-
dressable cells) of
D. Direct
A. 16.7M
406. -controls the operation of the memory, B. 65.5K
processor and input/ output devices-reads
instructions, interprets them and sends out C. 17.6M
signals along the control bus to synchro- D. 4.3B
nize all computer components
412. Computer memory which allows simulta-
A. driver
neous read and write operation is
B. Memory Address Bus
A. ROM
C. ALU
B. RAM
D. control unit
C. EPROM
407. The software that supports a computer’s D. EEPROM
basic functions
A. driver 413. SPEC stands for
B. OS A. Standard Performance Evaluation
Code
C. utility software
B. System Processing Enhancing Code
D. application software
C. System Performance Evaluation Cor-
408. What is replicate? poration
A. To make copies of itself D. Standard Processing Enhancement
B. To open a file Corporation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 72

414. Find out the register number for $t8-$t9 420. Which part of the CPU is responsible for
A. 24-25 all the calculations?
A. Control Unit
B. 22-23
B. Arithmetic Logic Unit
C. 4-6
C. MDR
D. 29
D. MAR
415. Clock speed is measured in
421. What are two types of RAM?

NARAYAN CHANGDER
A. Hertz
A. SRAM and QRAM
B. Words
B. QRAM and PRAM
C. Bits Per Second
C. PRAM and DRAM
D. Metres Per Second D. DRAM and SRAM
416. Processor which is complex and expen- 422. Which of the following operating sys-
sive to produce is tems can you freely modify if you choose?
A. RISC A. OS X
B. EPIC B. iOS
C. CISC C. BlackBerry
D. Multi-core D. Linux

417. During the execution of the instructions, 423. In the given below equation the 12 rep-
a copy of the instructions is placed in the resents lw $s0, 12($s1)
A. low set
A. Register B. high set
B. RAM C. off set
C. System heap D. second set
D. Cache 424. Which addressing mode execute its in-
418. The correct order is structions within CPU without the neces-
sity of reference memory for operands?
A. Fetch, Decode, Execute
A. Implied Mode
B. Decode, Execute, Fetch
B. Immediate Mode
C. Execute, Decode, Fetch C. Direct Mode
D. Decode, Fetch, Execute D. Register Mode
419. Hertz mean a CPUs Clock will pulse 425. Which of the following is not a multitask-
per second. ing operating system?
A. 1 A. Windows
B. 2 B. Linux
C. 1 000 C. Win NT
D. 1 000 000 D. DOS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 73

426. The decimal number 80 can be repre- C. Program Counter


sented in BCD code as D. CIR

PRACTICE BOOK» NOT FOR SALE


A. 1000 0001
432. The computer architecture aimed at reduc-
B. 0101 0000 ing the time of execution of instructions is
C. 0010 0001
D. 1000 0000 A. CISC
B. RISC
427. Four memory chips of 16 x 4 size have
their address bases connected together. C. ISA
The system will be of size D. ANNA
A. 64 X 64
433. What is the function of the program
B. 16 X 16 counter?
C. 32 X 16 A. PC contains the next instruction to be
D. 256 X 1 executed.
B. PC contains the instruction that is exe-
428. What accurately describes a peripheral?
cuted currently.
A. A component of a computer system C. PC contains the address of the next in-
B. A device that is not directly connected struction that is to be executed.
to the CPU D. none of above
C. A device that is directly connected to
the CPU 434. This internal computer component is
erased every time the computer is turned
D. A device that is plugged in off.
429. In the Von Neumann model, are A. hard drive
stored in memory. B. processor
A. only data C. random access memory (RAM)
B. only programs D. keyboard
C. data & programs
435. In ARM processor how many Status Reg-
D. neither data nor programs isters are available
430. The simplified expression of F(A, B, C, D) A. 1
= Σ (0, 1, 2, 4, 5, 7, 11, 15) is B. 2
A. A’C’ + BCD + ACD + A’B’D’ C. 3
B. AC + B’C’D + A’CD + AB’D D. 4
C. AB’ + BCD + ACD + A’B’D’
436. POST(power on self Test) checks all of
D. A’C + BCD + ACD’ + A’B’D’ the following except:
431. When an interrupt is serviced, the status A. modem
of the current task is saved by the B. memory
A. interrupt C. CPU
B. interrupt handler D. video

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 74

437. I am the long-term storage part of the D. it makes a copy of the primary storage
computer. Software, documents and other
files are saved here. 443. Made up of addresses and contents. Each
address will uniquely identify every loca-
A. random access memory (RAM)
tion within the memory map.
B. hard drive
A. ALU
C. motherboard
B. control unit
D. expansion slot

NARAYAN CHANGDER
C. IAS
438. The additional duplicate register used in
ARM machines are called as D. processor

A. Copied-registers 444. BCD stands for


B. Banked registers A. Binary Coded Decimal
C. EXtra registers B. Binary Coded Decoder
D. General Purpose registers C. Bit coded data
439. Which of these buses is used to identify a D. None of these
memory location for reading or writing?
A. The system bus 445. The condition flag Z is set to 1 to indicate
B. The data bus
A. The operation has resulted in an error
C. The control bus
D. The address bus
B. The operation requires an interrupt
440. Select the faster CPU call
A. Intel CPUQuad Core3.0 GHz C. The result is zero
B. AMD CPUDual Core4.5 GHz D. There is no empty register available
C. AMD CPUDual Core5.0 GHz
446. Concentric circles on the surface of a mag-
D. Intel CPUSingle Core3.9 GHz netic disk in a hard disk are called:
441. Which chips are used for the implementa- A. Sectors
tion of Cache Memory?
B. Tracks
A. DRAM
C. Blocks
B. SRAM
D. none of above
C. Onboard
D. onchip 447. What kind of partitioning is used in par-
allel matrix multiplication algorithms
442. In a computer system, secondary storage
is known as such becasue A. checkerboard partitioning
A. It is not directly connected to the CPU B. no correct answer
B. It is connected via the primary RAM C. striped partittioning
C. It has an additional secondary data D. mixed, striped and checkerboard parti-
bus tioning

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 75

448. X is faster than PCI bus. It is dedicated to C. Interpreters


the acceleration of graphics performance. D. None of these
What is X?

PRACTICE BOOK» NOT FOR SALE


A. PCI express 454. The following process determines the
amount of memory present, the date/
B. AGP time, and which communications ports and
C. VESA display adapters are installed in a micro-
D. ISA computer?
A. Start-up utility test
449. Which is not an integral part of com-
puter(SBI Clerk 2012) B. Power on Self Test
A. CPU C. Power up boot process
B. Mouse D. Power on start up process
C. Monitor 455. Who is the computer architecture named
D. UPS after, where instructions and data are
stored in memory and fetched, decoded
450. Which of the following operations are and executed sequentially?
NOT performed by Arithmetic and logic
A. Van Newman
unit?
B. Von Neumann
A. Addition, subtraction and multiplica-
tion C. Vin Nowman
B. READ and WRITE operation D. Ven Numan
C. AND, OR and NOT 456. Data stored in the is permanent and
D. none of above is rarely changed as it effects how the soft-
ware operates
451. Keyboard is an example of compo-
A. BIOS
nent
B. RAM
A. Display
C. ROM
B. Data
D. Hard Drive
C. Hardware
D. Software 457. Microprocessors can be used to make
A. Computer
452. Which of the following are Volatile?
B. digital system
A. ROM
B. RAM C. Calculators

C. None of the above D. All of these

D. none of above 458. PSW stands for

453. are used to translate high level lan- A. Process status word
guage programs into machine code B. Program status word
A. Assemblers C. Program status width
B. Compilers D. process status width

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 76

459. The internal components of the processor C. Control bus


are connected by D. none of above
A. Processor intra-connectivity circuitry
465. Sum of access time and additional time
B. Processor bus
taken to read or write
C. Memory bus
A. access time
D. Rambus
B. memory cycle time
460. Which of these doesn’t affect the perfor-

NARAYAN CHANGDER
C. average access time
mance of the computer?
D. transfer rate
A. Clock Speed
B. Number Of Cores 466. RAM-What happens when the electricity
C. Cache Size Is turned off?

D. The Number Of Instructions In The A. The data from the memory is saved
Program onto flash memory
B. The data from the memory is saved
461. Which interrupt is generated by an inter-
onto the hard disk
nal processor primarily to do mutitasking
C. The data from the memory is not saved
A. Timer interrupt
B. program interrupt
D. The data from the memory is saved
C. I/O interrupt onto ROM
D. Hardware failure
467. is an example of a Software
462. Data is written to and read from the disk
A. Monitor
via a magnetic head mechanism in the
floppy drive. B. USB
A. cylinder C. CD
B. read/write D. Microsoft Word
C. recordable
468. How does a CPU process instructions?
D. cluster
A. Using the Fetch Decode Execute cycle
463. They are used as temporary memory ar- B. Linearly using parallel processing
eas in devices, where data is kept
C. Using machine code
A. registers
D. Through the Control Bus
B. driver
C. buffer 469. How many cycles per second would a 3
D. program counter GHz processor do?
A. 3 million
464. Used to transmit data between areas of
the processor. B. 3000
A. Data bus C. 3 thousand million (3 billion)
B. Address bus D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 77

470. Processor having Clock cycle of 0.25ns C. Nibble


will have clock rate of
D. none of above

PRACTICE BOOK» NOT FOR SALE


A. 2GHZ
B. 3GHZ 476. holds platters in place within a hard
disk drive
C. 4GHZ
A. Processor
D. 8GHZ
B. Spindle
471. is a type of system software allows
that allow a user to perform maintenance- C. Head
type tasks D. Rotator
A. Operating system
477. The register that decodes the ongoing in-
B. System Software struction
C. Application software
A. MAR
D. Utility program
B. PC
472. This type of computer architecture uses C. CIR
software. The program being run and the
data it is using are both stored in tempo- D. Accumulator
rary memory close to the CPU.
478. What is RISC?
A. Von Neumann architecture
A. Risk Instruction Set Computing
B. Computer architecture
B. Reduced Instruction Set Computing
C. System architecture
D. Building architecture C. Rhino in someones car
D. Ready Instruction Set Computing
473. Which is the fastest memory
A. Cache memory 479. Which companies are the major manufac-
B. Register turers of PC processors today?

C. PROM A. Intel and IBM


D. RAM B. Apple and AMD

474. Find out the answer for the equationG=H- C. Motorola and Apple
A[8], Assume g=$s1, h=$s2, A=$s3. D. Intel and AMD
A. lw $t0, 32($s3)sub $s1, $s2, $t0
480. In hexadecimal, what would be the next
B. lw $t2, 32($s2)sub $s2, $s1, $t3 value of the Program Counter after 0x09
C. lw $t1, 32($s3)sub $s3, $s1, $t0 if it was incremented?
D. none of above A. 0x0A

475. Four bits is called a B. 0x10


A. Bit C. 0xA0
B. Byte D. 0xFF

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 78

481. All the instructions that any particular C. Conceptual memory


CPU can use are known as the D. Users Memory
A. Instruction set
487. Which of these is not a step in the FDE
B. Keyword set cycle?
C. Word set A. Instructions are fetched from main
D. Character set memory
B. Instructions are decoded in the control

NARAYAN CHANGDER
482. Which is not a part of CPU? unit
A. Execution unit C. The decoded instruction is executed
B. I/O buffer register D. The ALU decodes the instructions
C. Program Counter
488. What component holds the address of the
D. I/O module next instruction
483. You get a CMOS checksum error during A. Memory Data Register
bootup. What is most likely the cause this B. Accumulator
error? C. Memory Address Register
A. power supply is bad D. Program Counter
B. b.BIOS needs updating
489. Which control line is responsible for send-
C. CMOS battery is nearing end of life ing out a message when the computer
D. hard drive types are incorrectly de- crashes and this message cannot be ig-
fined nored?
A. Reset
484. Which of the following is false about the
control unit? B. NMI
A. It controls the execution of programs. C. Interrupt
D. Clock
B. It times the fetching of instructions. 490. The effective address of the following in-
C. It decodes instructions. struction is MUL 5(R1, R2).
D. Its performance is unaffected by pro- A. 5+R1+R2
cessor speed. B. 5+(R1*R2)
485. Operating systems is also known as C. 5+[R1]+[R2]
A. Database D. 5*([R1]+[R2])

B. System software 491. High speed storage areas within the com-
puter; all data must be represented before
C. Hardware
it can be processed
D. Printer
A. buffer
486. RAM is usually called B. register
A. Logical Memory C. driver
B. Physical memory D. interrupt

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 79

492. You just installed a new IDE hard drive, 497. In ARM, is the default mode at start
but your system BIOS will not recognize up or reset
the new drive, what should you check

PRACTICE BOOK» NOT FOR SALE


A. Supervisor mode
first.
B. Non privileged mode
A. cable sequence
C. System mode
B. jumpers on the hard drive
D. User mode
C. drivers that need to be loaded
498. A graphical display of the fundamental
D. .hard drive manufacturer web site in- products in a truth-table is known as
formation
A. Mapping.
493. IPO stands for B. Graphing
A. Internet Programs Output C. T-map
B. Input Program Output D. karnaugh-map

C. Intelligent Processing Output 499. Which part of the CPU controls the flow
of data and instructions.
D. Input Processing Output
A. Arithmetic Logic Unit
494. It holds data which will be sent and re- B. Control Unit
cieve from input and output devices
C. Cache
A. MAR
D. Registers
B. MBR
500. What is cache memory?
C. IR
A. A very large, temporary memory
D. IBR
B. A very small but expensive memory
495. Which is BetterIntel core i7 3rd genera- C. It is used to store data and programs
tion or Intel core i5 10th gen? permanently
A. Intel core i7 3rd gen D. It is a type of payment

B. Intel core i5 10th gen 501. What is held in cache?


C. Both are equal A. All of the programming instructions
D. Both are bad (AMD is better) B. Instructions that have been processed

496. What is fetch function in machine cycle? C. Commonly used instructions and data
A. Fetch instruction from control unit to D. Data that hasn’t been used for a long
memory time
B. Fetch instruction from memory to con- 502. What are the main components of a com-
trol unit puter in von Neumann architecture?
C. Fetch instruction from control unit to A. Processor and input-output devices
arithmetic logic unit
B. Processor, Memory unit and input-
D. none of above output devices

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 80

C. CPU, monitor, keyboard and mouse 508. What happens in the ‘fetch’ part of the
D. CPU, monitor, keyboard, mouse, Fetch Decode Execute Cycle
speakers and microphone A. The RAM delivers the instruction.
503. This holds the instruction/data temporar- B. The processor fetches the instruction
ily after it is brought to the processor from from primary memory.
the main memory
C. The program counter goes down by
A. Memory Address Register one.

NARAYAN CHANGDER
B. Memory Data Register D. none of above
C. Accumulator
509. Which of the following register is used in
D. Program Counter
the control unit of the CPU to indicate the
504. What happens at the Decode step of the next instruction which is to be executed?
fetch-decode-execute cycle? A. Accumulator
A. The CPU makes sense of the instruc-
B. Index Register
tions.
B. The CPU fetches the information from C. Instruction Decoder
RAM. D. Program Counter
C. The instructions are executed.
510. This component is required to process
D. none of above data into information and consists of inte-
505. Sends data between the processor, the grated circuits(SBI Clerk 2011)
memory unit and the input/output de- A. Hard disk
vices.
B. CPU
A. Address bus
C. RAM
B. Data bus
C. Control bus D. ROM

D. none of above 511. The Third stage in The Fetch-Execute cy-


506. The combination of Linux-based files that cle is
gets released as a product is called what? A. Fetch Instructions
A. Distribution B. Restore results
B. Version C. Execution Cycle
C. Kernel
D. Decode Instructions
D. Source
512. The ASCII
507. is the most common and slowest ex-
pansion bus A. is a subset of 8-bit EBCDIC
A. AGP B. is used only in Western Countries
B. VESA C. Both (a) and (b)
C. EISA D. has 128 character, including 32 control
D. ISA characters

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 81

513. In which of the following gates, the out- C. Only decodes instructions
put is 1, if and only if at least one input is
D. Controls how much power is directed
1?

PRACTICE BOOK» NOT FOR SALE


to all components within the computer
A. NOR
B. AND 519. Which is an example of an Embedded Sys-
tem:
C. OR
A. PCs
D. NAND
B. Washing Machine
514. The Accumulator is a type of what?
C. Laptops
A. Register
D. Tablets
B. Buffer
C. RAM 520. Memory can be accessed in ARM systems
by instruction
D. Cache
A. MOVE
515. The results of executing instructions are
B. Load
placed in the main memory.
C. arithmetic
A. Executing of instructions
B. Decoding of instructions D. logical

C. Storing of results 521. The main importance of ARM micro-


D. Fetching of instructions processors is providing operation with
A. Higher degree of multi-tasking
516. Carries data between the processor, the
memory unit and the input/output devices B. Lower error or glitches
A. Address bus C. Low cost and low power consumption
B. Data bus D. Efficient memory management
C. Control bus
522. This sends signals such as “Memory
D. System bus write”
517. MIPS instruction addi $s1, $s2, 100. can A. Control Unit
be simplified into B. Cache
A. $s1 = $s2 + 100
C. Arithmetic Logic Unit
B. $s1 = $s2 + 101
D. Accumulator
C. $s1 = $s2-100
D. $s1 = $s2 . 100 523. The CPU cache stores
A. Only instructions
518. The Control Unit
B. Word documents
A. Controls the flow of data around the
CPU and also decodes instructions C. Frequently accessed data and instruc-
tions
B. Only controls the flow of data around
the CPU D. A list of IP addresses

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.3 Computer architecture 82

524. The following logic building block can be 529. In ARM LPC2148, in which sequence of
used to implement any combinational logic bytes are stored in computer memory ad-
circuit dress
A. Ex-Or gate A. Big Endian
B. Encoder B. X-Little Endian
C. Multiplexer C. Little Endian
D. Decoder D. Both Little & Big Endian

NARAYAN CHANGDER
525. What is the high speed memory between 530. About 99 percent of the BIOS business
the main memory and the CPU called? is controlled by two companies. Of the
following, which one is not a major BIOS
A. Register Memory
manufacturer?
B. Storage Memory
A. Intel
C. Cache Memory
B. American Megatrends (AMI)
D. Virtual Memory
C. Award Software
526. Which of the following gates are added D. Phoenix Technology
to the inputs of the OR gate to convert it
to the NAND gate? 531. Calculate the overall speed of this CPU
AMD Vengeance3.3 GHzQuad Core
A. NOT
A. 13.2 (13 200 000 cycles per second)
B. AND
B. 6.6 GHz (6 600 000 cycles per second)
C. OR
D. XOR
C. 13.6 GHz (13 600 000 cycles per sec-
527. What kind of data dependences can be ond)
eliminated unsing register renaming tech- D. 3.3 GHz (3 300 000 cycles per second)
nique
532. Which component generates addresses
A. True and output dependences
A. Secondary Storage
B. Output and antidependence
B. Processor
C. All types of dependences
C. Main Memory
D. Antidependences and true depen-
dences D. Control Unit

528. Control line causes data from the ad- 533. To which register(s) is instruction copied
dressed I/O port to be placed on the bus to in the fetch process?
A. I/O read A. MDR only
B. Memory read B. To MDR first and then, to CIR
C. memory write C. To MDR first and then, to PC
D. I/O write D. MAR only

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 83

534. Charlie uses social media regularly. What 538. CPU stands for
step would you recommend to be more se- A. Central Program Unit
cure online?

PRACTICE BOOK» NOT FOR SALE


B. Control Processing Unit
A. Always use the same password
C. Central Processing Unit
B. Only post non-private data/pictures
D. Control Program Unit
C. Always use a mobile phone for security
539. The CISC stands for
D. Share other people’s pictures as much A. Computer Instruction Set Compliment
as possible B. Complete Instruction Set Compliment
535. The CU holds data in multiples of C. Computer Indexed Set Components
A. 2 bits D. Complex Instruction set computer

B. 4 bits 540. To reduce the memory access time we


C. 8 bits generally make use of
A. Heaps
D. 16 bits
B. Higher capacity RAM’s
536. A nonvolatile type of memory that can be
C. SDRAM’s
programmed and erased in sectors, rather
than one byte at a time is. D. Cache’s
A. Flash Memory 541. Which of these is NOT a bus in the CPU?
B. MPROM A. Address bus
C. EPROM B. Data bus
D. EEPROM C. Control bus
D. Execute bus
537. Which of the following is a means of Out-
put? 542. The CU can be found inside the
A. Monitor A. MDR
B. Speakers B. ALU
C. Printer C. MAR
D. All of the Above D. CPU

1.4 Data Structures


1. Which structures does an array have? 2. Which structure is a linear collection?
A. Static and mutable structures A. Arrays
B. Static and immutable structures B. Linked Lists
C. Dynamic and mutable structures C. Both
D. Dynamic and immutable structures D. Neither

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 84

3. Feasibility should be feasible with the 8. Routine to delete element in an array im-
available resources. plementation
A. True A. for(i=pos-1;i<n-1;i++)list[i]=list[i-
1];
B. False
B. for(i=pos-1;i<n-1;i++)list[i]=list[i*1];
C. All of the above
D. None of the above C. for(i=pos-1;i<n-1;i++)list[i]=list[i+1];

NARAYAN CHANGDER
4. A terminal node in a binary tree is called
D. for(i=pos-1;i<n-1;i++)list[i]=list[i+2];
A. Root 9. What is the advantage of a linked list?
B. Branch A. Easy to modify
C. Child B. Easy to understand
D. Leaf C. Easy to see
D. All of the above
5. give a function that does not return any
value, what value is shown when exe- 10. An entity is that which contains certain at-
cuted at the shell? tributes or properties, which may be as-
signed values
A. int
A. Attribute and Entity
B. bool
B. Entity Set
C. void
C. Field
D. none
D. Record
6. For a ordered list of 11 items, how many
11. Time complexity of binary search:
comparisons will a linear search need be-
fore it knows that a value in NOT in the A. O(n)
list? B. O(log n)
A. 12 C. O(1)
B. 11 D. O(n2)
C. 6 12. This data structure extends an array’s
D. 4 functionality.
A. ArrayList
7. If letter ‘D’, ‘C’, ‘B’, ‘A’, are sequentially
inserted into a queue, and then deleted one B. Queues
by one, in which sequence will the letter be C. Stacks
deleted from the queue? D. List
A. A, B, C, D
13. Identify the sorting algorithm that apply
B. A, B, D, C divide-and-conquer method.
C. D, C, A, B A. Linear Sort
D. D, C, B, A B. Merge Sort

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 85

C. Heap Sort 19. Time complexity of matrix addition:


D. Binary Sort A. O(n)

PRACTICE BOOK» NOT FOR SALE


14. Choose the correct statement to add Pan- B. O(log n)
das library in program? C. O(n3)
A. import numpy as np D. O(n2)
B. import P as pandas 20. A stack is a data structure in which ele-
C. import pandas as pd ments
D. import pandas A. can be added to any position and re-
moved only from the top
15. Vectors describe the following information B. can be only added to the top and re-
moved from any position
A. Acceleration, force, position and veloc- C. can be added and removed from the
ity top only
B. Accuracy, precision, relationship and D. can be added and removed from any
weight position
C. Appointment, efficiency, fluidity and
21. In linked list implementation of a queue,
geometry
from where is the item deleted?
D. Angle, coordinates, grads and sine
A. At the head of link list
16. There are two types of data structures, B. At the centre position in the link list
they are
C. At the tail of the link list
A. Static and dynamic
D. None of the mentioned
B. Fast and slow
22. The difference between queue and stack is
C. Large and small
D. Ascending and descending A. queues requires dynamic memory but
17. What kind of linked list is best to answer stack do not
question like “What is the item at position B. stack requires dynamic memory but
n? ” queue do not
A. Singly linked list C. queue use two ends of the structure,
stack use only one
B. Doubly linked list
D. stack use two ends of the structure,
C. Circular linked list
queue use only one
D. Array implementation of linked list
23. It only provides the list of supported oper-
18. The elements in a queue are removed at ations, type of parameters they can accept
one end called and return type of these operations.
A. front A. Execution
B. rear B. Interconnecting
C. near C. Interface
D. none of above D. Implementation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 86

24. A graph having an edge from each vertex 29. which module of python supports regular
to every other vertex is called a expressions?
A. Tightly Connected A. re
B. Strongly Connected B. regex

C. Weakly Connected C. pyregex


D. none
D. Loosely Connected
30. What do you this data structure clas-

NARAYAN CHANGDER
25. It is a view or representation of an entity sification in which the elements are
that includes only the most significant at- stored/accessed on a non-linear order
tributes such as trees and graphs.
A. Abstract Data Type A. trees
B. Abstraction B. linear
C. Abstracted C. non-linear
D. none of above D. graphs
31. Output of:max(”please help ‘’)
26. Maximum number of comparisons required
to search the leaf node of Binary search A. please help
tree is B. Error
A. log n C. p
B. n D. s

C. n+1 32. A connected, undirected graph with no cy-


cles
D. n-1
A. Tree
27. How many pointers are necessarily B. Stack
changed for the insertion in a Linked List?
C. List
A. One D. Vector
B. Two
33. It provides the internal representation of
C. Three a data structure
D. Four A. Execution
B. Interconnecting
28. It is a method of solving problems that
involves breaking a problem down into C. Interface
smaller and smaller sub problems until you D. Implementation
get to a small enough problem that it can
34. How could you use a hashing algorithm
be solved trivially.
with alphanumeric data?
A. Recursion A. MOD with an ASCII value
B. Iteration B. not possible
C. Looping C. convert to ordinal numbers
D. none of above D. use a random key

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 87

35. What will happen by attempting to push C. [[ requires quotes (”)


another item onto the top of a full stack? D. none of above

PRACTICE BOOK» NOT FOR SALE


A. Underflow error
41. The examples of Linear Data Structures
B. Overload error are
C. Overflow error A. Stacks, Queues, Linked list
D. Catastrophic error
B. int, float, complex
36. The maximum number of binary trees that C. Operators, tokens, punctuators
can be formed with three nodes
D. Tree, graph
A. 3
42. BFT uses which data structure?
B. 1
A. stack
C. 5
B. tree
D. 4
C. queue
37. Which of these algorithms compares con-
D. hash
secutive pairs of items and swaps two
items if they’re not in order? 43. Assume the level of root node is 1 and the
A. Bubble sort levels of left and right children of root is
2. The maximum number ofnodes on level
B. Linear search
i of a binary tree is
C. Merge sort
A. 2i
D. Binary search
B. 2i−1
38. What is a full binary tree? C. 2i+1
A. Each node has exactly two children D. 2i + 1
B. Each node has exactly zero or two chil-
dren 44. A linear collection of data elements where
the linear node is given by means of
C. All the leaves are at the same level pointer is called?
D. Each node has exactly one or two chil- A. Linked list
dren
B. Node list
39. What does a sorting algorithm do? C. Primitive list
A. Finds an item of data in a set of data D. Unordered list
B. Saves a set of data
45. One important categories of algo-
C. Puts a list of items into order rithms:Algorithm to search an item in a
D. none of above data structure.

40. What is the difference between [[ and $ A. Search


used on a list? B. Sort
A. [[ is type-safe C. Insert
B. [[ always returns a list D. Update

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 88

46. In general, the index of the first element C. 0 to length


in an array is D. 0 to length + 1
A. 0
52. A variant of the linked list in which none
B. -1 of the node contains NULL pointer is?
C. 1 A. Singly linked list
D. 2
B. Doubly linked list

NARAYAN CHANGDER
47. Which of the following sorting algorithms C. Circular linked list
has the lowest worst-case complexity?
D. None of the above
A. Quick sort
53. If the numbers 5, 10, 3, 42 are enqueued
B. Merge sort
onto a queue in that order, what does de-
C. Selection sort queue return?
D. Bubble sort A. 5
48. What is a dictionary data structure? B. 10
A. Abstract Data Type made up of associ- C. 3
ated pairs D. 42
B. Queue that hold alphanumeric charac-
54. Which of the following facts about arrays
ters
is TRUE?
C. a type of array
A. Lists can contain items of different
D. Abstract Data Type that holds Strings data types
49. In a unidirectional graph the connections B. Arrays can only contain items of a sin-
between nodes can be traversed in both gle data type
directions. If the arcs are all one way, the C. Lists and arrays are the same thing
the graph is called a
D. A list is a type of variable
A. Digraph
B. One way graph 55. Which of the following is an advantage of
a bubble sort?
C. Unigraph
A. It is a very small and simple computer
D. Epigraph program
50. Array is data type. B. It takes a very long time to run
A. user defined C. It is very quick
B. primary D. none of above
C. derived 56. This is used to store values temporarily
D. all of above A. Data Types
51. Index values of an array range from B. Variables
A. 0 to length-1 C. Array
B. 1 to length D. Loops

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 89

57. Which component of a computer controls 63. Which of the following best describes AVL
the entire system and is often called the tree?
brain of the computer?

PRACTICE BOOK» NOT FOR SALE


A. A tree which is a binary search tree but
A. The CPU unbalanced tree.
B. The User B. A tree which is binary search tree and
C. The Monitor height balanced tree.
D. The Software C. A tree with utmost two children
D. A tree with utmost three children
58. A graph in which every edge is directed is
called a 64. Refers to single unit of values
A. directed graph A. Data
B. indirected graph B. Data Item
C. directindirect graph C. Group Items
D. none of above D. Elementary Items
59. The last node of the singly-linked list con- 65. What will be the output of the following C
tains code? #include <stdio.h>int main(){int a =
A. INFO 1, b = 1, c;c = a++ + b;printf(”%d, %d”,
B. NULL a, b);}
C. NEXT A. a = 1, b = 1
D. None of the above B. a = 1, b = 2
C. a = 2, b = 2
60. Which uses more memory storage?
D. a = 2, b = 1
A. Array
B. Linked List 66. What should you do to protect (backup)
C. They are the same in terms of memory your data, documents and photos indefi-
storage nitely?

D. none of above A. Email them to yourself so you have a


copy
61. Traversal of a linked list always starts B. Nothing, the computer knows what it
from the needs to do
A. First node C. Sync them to the cloud
B. Last node
D. Save them to your computer’s internal
C. Middle node data storage
D. None
67. What are binary trees?
62. If front=rear, then the queue is? A. A data structure that has a left and
A. full right node
B. undeflow B. A physical tree
C. overflow C. Mathematical formula
D. empty D. A graph

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 90

68. there are primitive data types, meanwhile 73. What does a linear search do?
there are what we call abstract data type, A. Looks at the first item of data, then
evaluate which is not one. each one in turn, until it finds the data item
A. Stacks requested

B. Arrays B. Organises the data into alphabetical


order
C. Trees
C. Splits the data until the requested data
D. Tables is found

NARAYAN CHANGDER
D. none of above
69. Which value does the command ‘list[3]’
find? 74. A queue is a first in, data structure.
A. The fourth value of ‘List’ A. Last in
B. Last out
B. The third value of ‘List’
C. First out
C. The second value of ‘List’
D. All of the above
D. The fifth value of ‘List’
75. Tree
70. An algorithm should have step-by-step di- A. data structure similar to a graph, with
rections, which should be of any pro- no loops.
gramming code.
B. an object in a graph also known as a
A. Feasibility vertex
B. Independent C. a join of relationship between nodes-
also know as an arc
C. Output
D. the starting node in a rooted tree struc-
D. Finiteness ture from which all other nodes branch
off./
71. Which of the following is/are not the dis-
advantage of Linked list? 76. Using a binary search why will the number
9 never be found in the following list:11,
A. Linked list does not support random ac- 8, 13, 9, 7, 3
cess
A. It does not work on numbers
B. Memory is required to store next field
B. It only works on letters
C. Searching takes time compared to ar- C. The list is not in order
rays
D. none of above
D. None of the above
77. For a linked list, what meta-data will need
72. A tree sort is also known as sort. to be stored with each data entry?
A. The Name of the list
A. quick
B. The address of the current data entry
B. heap
C. The address of the next data entry in
C. shell the list
D. selection D. The meaning of life

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 91

78. A field or collection of fields in a record D. A list is a collection of data that can-
which identifies a record uniquely is called not hold duplicated data and cannot be
a changed

PRACTICE BOOK» NOT FOR SALE


A. Primary Key 83. What does a bubble sort do?
B. Secondary Key A. Sorts a list by comparing two items
C. None of the above that are side by side, to see which is out
of order
D. none of above
B. Separates a list of data into different
79. We need to implement a queue using a cir- collections of data, before sorting and
cular array. If DATA is a circular array of gathering back into a list
n elements, and rear is an index into that C. Finds an item of data in a list
array, what will be the index for the ele-
D. none of above
ment after rear?
A. rear + (1 % n) 84. Which of these best describes an array?
B. (rear + 1) % n A. A data structure that shows a hierar-
chical behavior
C. rear % (1 + n)
B. Container of objects of similar types
D. rear % 1 + n
C. Arrays are immutable once initialized
80. Transpose-another operation that can be D. Array is not a data structure
performed on matrices that computes for
the transpose of matrix 85. A node with a predecessor is a . It has
an in-degree of one.
A. TRUE
A. child
B. FALSE
B. parent
C. MAYBE
C. siblings
D. None of the Choices
D. none of above
81. What will the following switch state- 86. A graph can be represented as a structure,
ment print? char c = ‘y’;switch(c){case containing data on
‘Y’:printf(“Yes/No”);break;case ‘N’:printf(“No/Yes”);break;default:printf(“Other”);}
A. nodes and arcs
B. cells and paths
A. Yes/No
C. points and lines
B. No/Yes
D. slots and beams
C. Other
D. Yes/No No/Yes Other 87. Which of the following can technology NOT
do?
82. Which of these is the best description of a A. Help make our lives more comfortable
list in Python?
A. A list is a collection of data that has an B. Make our life problem free
order and can be changed
C. Give us directions to a destination
B. A list is a lot of variables D. Provide us with comforts and conve-
C. A list is used for shopping niences

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 92

88. Degree of the leaf node is 94. Suppose a tuple test contains 5 elements.
A. 0 How can you set the 3rd element of the
tuple to ‘Python’?
B. 1
A. test[2] = ‘Python’
C. n
B. test[3] = ‘Python’
D. n-1
C. test(2) = ‘Python’
89. Which is NOT a type of queue?
D. Elements of tuple cannot be changed

NARAYAN CHANGDER
A. Priority
95. Root
B. Linear
C. Circular A. data structure similar to a graph, with
no loops.
D. Semaphore
B. an object in a graph also known as a
90. Which of the following is an advantage of vertex
a linked list? C. a join of relationship between nodes-
A. Efficient Memory Utilization also know as an arc
B. Not cache friendly D. the starting node in a rooted tree struc-
C. Extra memory space for a pointer is re- ture from which all other nodes branch
quired off./
D. Random access is not allowed 96. which data structure type allows deleting
data elements from front and inserting at
91. In which algorithm takes less time or space
rear?
is called
A. Stacks
A. Best case
B. Queues
B. Worst case
C. Average case C. Dequeue

D. None of the above D. Binary search tree

92. It is a specialized format to store and orga- 97. In a linked list, you must store the data
nize data in a computer’s memory or disk. with
A. Raw Data A. the address of the next datum
B. Data Types B. the address of the head of the list
C. Data Structures C. the null value to signify the end of the
list
D. Data
D. none of above
93. In the array ‘names(”John”, “Ali”,
“Sarah”)’, what is the value of element 98. The algorithm is completed when the state-
names(2)? ment is encountered.
A. Ali A. Return
B. Sarah B. Finish
C. John C. EXIT
D. none of above D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 93

99. How many searches will it take to find 10 C. HashMap<Integer, String> map =
in [1, 3, 5, 7, 10, 12, 15] using BINARY new HashMap<Integer, String>();
search?

PRACTICE BOOK» NOT FOR SALE


D. HashMap map = new HashMap(String,
A. 3 Integer);
B. 4
105. A data item that identifies a particular
C. 5 element in a data structure, normally the
D. 6 front or rear.
A. Stack
100. A tree structure is also
B. LIFO
A. an undirected graph with no cycles
B. a directed graph with no cycle C. Pointer

C. an undirected graph with cycles D. Stack Frame

D. a directed graph with cycle 106. In the queue, the first index comes
right after the last index.
101. How do you add 21 to an ArrayList of
Integers? A. linear queue
A. list.add(21); B. circular queue
B. list.put(21); C. priority queue
C. 21.add(list); D. none of above
D. list.add(”21”); 107. What is R’s equivalent of numpy’s broad-
102. A node is a if it has successor nodes- casting rules?
that is, if it has an out-degree greater than A. Vectorization
zero. B. Recycling
A. child
C. Repetition
B. parent
D. Regurgitation
C. siblings
108. How many Queues are required to imple-
D. none of above
ment a Stack?
103. If for an algorithm time complexity is A. 2
given by O(n) then complexity of it is:
B. 3
A. linear
C. 1
B. exponential
D. 4
C. constant
D. none of the mentioned 109. A queue data structure places data items
in an order that is
104. with Strings as
A. FIFO
A. HashMap<String, Integer> map =
B. FILO
new HashMap<String, Integer>();
B. HashMap<String> map = new C. LIFO
HashMap<Integer>(); D. FOLI

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 94

110. Which of the following is an advantage 115. A representation of a graph data struc-
of a insertion sort when compared with a ture set up as a two dimensional array or
bubble sort? grid that shows where there is an edge be-
A. It is quicker than a bubble sort algo- tween each pair of nodes.
rithm A. Ordered pairs
B. It is simpler than a bubble sort algo- B. Graph paper
rithm C. Adjacency List

NARAYAN CHANGDER
C. There is no advantage. D. Adjacency Matrix
D. none of above
116. This data structure uses pointers to link
111. a collision in a hash table is nodes together.
A. When 2 things have the same value A. Queue
B. When 2 things are assigned the same B. Linked List
address C. Array
C. When 2 things are processed at the D. Trees
same time
D. When 2 things are deleted at the same 117. Graph traversal is used to find the
time route to visit all nodes in a network
A. Shortest
112. Main Operations in Stacks are Called
B. Best
A. Insertion and deletion
C. Longest
B. Push and Pop
D. Most secure
C. append and insertion
D. append and pop 118. The main hardware components of a
home computer are:
113. Which of the following statements is/are A. Excel, Word, Internet Explorer
TRUE for an undirected graph? P:Number
of odd degree vertices is evenQ:Sum of de- B. Monitor, CPU, Keyboard
grees of all vertices is even C. Word, Speakers, Printer
A. P Only D. Monitor, Mouse, Internet
B. Q Only 119. are data that a variable can hold in a
C. Both P and Q programming language.
D. Neither P nor Q A. Variable

114. The inorder traversal of binary tree is:B B. Data Type


C G K L M S V. The preorder is:G C B L K S C. Data Structure
M V. Post ordertraversal is D. Value
A. B C K M V S L G
120. What is the output of the below
B. B C M V K S L G code snippet#include<stdio.h>main(){
C. B C K M S V L G printf(”%d”, -11%2);}
D. B C K L S M V G A. 1

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 95

B. 5 126. If the sequence of operations-push (1),


push (2), pop, push (1), push (2), pop,
C. -1
pop, pop, push (2), pop are performed on a

PRACTICE BOOK» NOT FOR SALE


D. -5 stack, the sequence of popped out values

121. A binary search tree whose left subtree A. 2, 2, 1, 1, 2


and right subtree differ in height by at B. 2, 2, 1, 2, 2
most 1 unit is called
C. 2, 1, 2, 2, 1
A. AVL tree
D. 2, 1, 2, 2, 2
B. Red-black tree
C. Lemma tree 127. Are the data items presented to the algo-
rithm. An algorithm has either no input or
D. None of the above a predetermined number of them.
122. how many pointers are available in singly A. Input
linked list B. Output
A. 4 C. Procedure
B. 3 D. Data
C. 1
128. In the traversal we process all of a
D. 2
vertex’s descendents before we move to
123. What is a method for python lists? an adjacent vertex.

A. append A. Depth First

B. remove B. Breadth First

C. membership C. With First

D. all of the above D. Depth Limited

124. Which Python Library is used to manipu- 129. An empty list is the one which has no
late the data so that it becomes readable A. Nodes
and organised?
B. Data
A. NumPy
C. Address
B. Library 1
D. Both a & b
C. Python np
D. Pandas 130. A variant of linked list in which last node
of the list points to the first node of the
125. Which of the following usees FIFO metho list is?
A. Queue A. Singly linked list
B. stack B. Doubly linked list
C. linklist C. Circular linked list
D. binary tree D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 96

131. The following lists represent 3 passes of B. 101


a sorting algorithm. Which algorithm is be- C. 110
ing used to sort the list? 4 5 9 6 2 7 4 5
6279452679 D. 10010

A. Bubble Sort 137. What command is used to shuffle a list


‘L’?
B. Selection Sort
A. L.shuffle()
C. Insertion Sort
B. random.shufflelist(L)

NARAYAN CHANGDER
D. none of above
C. shuffle(L)
132. Characteristics of Data Structure D. random.shuffle(L)
A. Correctness
138. It is a measure of how well a computer
B. Time Complexity algorithm scales as the amount of data in-
C. Space Complexity volved increases.
D. All of the above A. Big logN Notation
B. Big X Notation
133. What is a static structure?
C. Big O Notation
A. A structure fixed in size
D. none of above
B. A structure that cannot be moved
C. A structure that cannot be changed 139. s = 0for d in range(0, 5, 0.1):s += d
print(s)
D. A structure that is influenced by elec-
tricity A. Syntax Error
B. Type Error
134. A linear data structure in which insertion
C. Name Error
and deletion operations can be performed
from both the ends is D. Traceback Error
A. Circular Queue 140. Consider the following operation
B. Deque performed on a stack of size
5.Push(1);Pop();Push(2);Push(3);Pop();Push(4);Pop();Pop();P
C. Priority Queue
the completion of all operation, get the to-
D. Queue tal number of element present in stack is
135. Which of these data structures is FIFO? A. 1

A. Stack B. 2

B. Queue C. 3
D. 4
C. Binary Tree
D. Linked List 141. Recognize the algorithm that does not di-
vide the list.
136. Suppose you have the follow-
A. Merge sort
ing series of queue operations.q =
B. Binary Search
Queue();q.enqueue(1);q.enqueue(10);q.enqueue(100);q.dequeue();q.dequeue();What
items are the output? C. Linear Search
A. 10010 D. Quick sort

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 97

142. The process of Visiting each element in 147. stack is also called
any Data structure is termed as A. first in first out

PRACTICE BOOK» NOT FOR SALE


A. Traversing B. last in first out
B. Searching C. last in last out
C. Movement D. first in last out
D. Visiting 148. What does a binary search do?
A. Looks at the first item of data, then
143. Stacks follows order
each one in turn, until it finds the data item
A. FIFO (First In First Out ) requested
B. LIFO (Last In First Out) B. Converts all the data into binary
C. Random C. Takes the data and splits it in half re-
peatedly until it finds the data item re-
D. FILO(First In Last Out) quested
144. Which data structure is a non-linear data D. none of above
structure? 149. Which of the following is application of
A. Stack Cicularly Linked List?
B. Graphs A. moving pages forward and backward
in browser
C. Linked list
B. Giving chance to each player in a multi
D. Queue player game
C. Implementing Stack
145. What does is mean for a test function to
be ‘safe’? D. none of above
A. Does not affect other objects in the en- 150. What is the output of the following code?
vironment i = 0while i < 3:print(i) i += 1else:print(0)
B. The data structure returned is the A. 0 1 2 3 0
same as the object passed to the function B. 0 1 2 0
C. 0 1 2
C. Returns the answer you expect D. Error
D. Using the function does not crash your
151. One difference between a queue and a
computer
stack is:
146. It also provides the definition of the algo- A. Queues require dynamic memory, but
rithms used in the operations of the data stacks do not
structure. B. Stacks require dynamic memory, but
A. Execution queues do not.

B. Interconnecting C. Queues use two ends of the structure;


stacks use only one.
C. Interface
D. Stacks use two ends of the structure,
D. Implementation queues use only one.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 98

152. A data structure whose elements form a 157. Which of the following is NOT a form of
sequence is known as technology?
A. Heterogeneous data structure A. Fire
B. Homogeneous data structure B. Wheat

C. Linear data structures C. Sprinkler System


D. Hard Drive
D. Non-Linear data structures

NARAYAN CHANGDER
158. Which of the following is not a type of
153. It talks about arranging data in a particu- Linked List?
lar format, whether ascending or descend-
ing. A. Hybrid linkedlist
B. Singly linked list
A. Searching
C. Doubly linked list
B. Stacking
D. circular linked list
C. Queueing
D. Sorting 159. Array or linear list comes under the cate-
gory of
154. is the method used by card sorter? A. Compound Data Structure
A. Radix sort B. Simple Data Structure
B. Insertion C. Random Data Structure
C. Heap D. None of these

D. Quick 160. Data items that cannot be divided


A. Data
155. A queue is a data structure in which
each element that was inserted first is the B. Data Item
first one to be taken out. C. Group Items
A. FITO D. Elementary Items
B. FIFO 161. Efficiency of an algorithm is measured by
C. FISO A. Time and Space complexity
D. FIVO B. Speed and Capacity complexity
C. Speed and Space complexity
156. Why might a sorting algorithm be needed
before a search? D. Time and Capacity complexity

A. Data is better when ordered 162. In the worst case, the number of compar-
isons needed to search a singly linked list
B. Data always needs to be in order be-
of length n for a given element is
fore searching
A. log 2 n
C. The search algorithm may be in the
code before the sorting algorithm B. n/2

D. The search algorithm may need the C. log 2 n-1


data to be in order D. n

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 99

163. Which of the following data structure B. (rear+1) % Number of Item


works on the principle of First Come First C. (rear % Number of Item)+1
Serve?

PRACTICE BOOK» NOT FOR SALE


D. rear-
A. Stack
B. Linked List 169. What is caused by attempting to push an-
other item onto the top of a full stack?
C. Tree
A. Underflow error
D. Queue
B. Overload error
164. What is an advantage of a circular C. Overflow error
queue?
D. Catastrophic error
A. Free space can be reused
170. Which of the following statements is
B. Easy to program
true?
C. Gives preference to important items
A. A graph is also a tree.
D. It is static
B. A tree can have both directed and undi-
165. It is a step-by-step procedure, which de- rected edges.
fines a set of instructions to be executed in C. A tree can have a connection between
a certain order to get the desired output. two child nodes.
A. Data Structure D. A tree is a special case of a connected
B. Algorithm graph with only undirected edges and no
cycles.
C. Interface
D. Implementation 171. If the character ‘V’, ‘I’, ‘V’, ‘A’ are
placed in queue (in order), and being re-
166. print type(type(int)) moved one at a time, choose the order for
A. type ‘int’ the character after that
B. type ‘type’ A. AVIV
C. error B. VIVA
D. 0 C. VAVI
D. IVAV
167. To evaluate an expression without any
embedded function calls: 172. Which of the following is not the type of
A. One stack is enough queue?
B. Two stacks are needed A. Priority Queue
C. As many stacks as the height of the ex- B. Single ended Queue
pression tree are needed C. Ordinary Queue
D. A Turing machine is needed in the gen- D. Circular Queue
eral case
173. Which of the following function is more
168. In a circular queue, how do you increment appropriate for reading in a multi-word
the rear end of the queue? string?
A. rear++ A. puts()

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 100

B. gets() B. print(”df grades”)


C. printf() C. print(df grades)
D. scanf() D. display(df grades)

174. An algorithm should have 1 or more well- 179. Which of the following principle does
defined , and should match the desired Queue use?
A. LIFO principle
A. Unambigous

NARAYAN CHANGDER
B. FIFO principle
B. Input
C. Linear tree
C. Output
D. Ordered array
D. Finiteness
180. What is an advantage of a linear search?
175. The maximum time taken by linear search
algorithm when A. It is very quick

A. Search element is in the middle of an B. It only works with ordered lists


array C. It is a simple algorithm
B. Search element is present as the first D. none of above
item
181. The algorithm scans the list by swapping
C. Search element is the maximum of all
the entries whenever pair of adjacent keys
items
are out of desired order
D. Search element is present as the last
A. Insertion sort
item
B. Quick sort
176. How do you write a for each loop that
iterates through an ArrayList of Strings? C. Selection sort

A. for each (String s in list) {} D. Bubble sort

B. for each (String s:list) {} 182. In push operation of stack if TOP=MAX-1


C. for (Integer i:list) {} then stack is
D. for (String s:list) {} A. full
B. empty
177. loops (do, for, while), flow-control (if-
else), are example of common construct C. half
can be used to D. all of above
A. Write a Program
183. In linked list each node contain minimum
B. Write a Codes of two fields. One field is data field to
C. Write a Algorithm store the data second field is?
D. Write a Data Structures A. Pointer to character
B. Pointer to integer
178. Which of the following commands can be
used to print data frame df grades? C. Pointer to node
A. Print(”df grades”) D. Node

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 101

184. What is Breadth-First search? 189. Its from entities similar of attributes
form.
A. A search method that scans from the

PRACTICE BOOK» NOT FOR SALE


root down to the deepest leaf A. Attribute and Entity
B. A search engine like google B. Entity Set

C. A search method that searches the C. Field


branches only D. Record
D. A search method that searches nodes 190. Which of the following statement about
row by row binary tree is CORRECT?
185. Which of the following operators cannot A. Every binary tree is either complete or
be used to extract elements from atomic full
vectors? B. Every complete binary tree is also a
full binary tree
A. $
C. Every full binary tree is also a com-
B. [[
plete binary tree
C. [ D. A binary tree cannot be both complete
D. none of above and full

186. C++:SET and MAP Java:TreeMap and 191. Which of the following is not an advan-
TreeSet tage of trees?

A. Are libraries for BST A. Hierarchical structure


B. Faster search
B. Are libraries for Vector
C. Router algorithms
C. Are libraries for graph
D. Undo/Redo operations in a notepad
D. none of above
192. is a physical representation of an
187. Which type of linked list comprises a node ADT.
containing a pointer to predecessor as well A. Data Structure
as successor?
B. Data
A. Doubly Linked List
C. Datatype
B. Circular Linked List
D. All the above
C. Both a & b
193. Identify the correct statement:
D. None of the above
A. Stack is FIFO and Queue is LIFO
188. the condition indicate the queue is B. Stack is LIFO and Queue is FIFO
empty.
C. Stack and Queue are both LIFO
A. Front=Null D. Stack and Queue are both FIFO
B. Null=Front
194. What is the number of edges present in
C. Front=Rear a complete graph having n vertices?
D. Rear=Null A. n

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 102

B. (n*(n+1))/2 200. An algorithm is a set of well-defined in-


structions in sequence to solve a problem.
C. (n*(n-1))/2
D. (n*(n-1)) A. True
B. False
195. Data items that are divided into sub
items C. Maybe

A. Data D. None of the above

NARAYAN CHANGDER
B. Data Item 201. Algorithms must terminate after a finite
C. Group Items number of steps.

D. Elementary Items A. structure


B. finiteness
196. Which of the following is NOT an exam-
ple of application software? C. infinite
A. Photoshop D. software
B. Microsoft Word 202. The decision tree structure begins at a
C. Windows 7 node called the
D. Internet Explorer A. span
B. top
197. Which of these is NOT a search algorithm
C. root
A. Binary
D. branch
B. Linear
C. Bubble 203. Initially the keys like M, S, G, H, B, V, W,
D. none of above T are inserted into Binary Search Tree. It
has been checked and madeto an AVL tree.
198. Which of the following can be stored in a The CORRECT option is
python list? A. S forms the leaf node
A. A string B. S forms the root node
B. A float C. S has two children
C. An integer D. S has only Right child T
D. All of the options
204. It can be used to encapsulate parts of an
199. How many passes will a bubble sort go algorithm by localizing in one section of a
through? program all the statements relevant to a
certain aspect of a program.
A. Only one pass
A. Algorithms
B. Two passes
B. Pseudocodes
C. Several passe-until the data is fully or-
dered C. Flowcharting
D. none of above D. Procedures

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 103

205. Which of the following is not a sorting 210. In a graph if E=(u, v) means
algorithm? A. u is adjacent to v but v is not adjacent

PRACTICE BOOK» NOT FOR SALE


A. Bubble Sort to u
B. Long Sort B. e begins at u and ends at v
C. Insertion Sort C. u is processor and v is successor
D. none of above D. both b and c

206. In stack insertion and deletion can take 211. To measure Time complexity of an algo-
place only at one end call the of the rithm Big O notation is used which:
stack. A. describes limiting behaviour of the
A. Path function
B. Function B. characterises a function based on
growth of function
C. Top
C. upper bound on growth rate of the
D. Bottom function
207. Which of the following data structure al- D. all of the mentioned
lows you to delete the elements from both
the ends while insertion from only one 212. DFT is equivalent to which of the traver-
end? sal in the Binary Trees?

A. Input-restricted queue A. Post-order traversal

B. Output-restricted queue B. In-order traversal

C. Priority queue C. Pre-order traversal

D. Circular Queue D. Level-order traversal

213. Which of the following is the use of id()


208. which of the following case does not ex-
function in python?
ist in complexity theory
A. Id returns the identity of the object
A. Best case
B. Every object doesn’t have a unique id
B. worst case
C. All of the mentioned
C. Average case
D. none of above
D. Null case
214. In linked list each node is divided into
209. User perform following opera- parts?
tions on stack of size 5 then-
A. one
push(1);pop();push(2);push(3);pop();push(2);pop();pop();push(4);pop();pop();push(5);
B. two
A. Overflow Occurs C. three
B. Stack Operations will be performed D. four
Smoothly
215. If the insertion and deletion happens
C. Underflow Occurs from both the ends then the queue is called
D. None of these a Queue

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 104

A. Deque C. Delete
B. Header D. Search
C. Queue 221. O(n) means that your algorithm will take
D. Circular Queue on the order of operations to find the
minimum item
216. There are 3 Basic sorting algorithms the
Bubble Sort, Insertion Sort, Selection Sort. A. n2
Which of these is the slowest? B. n-1

NARAYAN CHANGDER
A. Insertion C. n
B. Selection D. none of above
C. Bubble 222. What is the output of the following pro-
D. Quick gram? print((1, 2) + (3, 4))

217. If a=(1, 2, 3, 4), a[1:-1] is A. (4, 6)

A. [2, 3] B. (1, 2, 3, 4)

B. (2, 3) C. ((1, 2), (3, 4))

C. [2, 3, 4] D. Error

D. Error, slicing doesn’t exist 223. is neither an algorithm nor a pro-


gram.
218. Two or more nodes with the same parent
are A. Computing

A. child B. Pseudo code

B. parent C. Computer science

C. siblings D. None of the above

D. none of above 224. Give the output of the following


code:#include<stdio.h>int main(){ int a =
219. In terms of data structures, what does 10, b = 15, x; x = (a > b)? a:b; printf(“x
mutable mean? = %d”, x);}
A. A mutable structure is one which can A. x = 10
only have data added to it
B. x = 15
B. A mutable structure is one which is
fixed in size C. x = 0

C. A mutable structure is one which al- D. x = 1


lows data to be added, edited, deleted or 225. Processor speed although being very
moved high, falls limited if the data grows to bil-
D. none of above lion records.

220. One or more cells that have filled cells A. Processor speed
above them B. Speed
A. Hole C. Algorithm
B. Insert D. Data Structure

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 105

226. Which of the following data structures is 231. A pile of book is an example of a
immutable? A. Stack

PRACTICE BOOK» NOT FOR SALE


A. Tuple B. Queue
B. List C. Linked List
C. Dictionary D. None of the above
D. 2d List
232. Process of Removing element from the
227. Searching of any element in a data struc- stack is called as
ture can be done in 2 ways and A. Pop
A. Sequential and random B. Push
B. linear and non linear C. Create
C. linear and binary D. Postfix
D. linear and random 233. A Queue can only store 6 data items. The
Queue is sent 4 data items:Bert, Cynthia,
228. One of the three common problems that Cedric and Albert. Where does the “Front”
applications face now-a-days.Processor pointer point if a deQueue operation is per-
speed although being very high, falls lim- formed.
ited if the data grows to billion records.
A. Bert
A. Data Search
B. Cynthia
B. Processor Speed
C. Cedric
C. Multiple Request
D. Albert
D. none of above
234. A connected planar graph having 6 ver-
229. A characteristics of Data Structure that tices, 7 edges contains regions.
memory usage of a data structure opera- A. 15
tion should be as little as possible.
B. 1
A. Correctness
C. 3
B. Time Complexity
D. 11
C. Space Complexity
235. How many fields does the node of a
D. none of above singly linked list has?
230. When a collision occurs with a hashing A. 1
function, what is one method for dealing B. 2
with the collisions?
C. 3
A. creating a new list at that index
D. 4
B. creating a new array
236. A container which can hold a fix number
C. creating a new hash table
of items and these items should be of the
D. creating a new binary tree same type. Most of the data structures

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 106

make use of arrays to implement their al- 242. What will the following statement do?
gorithms. df grades.index = [”Amna”]
A. Element A. It will add name amna in dataframe
B. Array B. It will add grades for Amna
C. Index C. It will add Amna as a new row header
D. none of above for index 0
D. It will delete Amna from data frame

NARAYAN CHANGDER
237. Which is the correct operation for:”Add
item to the rear of the queue.”
243. Should be feasible with the available re-
A. enQueue(item) sources.
B. Append.Queue(item)
A. Feasibility
C. enQueue()
B. Independent
D. AddItem(EnQueue())
C. Output
238. Insertion in Queue is done at end, and D. Finiteness
deletion is at end
A. start, last 244. An ADT is defined to be a mathematical
B. front, rear model of a user-defined type along with
the collection of all operations on that
C. rear, front model.
D. begin, stop A. Assignment
239. Essential tool in programming that gener- B. Primitive
alizes the notion of an operator.
C. Structured
A. Data Structures
D. Cardinility
B. Variable
C. Procedure 245. User push 1 element in the stack hav-
D. None of the above ing already five elements and having stack
size as 5 then stack becomes
240. Which of the following is not a type of A. Overflow
missing value in R?
B. User Flow
A. NA double
C. Underflow
B. NA integer
C. NA D. Crash

D. NA character 246. What would be the solution to the given


prefix notation?
241. Stack is also called as
A. Last in first out A. 2

B. First in last out B. 5


C. Last in last out C. 7
D. First in first out D. 10

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 107

247. is a collection of elements used to C. Multi


store the same type of data. D. none of above

PRACTICE BOOK» NOT FOR SALE


A. Array
253. What is the data structure used to per-
B. Switch form recursion?
C. Case A. Array
D. Loop B. Stack
248. used to access the members of the class C. Queue
in an object. D. Linked list
A. Instance 254. are ordered collection of data items
B. Call function of the same type referred to collectively
by a single name.
C. dot(”. “)operator
A. Index
D. none of the choices
B. Variables
249. Which of the following application makes C. Arrays
use of a circular linked list?
D. Elements
A. Undo operation in a text editor
255. What is a stack?
B. Recursive function calls
A. A data structure where only the top el-
C. Allocating CPU to resources
ement can be accessed
D. Implement Hash Tables
B. A data structure where only the bot-
250. The two major factors of data structure tom element can be accessed
complexity are: C. A data structure where groups are
A. time and location separated

B. type and size D. None of the other options

C. time and memory 256. A Data Structure is:


D. type and space A. A C++ vector
B. A way of organizing, storing and per-
251. To represent hierarchical relationship be-
forming operations on data.
tween elements, Which data structure is
suitable? C. A function in any programming lan-
guage
A. Dequeue
D. A sequence of steps to solve a prob-
B. Priority lem.
C. Tree
257. How do I access the first element in the
D. Graph array ‘songs’?
252. . A graph in which weights are assigned A. Ask politely.
to every edge is called graph. B. songs[1]
A. Weighted C. songs[0]
B. Null D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 108

258. What is the output when following 263. which of these is not core data type?
code is executed? names = [’Amir’, A. lists
‘Bear’, ‘Charlton’, ‘Daman’] print(names[-
B. dictionary
1][-1])
C. tuples
A. n
D. class
B. D
264. Which of the following data structure is
C. Daman
non linear type?

NARAYAN CHANGDER
D. Error
A. Stack
259. Based on the statement below, which of B. Queue
the following statements gives the length C. Tree
of the data array? double[ ] data = new
D. Liked list
double[10];
A. data.size() 265. Which one of the following is not the ap-
plication of the Queue data structure?
B. data.length
A. Resource shared between various sys-
C. data.size tems
D. data.length() B. Data is transferred asynchronously
260. Most Efficient Time Complexity of Topo- C. Load balancing
logical Sorting is? (V-number of vertices, D. Balancing of symbols
E-number of edges)
266. How do you write a for loop?
A. O(V + E)
A. for (int i = 0; i < 21) {}
B. O(V) B. for (int i = 0; i++) {}
C. O(E) C. for (int i = 0; i < 21; i++) {}
D. O(V*E) D. for (i) {}
261. Other name for directed graph is 267. is a specialized format to store and
organize data in a computer’s memory
A. Direct graph
disk.
B. Digraph
A. Control Structure
C. Dir-graph B. Data Structure
D. Dgraph C. Algorithm
262. Consider the functionfind ( int x, int D. Data type
y){return (( x < y )? 0:( x-y ));}Let a, b be 268. A mathematical-model with a collection
two non-negative integers.The call find(a, of operations defined on that model is
find(a, b)) can be used to find the called
A. positive difference of a, b A. Data Structure
B. maximum of a, b B. Abstract Data Type
C. minimum of a, b C. Primitive Data Type
D. sum of a, b D. Algorithm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 109

269. In data structure data items are not 274. Computer programs and games are called
in sequence. what?

PRACTICE BOOK» NOT FOR SALE


A. non linear A. Entertainmentware
B. linear B. Flashware
C. non-homogeneous C. Hardware
D. all of above D. Software

270. Pushing an element into a stack already 275. The path is a if it begins and ends at
having six elements and the size is six, the same vertex.
then the stack has A. wheel
A. Overflow B. circuit
B. Crash C. length
C. Underflow D. none of above

D. User flow 276. Are stacks FIFO or FILO?


A. FILO
271. Uses for a tree structure include
B. FIFO
A. Manipulating and searching sorted
lists of data C. LIFO
B. Copying and saving sorted lists of data D. LILO
277. Which of the following is not an applica-
C. Preparing the data for hashing tion of BFT?
D. Creating an unsorted list ready for A. GPS navigation
searching B. Peer to Peer network
272. The situation when in a linked list C. Finding bipartiteness of a graph
Head==NULLis D. Finding shortest path between two
A. Full nodes

B. Empty 278. to be able to use interpolation search, we


need to get the from the list
C. Half full
A. middle position
D. saturated
B. probing position
273. Which of the following is a benefit of us- C. interval position
ing a cloud storage option?
D. high and low position
A. It protects your computer from viruses
279. In a stack, if a user tries to remove an
element from empty stack it is called
B. You don’t need Internet access to re-
trieve the data A. empty collection
C. It provides a backup of your data, files B. underflow
and photos C. overflow
D. It is deleted over time D. garbage collection

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 110

280. What type of data structure is a stack? C. Homogeneous or non-homogeneous


A. FIFO D. none of above
B. FOFI 286. A characteristics of Data Structure that
C. LIFO Data structure implementation should im-
D. LIFI plement its interface correctly.
A. Correctness
281. Which data structure stores key/value
pairs? B. Time Complexity

NARAYAN CHANGDER
A. Sets C. Space Complexity
B. Stacks D. none of above
C. Lists 287. is a way to represent data in mem-
D. Dictionaries ory.
A. Data Handling
282. State the meaning of “void” keyword:
B. Data Structure
A. No statement
C. Data Dumping
B. No function
D. Data Collection
C. No program
D. No value 288. What kind of sorting algorithm puts the
data into piles of like data.
283. The process by which a programmer re-
A. Linear
fines an initial idea to a problem’s solution
into more specific terms. B. Bucket
A. Flowcharting C. Bubble
B. Algorithms D. Binary
C. Pseudocodes 289. What is the error in the following code
D. Stepwise Refinement fragment? double[ ] data = new dou-
ble[20];data[20] = 15.25;
284. The process where data is pushed into a
A. A cast is required
queue from one end is called
B. data not initialized
A. Dequeue
B. Enqueue C. A two-dimensional array is required

C. SetPointer D. Out-of-bounds error

D. QueueUp 290. Which node will be deleted in the linked


list using queue?
285. This characteristic describes whether the
data items are arranged in chronological A. At the head
sequence, such as with an array, or in B. At the tail
an unordered sequence, such as with a C. After all other entries are greater than
graph. the new entry
A. Static or dynamic D. After all other entries are smaller than
B. Linear or non-linear the new entry

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 111

291. A graph is a collection of nodes, called C. the middle #


and line segments called arcs or that D. # happening the most
connect pair of nodes.

PRACTICE BOOK» NOT FOR SALE


A. vertices, edges 297. Which of these is not an application of
linked list?
B. edges, vertices
A. To implement file systems
C. vertices, paths
B. For separate chaining in hash-tables
D. graph node, edges
C. To implement non-binary trees
292. In Singly Linked List Right part of the
D. Random Access of elements
node which contains
A. data 298. What is the maximum height of any AVL-
tree with 7 nodes? Assume that the height
B. address of a next node
of a tree with a single node is 0.
C. node
A. 2
D. none of above
B. 3
293. Linear Search checks every element of a C. 4
list one at a time in sequence, also called
D. 5
as sequential search.
A. MAYBE 299. is a data structure in which every indi-
vidual node consists of INFO to store data
B. TRUE
and LINK to store the address of the next
C. FALSE node.
D. None of the Choices A. Queue
294. when an algorithm generates the same B. Stack
address for different primary keys it is C. Singly Linked List
known as
D. Circular queue
A. Knock
B. Bang 300. What does a graph represent?

C. Collisions A. A list of nodes in order

D. DoubleHash B. Relationships between nodes


C. Nothing
295. What does a HashMap store?
D. A diagram of a computer network
A. Values
B. Keys and values 301. Lists and arrays are both data structures
that have the following properties (respec-
C. Keys tively)
D. Strings A. dynamic and static
296. What is the range? B. static and dynamic
A. average C. static and static
B. greatest-least D. dynamic and dynamic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 112

302. Which of the following is NOT a Type of C. Both a and b


Data Structures? D. none
A. Arrays
308. Data structure can be of two types
B. Tables namely
C. Stacks A. Simple and Nested
D. Trees B. Simple and Compound
303. What is the output of the follow- C. Sequential and random

NARAYAN CHANGDER
ing piece of code? a={1:”A”, 2:”B”, D. All of the above
3:”C”}print(a.get(1, 4))
309. When creating the array ‘scores(9)’,
A. “A”
what does the ‘9’ in brackets represent?
B. True
A. The number of elements the array can
C. 4 hold
D. Error B. The largest number of digits an ele-
ment can hold
304. Select a real life situation implement
stack C. The largest number of characters an
element can hold
A. All of the answers
D. none of above
B. The cars a garage the first car in will
be the last car out of the garage 310. is an operation in arrays that allows
C. The batteries in a flashlight us to query for an element from the array.

D. The person wear bangles A. Search


B. Delete
305. Any two nodes which are connected by
an edge in a graph are called nodes. C. Edit

A. Adjacent D. Insert

B. Proper 311. The elements in a queue are added at one


end called
C. Node
A. front
D. None of above
B. rear
306. Which type of traversal of binary search
C. near
tree outputs the value in sorted order?
D. none of above
A. Pre-order
B. Post-order 312. A FIFO structure implemented as a ring
where the front and rear pointers can
C. In-Order
wrap around the end of the start of the
D. None array.
307. form of access is used to add and re- A. Linear Queue
move nodes from a queue. B. Circular Queue
A. LIFO, Last In First Out C. Priority Queue
B. FIFO, First In First Out D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 113

313. In doubly linked lists 318. What are the 3 depth traversals for a
tree data structure?
A. a pointer is maintained to store both

PRACTICE BOOK» NOT FOR SALE


next and previous nodes. A. Pre-, In-and Post-order
B. two pointers are maintained to store B. Pro-, In-and Past-order
next and previous nodes. C. Pre-, Out-and Post-order
C. a pointer to self is maintained for each D. Pre-, In-and New-order
node.
319. In a doubly linked list, the number of
D. none of the above. pointers affected for an insertion opera-
tion will be
314. How many swaps needed to sort the fol-
A. 4
lowing numbers using a selection sort.5, 1,
12, -5, 16, 2, 12, 14 B. 0

A. 8 C. 1
D. None of these
B. 6
C. 7 320. A hash table is
A. an abstract data structure
D. 5
B. an array
315. People have used the word to mean C. an integer
computer information that is transmitted
or stored. D. made of pine

A. Beta 321. In the linked list implementation of queue,


where will the new element be inserted?
B. Data
A. At the middle position of the linked list
C. Database
D. None of above B. At the head position of the linked list
C. At the tail position of the linked list
316. Which of the following traversal outputs
the data in sorted order in a BST? D. None of the above

A. Preorder 322. Types of data structures are


B. PostOrder A. Primitive and non-primitive.

C. Inorder B. Linear and non-linear.


C. Static and dynamic.
D. None of the above
D. All above
317. In Linked List implementation, a node car-
323. Which of the following is / are the Appli-
ries information regarding
cations of a Linked List?
A. Data
A. Polynomial
B. Link B. Sparse Matrix
C. Data and Link C. Set
D. None D. All the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 114

324. How do you call this special function that C. 2e


is used to map a given value with a partic- D. en
ular key for faster access of elements?
A. merge 330. If the size of the stack is 10 and we try
to add the 11th element in the stack then
B. sorted array
the condition is known as
C. hash
A. Underflow
D. bubble

NARAYAN CHANGDER
B. Garbage collection
325. are each variable or cell in an Array.
C. Overflow
A. Array
D. None of the above
B. Variable
C. Element 331. Example of linear data structure except

D. Index A. array
B. tree
326. What data structure is used when con-
verting an infix notation to prefix nota- C. queue
tion? D. stack
A. Stack
332. If the elements ‘20’, ‘10’, ‘300’ and
B. Queue
‘25’ are inserted in a queue, what would
C. B-Trees be order for the removal?
D. Linked-list A. 25 300 10 20
327. data structures are those whose B. 10 20 25 300
sizes and structures associated memory lo- C. 20 10 300 25
cations are fixed at compile time.
D. none of above
A. linear
B. homogeneous 333. There are two types of queue data struc-
ture. They are
C. static
D. dynamic A. Circular and linear
B. Round and straight
328. What is a dynamic structure?
C. Oval and rectangular
A. A structure that can be moved
D. Cylinder and simple
B. A structure which’s size can change
C. A structure that moves by itself 334. What is a data structure?
D. A structure that works A. A method of arranging data
329. For an undirected graph G with n vertices B. A way of keeping data without an or-
and e edges, the sum of the degrees of der?
each vertex is C. A “stack” only
A. ne D. There is no formal definition for “Data
B. 2n Structure”

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 115

335. A single elementary unit of information B. It is saved in the users document files
representing an attribute of an entity

PRACTICE BOOK» NOT FOR SALE


A. Attribute and Entity C. It is saved in the computer’s data stor-
B. Entity Set age files

C. Field D. It is synced automatically with the


cloud
D. Record
341. Every object is an of a class.
336. The of an Array are indicated by the
number of square brackets beside it. A. Instance
A. Index B. Methods
B. Elements C. Variables
C. Array D. none of the choices
D. Dimension 342. Data that a variable can hold in a pro-
gramming language, all programming lan-
337. It is a systematic way to organize data
guage has a set of it.
in order to use it efficiently.
A. Data Types
A. Data Structure
B. Algorithms
B. Algorithm
C. Programming
C. Interface
D. Variables
D. Implementation
343. In the array ‘numbers(6, 10, 7, 12, 9,
338. Root has more left descendants than the
2)’, what is the value of element num-
right descendants or vice versa.
bers(4)?
A. Balanced Tree
A. Nine
B. Perfect Tree
B. Twelve
C. Right Tree
C. Two
D. Unbalanced Tree
D. none of above
339. When a pop() operation is called on
344. A stack is what type of data movement
an empty queue, what is the condition
structure?
called?
A. LIFO
A. Overflow
B. Underflow B. FIFO

C. Syntax Error C. LILO

D. Garbage Value D. LOLI

340. Which statement best describes what 345. Which of the following can be done with
happens to the temporary working mem- LinkedList?
ory (RAM) of a computer when it is shut A. Implementation of Stacks and Queues
down?
A. It is deleted B. Implementation of Binary Trees

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 116

C. Implementation of Abstract Data 351. (A+B) is example of which of the follow-


Structures with dynamic memory alloca- ing notation.
tion
A. infix
D. All of the above
B. prefix
346. What is a mutable structure? C. postfix
A. A structure that allows its data to be D. none of above
changed

NARAYAN CHANGDER
B. A structure that allows its data to be 352. chr( ord (’A’) )
edited A. A
C. A structure that allows its data to be B. B
deleted
C. a
D. A structure that allows its data to be
moved D. error

347. It is an input to a computer. 353. Which one of the following is an applica-


tion of Queue Data Structure?
A. Input
B. Data A. When a resource is shared among mul-
tiple consumers.
C. Information
B. When data is transferred asyn-
D. Raw Data chronously (data not necessarily received
348. Which of these is a type of searching al- at same rate as sent) between two pro-
gorithm? cesses

A. Linear search C. Load Balancing


B. Word search D. All of the above
C. Search engine 354. If the number of records to be sorted is
D. none of above small, identify the suitable sorting to be
used
349. All are sorting algorithms except
A. Quick sort
A. Insertion
B. Merge sort
B. Bubble
C. Selection sort
C. Selection
D. Bubble sort
D. Detection

350. Which of the following is useful in 355. Which of the following statements will
traversing a given graph by breadth first give header to columns for df grdaes
search? DataFrame?
A. List A. df grades.column
B. Set B. df grades.columns
C. Queue C. df grades columns
D. Stack D. df grades.columnnames

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 117

356. In preorder traversal of a binary tree the C. peep


second step is
D. all of the above

PRACTICE BOOK» NOT FOR SALE


A. traverse the right subtree
B. traverse the left subtree 362. Array can be considered as set of ele-
ments stored in consecutive memory loca-
C. traverse right subtree and visit the
tions but having
root
A. same data type
D. visit the root
B. different data type
357. One important categories of algo-
rithms:Algorithm to delete an existing C. same scope
item from a data structure. D. none
A. Delete
B. Sort 363. L = [’a’, ‘b’, ‘c’, ‘d’]print “”.join(L)

C. Insert A. error
D. Update B. none

358. Which of these in NOT a linear data struc- C. abcd


ture? D. [’a”b”c”d’]
A. Tree
364. Which of the following statements is NOT
B. Stack
TRUE about PSEUDOCODES?
C. Array
A. textual presentation of a flowchart
D. Queue
B. close to a natural language
359. Topological sort is equivalent to which of
C. the control structures impose the logic
the traversals in trees?
A. Pre-order traversal
D. None of the choices
B. Post-order traversal
C. In-order traversal 365. Process of inserting an element in stack
D. Level-order traversal is called
A. Create
360. The operation to arrange all elements in
required order is called: B. Push
A. Search C. Evaluation
B. Insertion D. Pop
C. Sorting
366. Which principle works on Queue?
D. Merging
A. LIFO
361. operation adds an element to the top
of the stack. B. FiFO
A. pop C. LILO
B. push D. All the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 118

367. Which search algorithm would be best to 372. Ordered set of a variable number of el-
use with ordered data? ements to which additions and deletions
may be made
A. A binary search
A. List
B. Either binary search or a linear search
B. Array
C. A linear search C. Variables
D. none of above D. Constants

NARAYAN CHANGDER
368. What would be needed if searching algo- 373. The number of edges from the node to the
rithms didn’t exist? deepest leaf is called of the tree.
A. Height
A. The data would need to be saved
B. Depth
B. Each item of data would need to be
looked at one by one, until the searched C. Length
for data was found D. Width
C. A new set of data to look at would be
needed 374. What is the proper way to get the num-
ber of items in an ArrayList called list?
D. none of above
A. list.length
369. The minimum number of dimensions in a B. list.size
matrix? C. list.length()
A. 2 D. list.size()
B. 3
375. In Singly Linked List Left part of the node
C. 10 which contains may include a simple
D. 12 data type, an array or a structure.
A. data
370. If START= then it means that the
singly linked list is empty and contains no B. node
nodes. C. address
A. FULL D. none of above
B. NULL 376. One important categories of algo-
C. START rithms:Algorithm to insert item in a data
structure.
D. none of above
A. Search
371. is a collections of facts. B. Sort
A. Datatype C. Insert
B. Data D. Update
C. Record
377. The height of a binary tree is the maxi-
D. Information mum number of edges in any root to leaf

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 119

path. The maximum number ofnodes in a D. To run a piece of code if a condition


binary tree of height h is: isn’t met
A. 2h − 1

PRACTICE BOOK» NOT FOR SALE


383. What will happen during a dequeue oper-
B. 2h−1 − 1 ation and the algorithm found out that the
C. 2h+1 − 1 list is already empty?
A. an underflow error message will ap-
D. 2 ∗ (h + 1)
pear
378. Which is not a typical subroutine used in B. an overflow error message will appear
the implementation of a queue?
A. isFull() C. an error message will appear
B. isEmpty() D. a queue is full error message will ap-
C. enQueue(item) pear
D. deQeueue(item) 384. What would be the result of the follow-
ing vector addition? a=(2.0, 3.0)b=(1.6,
379. how many pointers are available in circu-
5.0) c=a+b
lar linked list
A. c=(7, 4.6)
A. 5
B. c=(3.6, 8)
B. 3
C. c=(5, 6.6)
C. 2
D. c=(2, 3)
D. 1
385. Pushing an element into stack already
380. In pop operation of stack if TOP=NULL having five elements and stack size of 5,
then stack is then stack becomes
A. full A. Overflow
B. empty B. Crash
C. half C. Underflow
D. all of above D. None of the above
381. output of following code? 386. void is data type.
A. 4.5 A. primary
B. 4.0 B. derived
C. 4 C. user defined
D. error D. none of above

382. What are for loops used for? 387. Which of the following applications may
use a stack?
A. To run a piece of code only when a cer-
tain condition is met A. A parentheses balancing program
B. To run a piece of code repeatedly until B. Tracking of local variables at run time
a condition is met C. Compiler Syntax Analyzer
C. To run a piece of code repeatedly for- D. Data Transfer between two asyn-
ever chronous process

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 120

388. It is the process of arranging a list of el- C. tree


ements in a particular order. D. none of above
A. Search
394. Which of the following is false about a
B. Sorting doubly linked list?
C. Elements A. We can navigate in both the directions
D. none of above
B. It requires more space than a singly
389. Stack uses data structure as the ele-

NARAYAN CHANGDER
linked list
ment that was inserted last is the first one
to be taken out. C. The insertion and deletion of a node
take a bit longer
A. LIPO
D. Implementing a doubly linked list is
B. FIFO
easier than singly linked list
C. LIFO
395. The maximum degree of any vertex in a
D. FIPO
single graph with N vertices is
390. List of data in which element can be in- A. N
serted and removed at the same end is
B. N-1
called as
C. N+1
A. array
D. 2N+1
B. stack
C. linked list 396. A graph in which some of the edges are
directed and some are undirected is called
D. queue

391. Generally is used to store large A. directed graph


amount of data. B. undirected graph
A. array C. mixed graph
B. linked list D. none of above
C. both a and b
397. What type of data structure is an array?
D. none of above
A. Static and mutable
392. It used to used an algorithm to search an B. Dynamic and immutable
item in a data structure.
C. Static and immutable
A. update
D. none of above
B. Search
398. What is the output of [ used on a list con-
C. delete
sisting of four character vectors, ls? For
D. store instance, ls[1]
393. An is any node in the path from root A. A factor
to the node. B. A data frame
A. Ancestor C. A character vector
B. Descendent D. A new, smaller list

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 121

399. A binary tree in which every node other 405. What does a searching algorithm do?
than leaf nodes has two children is called
A. Search through a set of data

PRACTICE BOOK» NOT FOR SALE


A. full binary tree B. Save a set of data
B. complete binary tree C. Help to organise data
C. half binary tree D. none of above
D. complete half binary tree
406. It is used to access each location of ar-
400. In a graph, a node which is not adjacent
rays from 0 ranging up to the instantiated
to any other node is called node
array
A. multi
A. Indices
B. single
C. isolated B. Array

D. none of above C. Integer

401. Write a list comprehension to produce the D. Square Bracket


list:[1, 2, 4, 8, 16 212].
A. [(2**x) for x in range(0, 13)] 407. A function calls itself is called

B. [(2**x) for x in range(1, 13)] A. queue


C. [(x**2) for x in range(0, 13)] B. recursion
D. [(x**2) for x in range(1, 13)] C. function
402. Time complexity of matrix multiplica- D. none of above
tion:
A. O(n) 408. Queue follows order
B. O(log n) A. FIFO (First In First Out )
C. O(n3)
B. LIFO (Last In First Out)
D. O(n2)
C. Random
403. Which sorting algorithm is more efficient
with longer lists of data? D. FILO(First In Last Out)
A. Merge Sort
409. Which of the following is not a disadvan-
B. Bubble Sort tage to the usage of array?
C. Both
A. Fixed size
D. Neither
B. There are chances of wastage of mem-
404. Time complexity of linear search: ory space if elements inserted in an array
A. O(n) are lesser than the allocated size
B. O(logn) C. Insertion based on position
C. O(1) D. Accessing elements at specified posi-
D. O(n2) tions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 122

410. One important categories of algo- 415. What does LIFO stand for?
rithms:Algorithm to update an existing A. Last In First Out
item in a data structure.
B. Least In Flow Out
A. Delete
C. Last In Flow Out
B. Sort
D. Last In First Object
C. Insert
416. Stack performs operation
D. Update

NARAYAN CHANGDER
A. PUSH
411. Which of the following is/are non- B. POP
primitive data structures?
C. both of the above
A. Arrays, Linklist
D. none of above
B. Stack, Queue
417. Why do hashing algorithms use the MOD
C. Trees, Graphs function?
D. All the above A. produces a random value
412. What does this program print? B. guarantees the value is in range
heights = [65, 56, 67, 48, C. avoids collisions
64]heights.sort()heights.extend([60, 61,
D. can work on both integers and chars
62])heights.remove(67)print(heights)
A. [48, 56, 64, 65, [60, 61, 62]] 418. One important categories of algo-
rithms:Algorithm to sort items in a certain
B. [48, 56, 60, 61, 62, 64, 65] order.
C. [48, 56, 64, 65, 60, 61, 62] A. Search
D. The program will error. B. Sort
413. What can a computer NOT do? C. Insert

A. Help you calculate a monthly budget D. Update


and determine how much is spent on food 419. What is the value of the postfix expres-
sion 6 3 2 4 +-*:
B. Beat you at a game of chess A. 1
C. Save data, files and photos for later B. 14
viewing
C. 74
D. A computer can do all of the above
D. -18
414. What is a record? 420. How many dimensions is the maximum in
A. A data structure that groups together an array
related items A. 32
B. A collection of arrays B. 16
C. A set of numbers C. 8
D. A program D. 4

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 123

421. is an example of non linear data struc- C. using vector


ture
D. using Binary Search Tree

PRACTICE BOOK» NOT FOR SALE


A. Sorting
B. Stack 427. Which one of the following is the process
of inserting an element in the stack?
C. Tree
A. Insert
D. Queue
B. Add
422. Go to statement is the part of
C. Push
A. Conditional statement
B. Unconditional statement D. None of the above

C. None of the above 428. Which data structure is mainly used for
D. none of above implementing the recursive algorithm?

423. Which one of the following is not the type A. Queue


of the Queue? B. Stack
A. Linear Queue C. Array
B. Circular Queue
D. List
C. Double ended Queue
D. Single ended Queue 429. Records are most similar to which other
function in Python?
424. The no. of edges appearing in the se-
A. Dictionaries
quence of a path is called the of the
path. B. List
A. length C. Array
B. width D. None of the other options
C. height
D. none of above 430. let nums = [2, 3, 5, 8, 9, 11];How would
you access the fourth element in nums
425. What is the most appropriate data struc- A. nums[4]
ture to implement a priority queue?
B. nums[3]
A. Heap
B. Circular array C. nums(4)
C. Linked list D. nums(3)
D. Binary tree
431. Which of the following is not a style of
426. How to store these data 78, 69, 80, graph traversal in computing?
77, 82, 75 and 81 so that the operation A. Breadth-First
on finding the minimum value will involve
shorter processing time? B. Depth-First
A. using queue C. Height-First
B. using stack D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 124

432. What is a Data Structure C. list.pop()


A. A structure of data D. list.pop(1)
B. A way of storing one type of data 438. A Binary search requires the data it is
C. A way of storing any type of data searching to be ordered in some way
D. A group of data A. True

433. In a Hash Table, what ideally should the B. FALSE

NARAYAN CHANGDER
size of the table be? C. Not all the time
A. same size as the amount of data to D. none of above
hold
439. What is the output of the following
B. an odd number
code? a={1:”A”, 2:”B”, 3:”C”}for i, j in
C. an even number a.items():print(i, j, end=” “)
D. a prime number A. 1 A 2 B 3 C
434. Which of these algorithms sorts items by B. 1 2 3
first splitting the list of items down into C. “A” “B” “C”
smaller and smaller groups?
D. 1:”A” 2:”B” 3:”C”
A. Bubble sort
440. If the tree is not empty, then the first
B. Merge sort
node is called
C. Linear search
A. leaf
D. Binary search
B. internal node
435. The essential condition which is checked C. root
before insertion in a linked queue is?
D. none of above
A. Underflow
B. Overflow 441. If the elements “A”, “B”, “C” and “D”
are placed in a stack and are deleted one
C. Front value at a time, in what order will they be re-
D. Rear value moved?
A. ABCD
436. Data structure= Organized data +
B. DCBA
A. allowed operations on it.
C. DCAB
B. allowed functions on it
D. ABDC
C. None of the above
D. none of above 442. In circular linked list, insertion of node re-
quires modification of?
437. While implementing Stack using list when
we want to delete element we must use A. One pointer
pop function as B. Two pointer
A. list.pop(0) C. Three pointer
B. list.pop(pos) D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 125

443. Which of these tree traversal methods is 448. Independent algorithm should have step-
used to output the contents of a binary by-step directions, which should be inde-
tree in ascending order? pendent of any programming code.

PRACTICE BOOK» NOT FOR SALE


A. Pre-Order A. True
B. In-Order B. False
C. Post-Order C. All of the
D. Monastic Orders D. None of the above

444. A node that is not a root or a leaf is 449. The search algorithm(s) which can be
known as node because it is found in implemented using recursive approach
the middle portion of a tree. is/are

A. root A. Linear search

B. leaf B. Binary search


C. Both Linear Search and Binary Search
C. internal node
D. tree
D. No search algorithms
445. What is called when a function is defined
450. In a Hash Table what happens if the hash-
inside a class?
ing algorithm generates the same address
A. Module for different keys?
B. Class A. this situation is impossible
C. Another Function B. collisions
D. Method C. errors
D. the hashing algorithm is run again
446. Consider the following declaration
of a two-dimensional array in C:char 451. Which of the following returns TRUE?
a[100][100]Assuming that the main mem-
A. is.finite(0)
ory is byte-addressable and that array is
stored starting form memory address 0, B. is.infinite(0)
the address of a [40] [50] is C. is.na(0)
A. 4050 D. is.nan(0)
B. 4040 452. Distinct edges which connect the same
C. 5050 end points are called edges.
D. 5040 A. parallel
B. level
447. What is the time complexity of BFT? (v-
number of vertices, e-number of edges) C. both a and b
A. O(e) D. none of above
B. O(v*e) 453. What is an array?
C. O(v + e) A. A list of variables
D. O(v) B. A list of strings

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 126

C. A series of memory locations, each 459. A linked list is a linear collection of homo-
with the same name, that hold related geneous elements called
data A. Runtime
D. none of above B. Nodes
454. It use pointer to link nodes. C. Pointers

A. Variable D. None

NARAYAN CHANGDER
B. Link List 460. Multiple requests search data simulta-
neously on a web server, even the fast
C. Pointer
server fails while searching the data.
D. Trees A. True
455. int Array[][] = new int [3] [5];What kind B. False
of array is the example above. C. All of the above
A. One Dimensional D. None of the above
B. Two Dimensional 461. The worst case occurs in linear search al-
C. Three Dimensional gorithm when
D. None of the above A. Item is not in the array at all
B. Item is somewhere in the middle of the
456. What is DataFrame? array
A. A data structure from Pandas library C. Item is the last element in the array or
B. A frame in which data is kept item is not there at all

C. A frame of windows D. Item is the last element in the array

D. A data structure from Numpy Library 462. An adjacency matrix can store informa-
tion on graphs. An adjacency list can be
457. Which programming language has arrays used for graphs with not many nodes to
whose index doesn’t have to start at 0? A. Save space
A. Pascal B. Keep the locations in sequence
B. Perl C. To make it easier to read
C. VBA D. utilise the internal language data
structure
D. C
463. Which of the following is application of
458. As applications are getting complex and Doubly Linked List?
data rich, there are three common prob-
lems that applications face now-a-days. A. moving pages forward and backward
in browser
A. Data Search
B. Giving chance to each player in a multi
B. Processor Speed player game
C. Multiple Request C. Implementing Stack
D. All of the Above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 127

464. In linked list implementation of a queue, 469. Linked lists are


the important condition for a queue to be A. static
empty is?

PRACTICE BOOK» NOT FOR SALE


B. dynamic
A. FRONT is null
C. both
B. REAR is null
D. none of above
C. LINK is empty
470. Which type of queue would be most suit-
D. None of the mentioned
able for load balancing within an OS?
465. What is an immutable structure? A. Linear
A. A structure that doesn’t allow changes B. Circular
to data
C. Priority
B. A structure that doesn’t allow its data D. none of above
to be edited
C. A structure that doesn’t allow its data 471. All are examples of data types except
to be deleted
D. A structure that doesn’t allow its data A. Int
to be moved B. Double
C. Public
466. Which is purely upper bound notation?
D. String
A. Big-oh
B. Small-oh 472. In an array, what is an element?
C. Big-omega A. The smallest number an array can hold
D. Theta
B. The biggest number an array can hold
467. are individual data / items in an ar- C. An element is one value in an array
ray.
D. none of above
A. Index
B. Element 473. This is a theoretical analysis of an algo-
rithm.
C. Type
A. A Posterior Analysis
D. Value
B. A Priori Analysis
468. Which values entered into ‘my list’ C. A Pesterio Analysis
would print a value of ‘-1’ after the pro-
D. none of above
gram has run? my list = [ ]num
= 0for thing in my list:num = num- 474. The memory address of the first element
thingprint(num) of an array is called
A. 5, -10, 6 A. floor address
B. -10, -5, 6 B. first address
C. -5, 10, 6 C. foundation address
D. -5, 0, 10, 6 D. base address

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 128

475. What does the 2pair of square brackets B. Space Utilization


mean in two dimensional arrays?
C. Space Utilization and Computational
A. Width and Height Time
B. Column and Row D. Speed Utilization
C. X and Y
481. What are the two foundation terms of a
D. None of the above
data structure?

NARAYAN CHANGDER
476. The main rules for BST are as below ex- A. INTERFACE & EXECUTION
cept
B. INTERFACE & IMPLEMENTATION
A. Items of the left subtree < x
C. INTERCONNECTION & IMPLEMENTA-
B. Items of the right subtree > = x TION
C. Items of the left subtree > x
D. INTERCONNECTION & EXECUTION
D. none of above
482. What is the biggest disadvantage of a bi-
477. Applications of Linked list nary search?
A. Polynomial Arithmetic
A. It is slow
B. Multi lists
B. It can only be used if the data is sorted
C. Radix Sort into an order
D. All the above C. It takes the data and keeps dividing it
478. In the prefix notation, as the name in half until it finds the item it is looking
suggests the operator is placed the for
operands. D. none of above
A. before
483. Which definition best describes a com-
B. after puter?
C. both a and c A. A machine with a brain and emotions
D. none of above
B. A device that collects viruses and dust
479. How many times does this program print
That’s a large class!? num students = C. A device that was invented to be
[23, 21, 33, 35, 24, 35]for num in num smarter than man
students:if num > 23:print(”That’s a
large class!”) D. A machine that stores and processes
data
A. 0
B. 1 484. A LIFO structure where the last item of
data added is the first to leave.
C. 4
D. 6 A. Stack
B. Queue
480. Linked list data structure offers consider-
able saving in C. Graph
A. Computational Time D. Linked list

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 129

485. Identify the types of sorting that is slow- B. underflow


est. C. null pointer exception

PRACTICE BOOK» NOT FOR SALE


A. Bubble sort D. all of the mentioned
B. Selection sort
491. What is the range of floating point num-
C. Quick sort
ber in C?
D. Merge sort
A. 1.7 e-38 to 1.7 e +38
486. A characteristics of Data Structure that B. 3.4 e-38 to 3.4 e +38
running time or the execution time of op-
C. 1.7 e-308 to 1.7 e +308
erations of data structure must be as small
as possible. D. 3.4 e-308 to 3.4 e +308
A. Correctness 492. The depth first traversal of a graph will
B. Time Complexity result into
C. Space Complexity A. Graph with back edges
D. none of above B. Array

487. Address < key MOD(numberOfSlots)IF C. Linked List


KEY = 5432 and numberOfSlots = D. Tree
1000Address =?
493. How many stacks are needed to imple-
A. 5 ment a queue. Consider the situation
B. 432 where no other data structure like arrays,
C. 543 linked list is available to you.

D. 5432 A. 1
B. 2
488. Collection of dinner plates at a wedding
reception is an example of C. 3
A. stack D. 4
B. queue 494. Which sorting algorithm may make multi-
C. circular queue ple swaps per pass?
D. none of above A. Bubble Sort
B. Selection Sort
489. Which are two examples of alternative
hashing algorithms? C. Insertion Sort
A. cubed & random D. none of above
B. square-point & creasing 495. A graph G is called a if it is a con-
C. div 2 & skip ahead nected acyclic graph?
D. mod & folding A. Cyclic graph

490. What is the term for inserting into a full B. Regular graph
queue known as? C. Tree
A. overflow D. Not a graph

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 130

496. Why do programmers organize their B. False


data? C. Infinite Loop
A. It is easier to access needed data D. Error
B. They do not
502. Tree has 6 edges state the number of
C. Analysis of data can only occur when nodes is present
data is organized
A. 6
D. none of above

NARAYAN CHANGDER
B. 5
497. An algorithm should have 1 or more well-
C. 7
defined outputs, and should match the de-
sired output. D. 0
A. Storage 503. Compound Data structure can be &
B. Input
C. Output A. Simple and Nested
D. Mainbrain B. Linear and Non Linear
C. Sequential and random
498. Which of the following data structures
allow insertion and deletion from both D. none of above
ends?
504. If a node having two children is to be
A. Stack deleted from binary search tree, it is re-
B. Double Ended Queue(Deque) placed by its
C. Queue A. Pre-order predecessor
D. Strings B. In-order predecessor
C. in-order successor
499. Hashing gives each item
D. Post-order successor
A. A sequential address
B. A logarithmic address 505. The keys like M, S, G, H, B, V, W, T are
C. No address inserted into B-tree of order 5. The COR-
RECT option is
D. A unique address
A. Leaf node is split, when key B is in-
500. Data Structures is about rendering data serted
elements in terms of some relationship, for B. Leaf node is split, when key G is in-
better organization and storage. serted
A. True C. Leaf node is split, and B goes to root
B. False node
C. Maybe D. Leaf node is split, and G goes to root
D. None of the above node

501. What is the output of the following? True 506. Example of non linear data structure
= Falsewhile True:print(True) A. array
A. True B. tree

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 131

C. queue 512. The complexity of linear search algorithm


is
D. stack

PRACTICE BOOK» NOT FOR SALE


A. O(n)
507. Storage for data defined in terms of set
B. O(log n)
of operations to be performed on the data
C. O(n2)
A. Arrays
D. O(n log n)
B. Variables
C. Abstract Data Types 513. Which of the following is NOT a type of
data structure?
D. Algorithms
A. Arrays
508. of a node is the number of edges ar- B. Tables
riving at that node.
C. Stacks
A. in-degree
D. Trees
B. out-degree
514. Which of the following represents the
C. inout-degree Postorder Traversal of a Binary Tree?
D. none of above A. Left → Right → Root
509. Suppose you have the follow- B. Left → Root → Right
ing series of queue operations.q = C. Right → Left → Root
Queue();q.enqueue(’hello’);q.enqueue(’dog’);q.enqueue(3);q.dequeue();What
items are left on the queue? D. Right → Root → Left

A. ‘hello’, ‘dog’ 515. Data can be in a data structure in such


a way that all items may not be required
B. ‘dog’, 3
to be searched, and the required data can
C. ‘hello’, 3 be searched almost instantly
D. ‘hello’, ‘dog’, 3 A. Organized
B. Arranged
510. Python built-in data structures are
C. Set up
A. integer, float, string
D. none of above
B. list, tuple, dictionary, sets
C. Tree, graph 516. Ordered collection of data items of the
same type referred to collectively by a sin-
D. none of above gle name
511. Graph traversal is different from a tree A. List
traversal, because B. Array
A. Trees are not connected C. Variables
B. Graphs may have loops D. Constants
C. Trees have roots
517. What happens when we write command
D. None of these ignore index = True?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 132

A. It removes the indices from data frame 522. The concatenation of two list can per-
formed in O(1) time. Which of the follow-
B. It replaces index number instead of ing variation of linked list can be used?
name A. Singly linked list
C. It replaces index names instead of B. Doubly linked list
numbers C. Circular doubly linked list
D. It removes all records from data frame D. Array implementation of list

NARAYAN CHANGDER
518. What are the advantages of arrays? 523. A collection of records of the entities in a
A. Objects of mixed data types can be given entity set.
stored A. File
B. Elements in an array cannot be sorted B. Entity Set
C. Field
C. Index of first element of an array is 1 D. Record
D. Easier to store elements of same data
524. Which game doesn’t use 2-D arrays?
type
A. Minecraft
519. What would a dynamic data structure en-
B. Battleships
tail?
C. Snake
A. Memory is allocated to the data struc-
ture as the program executes. D. Snakes and Ladders
B. Memory is allocated to the data struc- 525. Which one is the best variable name to
ture at compile time. use?
C. The size of the structure is fixed A. fullName
D. The data structure can also double as B. FULLname
TNT C. Full Name
520. What is the output of the code shown be- D. full name
low? l1=[1, 2, 3]l2=[4, 5, 6][x*y for x in
526. Which of the following is NOT an advan-
l1 for y in l2]
tage of a serial search?
A. a) [4, 8, 12, 5, 10, 15, 6, 12, 18]
A. It can be used on any set of data re-
B. [18, 12, 6, 15, 10, 5, 12, 8, 4] gardless of type
C. [4, 5, 6, 8, 10, 12, 12, 15, 18] B. It is the quickest search to use
D. [4, 10, 18] C. It is a simple algorithm, so it is easy to
write a computer program to carry it out
521. Graphs are represented using
D. none of above
A. Adjacency tree
527. What is the maximum number of possible
B. Adjacency linked list
non zero values in an adjacency matrix of
C. Adjacency graph a simple graph with n vertices?
D. Adjacency queue A. (n*(n+1))/2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 133

B. n*(n+1) 533. Select the correct tree traversal method


C. (n*(n-1))/2 for the following description:Root-Left
Subtree-Right Subtree

PRACTICE BOOK» NOT FOR SALE


D. n*(n-1)
A. Pre-Order
528. What should be the value of rear (end) if B. In-Order
the queue is full (elements are completely
occupied )? C. Post-Order

A. 1 D. none of above

B. -1 534. is an operation in arrays that allows


C. MAX + 1 us to remove an element from the array.

D. MAX-1 A. Search
B. Insert
529. of a node is the number of edges leav-
ing that node. C. Delete
A. in-degree D. Edit
B. out-degree 535. What is a tuple?
C. inout-degree A. A data value which can be modified.
D. none of above B. A data value which cannot be modified.
530. Process of inserting an element in stack
is called C. An immutable data structure that con-
tains related elements.
A. Insert
D. A data structure that can only hold 3
B. Pop
elements.
C. Overflow
536. What kind of data structure is user
D. Push
data in the following declaration? user
531. It is an operation that accesses the top of data = (”TJ”, 24, “artLover123”)
the stack A. Tuple
A. Peek B. List
B. Pop C. String
C. Push D. 2d List
D. None of the above
537. Which of the following operation will ac-
532. operation removes the element from cess each data item exactly once so that it
the top of the stack. can be processed?
A. push A. Insertion
B. pop B. Traversal
C. update C. Sorting
D. none of the above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 134

538. Given a sequence of number below:50, C. Output


60, 40, 70, 45, 55, 30, 80, 65, 35, 25, D. Finiteness
75, 85When creating a binary search tree,
what is the height of the tree? 544. In the array ‘colours(”Purple”, “Blue”,
“Red”, “Green”, “Yellow”)’, what is the
A. 3
value of the element colours(3)?
B. 4 A. Green
C. 5 B. Red

NARAYAN CHANGDER
D. 6 C. Purple
539. TREE[1]=NULL indicates is D. none of above
A. Overflow 545. Data in the data structures are processed
B. Empty by operations like insertion, deletion, sort-
ing, merging and
C. Underflow
A. Traversing
D. Full
B. Searching
540. Which of the following is not an attribute C. Retrieval
of an ordered factor? D. Both A and B
A. levels
546. Identify the correct sequence of sorting
B. class algorithms w.r.t their sorting time (in-
C. order creasing order of time taken)
D. none of above A. Insertion sort, Shell sort, Bubble sort
B. Bubble sort, Insertion sort, Shell sort
541. In Singly linked list last node address part
C. Shell sort, Insertion sort, Bubble sort
contains
D. Insertion sort, Bubble sort, Shell sort
A. NULL
547. The output of the code below is
B. FULL
stack.push(10);stack.push(15);stack.push(20);stack.push(39)
C. data .pop()stack.push(35);System.out.println(stack.peek());
D. none of above
A. 20
542. What is the postfix expression for the in-
fix expression:a-b-c? B. 35

A. a-b-c C. 39
D. 10
B. ab-c-
C. abc 548. How many steps needed to sort the fol-
lowing numbers using a selection sort. 5
D. -ab-c 1 12-5 16 2 12 14
543. An algorithm should have 0 or more well- A. 8
defined B. 6
A. Unambigous C. 7
B. Input D. 5

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 135

549. What is the space complexity for DFT? C. Array


A. O(v) D. Tree

PRACTICE BOOK» NOT FOR SALE


B. O(v + e)
555. If the insertion and deletion happens
C. O(e) from both the ends then the deletion is
D. O(v*e) called a

550. It is a step by step process to solve a A. Deque


given problem. Take the simplest example B. Enqueue
below.
C. peek
A. Pseudo code
D. full
B. Programming
C. Algorithm 556. Are the data items presented to the out-
side world as the result of the execution
D. none of above of a program based on the algorithm.
551. The data type keyword NOT supported in A. Input
C Language is:
B. Output
A. double
C. Procedure
B. pointer
D. Raw Data
C. union
D. enum 557. What does the term immutable mean?
A. unable to be changed
552. specifies how we enter data into our
programs and what type of data we en- B. unable to speak
ter. C. can be modified
A. data type D. can be increased in size
B. data
558. Given below, code to display “n” ele-
C. datum
ments in an array. Fill with appropriate
D. all of above valuesfor(i= ;i< ;i++)printf(”%d’’,
553. Linked list is considered as an example of list[i]);
type of memory allocation. A. 0, n
A. Dynamic B. n, 0
B. Static C. 0, n-1
C. Compile time D. n-1, 0
D. None of the mentioned
559. Two variables used in queue are
554. The data structure required to check
A. top and down
whether an expression contains balanced
parenthesis is? B. rear and front
A. Stack C. left and right
B. Queue D. rear and top

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 136

560. What does “packing” refer to in 565. Which one of the following node is con-
Python? sidered the top of the stack if the stack is
A. Creating a list implemented using the linked list?
A. First node
B. Initializing variables using values from
a list B. Second node
C. Storing multiple variables’ values by C. Third node
putting them in a collection, like a list or D. none of the above

NARAYAN CHANGDER
tuple
566. What is meant by collision in Hash Func-
D. Cramming as many commands as pos-
tions?
sible onto a single line
A. When 2 values use the same hash key
561. A Queue can only store 6 data items. The
B. When 1 or more values use the same
Queue is sent 4 data items:Bert, Cynthia,
hash key
Cedric and Albert. Where does the “Front”
pointer point? C. When there is not enough room in RAM
A. 0
D. When the data bumps into each other
B. 1
C. 2 567. sum(c(TRUE, FALSE, TRUE, TRUE))> 3
This is known as
D. 3
A. Vectorisation
562. BFS follow B. Recycling
A. first in last out C. Implicit coercion
B. first in first out D. Attributes
C. last in first out
568. The algorithm implemented in a stack is?
D. none of above
A. FIFO-the first element must come out
563. In Linked list the node that contains first from the list
the address of the first node is actually the B. WIFI-the worst element must be the
last node of the linked list. first to come in to the list
A. singly C. LIFO-the last element must be the first
B. doubly to come out from the list

C. circular D. all of the above

D. none of above 569. A is a named location that can be used


to store and organize data. And, an algo-
564. Sometimes a hash for a dictionary has du- rithm is a collection of steps to solve a par-
plicate entries. This is taken care of by ticular problem
A. rehashing A. data structure
B. deleting the data B. data variable
C. asking for help C. data storage
D. changing the hashing algorithm D. data redundancy

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 137

570. Give syntax to create a node for Single B. Pop


linked list? C. Peek

PRACTICE BOOK» NOT FOR SALE


A. newnode=(struct node *)mal-
D. None of the above
loc(sizeof(struct node*));
B. newnode=(struct node )mal- 576. Which group are examples of Cloud Stor-
loc(sizeof(struct node)); age?
C. newnode=(struct node *)mal- A. Gmail, Facebook, Dropbox
loc(sizeof(struct node)); B. CD, Flash Drive, Floppy Disk
D. newnode=(struct node )mal- C. Document File, Pictures File, Tempo-
loc(sizeof(struct node*)); rary File
571. Full form of LIFO is D. Outlook Express, Microsoft Word, Win-
A. Last Inside First Outside dows 7
B. Last Innner First Outer 577. A linked list with two address fields
C. Last In First Out A. Singly linkedlist
D. Last Impact First Out B. Doubly linkedlist
572. The last phase of refinement results in a C. Cicular linkedlist
program ready to be coded for execution. D. None
A. Stepwise Revision
578. A data structure that removes the first
B. Stepwise Refinement
added data item first is called
C. Output
A. A queue
D. none of above
B. A stack
573. Which of the following is not a logical op- C. Data
erator?
D. A row
A. & &
B. » 579. Which type of queue would be most suit-
able for a printer spooler?
C. !
A. Linear
D. ||
B. Circular
574. Which of the following would be consid-
ered an output device? C. Priority

A. CPU D. none of above


B. Keyboard 580. Which of these algorithms requires that
C. Printer the items it’s given are in order?
D. Microsoft Word A. Bubble sort
B. Merge sort
575. items are being added at the top of the
stack C. Binary search
A. Push D. Linear search

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 138

581. Elements in an array are accessed 586. A data structure that has data located
A. randomly with a key is called a

B. Sequentially A. Dictionary

C. Exponentially B. List
D. Logarithmically C. Queue
D. Spreadsheet
582. Which of the following operator can be

NARAYAN CHANGDER
used to access value at address stored in
587. What is the output of the code shown
a pointer variable?
below? L=list(’HELLO’)p=L[0], L[-1],
A. * L[1:3]’a={0}, b={1}, c={2}’.format(*p)
B. & A. Error
C. → B. a=’H’, b=’O’, c=[’E’, L’]
D. . C. a=’H’, b=’E’, c=[’L’, L’, ‘O’]
583. Choose correct output for the following D. a=’H’, b=’E’, c=’L’
sequence of operations.push(5)push(8)poppush(2)push(5)poppoppoppush(1)pop
588. Which of the following is not a valid ar-
ray?
A. 85251
A. names=(”Tom”, “Ali”, “22”, “Con-
B. 85521
nie”)
C. 82551
B. scores=(2, 3, 5, 4, 2, 1)
D. 81255
C. names=(”Tom”, “Ali”, 22, “Connie”)
584. Determine the output:#include D. none of above
<stdio.h>int main(){ char a[] =”C Program-
ming”; char* p = & a; printf(”%s”, p+2 589. Data Structure is a way of collecting and
);} data in such a way that we can per-
A. C Programming form operations on these data in an effec-
tive way.
B. CProgramming
C. Programming A. collecting

D. rogramming B. organizing
C. performing
585. Consider the following operation
performed on a stack of size D. structure
5.Push(1);Pop();Push(2);Push(3);Pop();Push(4);Pop();Pop();Push(5);After
the completion of all operation, the num- 590. This data types can only hold whole num-
ber of elements present in stack are ber values.

A. 1 A. int
B. 2 B. double
C. 3 C. String
D. 4 D. char

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 139

591. Which of the following data structures 596. Identify the types of sorting that used
can be used for parentheses matching? the concept of divide and conquer.

PRACTICE BOOK» NOT FOR SALE


A. n-ary tree A. Insertion sort
B. priority queue B. Merge sort
C. stack C. Selection sort
D. queue D. Bubble sort

592. Graph 597. Binary TREE


A. A mathematical structure that models A. data structure similar to a graph, with
the relationship between pairs of objects. no loops.
B. an object in a graph also known as a
B. The underlying mathematical princi- vertex
ples behind the use of graphs.
C. a join of relationship between nodes-
C. An object in a graph. Also know as a also know as an arc
node.
D. a tree where each node can only have
D. A join (relationship) between two 2 child nodes attached to it
nodes.
598. which statement we should ignore in
593. Values or set of values. structure programming
A. Data A. if-else
B. Data Item B. switch
C. Group Items C. goto
D. Elementary Items D. do-while

594. What is the number of vertices of degree 599. What is the output of C Program? #in-
2 in a path graph having n vertices, here clude<stdio.h>void main(){ int *ptr, a=10;
n>2. ptr = & a; *ptr += 1; printf(”%d, %d”,
*ptr, a);}
A. n
A. 10, 11
B. n-2
B. 11, 11
C. 0
C. 11, 10
D. 2
D. 10, 10
595. The following are main components of the
hash data structures except: 600. Recursive problems are implemented by
A. Hash value A. stack
B. Hash function B. queue
C. Key C. linked list
D. Linked lists D. strings

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 140

601. A data structure that has a liner relation- 607. Which is not a type of a data structure?
ship
A. Linked List
A. Non-Linear Data Structure
B. Trees
B. Liner Data Structure
C. Linear Data C. Array
D. Linear Relationship Data D. None of the above
602. Which subject are u studying now

NARAYAN CHANGDER
608. operation changes the value of ele-
A. c ment given by user of the stack.
B. python A. push
C. c++ and data structures
B. pop
D. none of above
C. peep
603. If node N is a terminal node in a binary
tree then its D. update
A. Right tree is empty
609. This structure uses a pointer to link
B. Left tree is empty nodes.
C. Both left & right sub trees are empty
A. Variable
D. Root node is empty
B. Link List
604. Which of the following is a disadvantage
of a linked list? C. Pointer
A. Efficient Memory Utilization D. Trees
B. Not cache friendly
610. A list of elements in which enqueue op-
C. Dynamic Data Structure
eration takes place from one end, and de-
D. Insertion and Deletion Operations are queue operation takes place from one end
Easier is
605. Which of the following is an infix expres- A. Stack
sion?
B. Binary Search Tree
A. (a+b)*(c+d)
B. ab+c* C. Graph

C. +ab D. Queue
D. abc+*
611. A Kind of tree where every node in a tree
606. In the following code, i is a/an ? i= can have at most two children.
(2)
A. Binary Tree
A. String
B. Binary Expression Tree
B. Tuple
C. Int C. Tree
D. Boolean D. Binary Search Tree

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 141

612. Select the correct tree traversal method 617. Circular Queue is also known as
for the following description:Left Subtree- A. Ring Buffer
Right Subtree-Root

PRACTICE BOOK» NOT FOR SALE


B. Square Buffer
A. Pre-Order
C. Rectangle Buffer
B. In-Order
D. Curve Buffer
C. Post-Order
D. none of above 618. Under which data structure category
does the Stack fall?
613. It is a specialized way of storing and or- A. Homogeneous
ganizing data in a computer so that it can
be used efficiently. B. Built-in
A. Data Structure C. Non linear
B. Data Type D. Linear
C. Variables 619. What is the reason for using a “circular
D. none of above queue” instead of a regular one?
A. running time of enqueue() is improved
614. A computer program is a collection of
to perform a specific task. For this, a com-
puter program may need to store data, re- B. reuse empty spaces
trieve data, and perform computations on C. you can traverse all the elements more
the data. efficiently
A. instructions D. none of the above
B. symbols 620. What is meant by ‘declaring’ an array?
C. variable A. Create an array in a program, specify-
D. data types ing its name and size
615. When the keys like M, S, G, H, B, V, W, B. creating a program, specifying its size
T are inserted into Binary Search Tree, the
CORRECT option is C. create a program, specifying its name
A. W is an internal node
B. V is a leaf node D. create a program
C. S is a root node 621. Why does a bubble sort do a final pass
D. B is a leaf node even when the data is in the correct or-
der?
616. Arranging elements of a data structure in A. To save the data
increasing or decreasing order is known as
B. It does not recognise that the data is
in order until the final pass requires no
A. Searching changes
B. Arrangement C. It needs to do this to put the data back
C. Sorting in to a list
D. Indexing D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 142

622. The search algorithm(s) which can be im- C. Eleven elements


plemented using iterative approach is/are D. none of above
A. Linear search
628. Show the content of a queue after the fol-
B. Binary search lowing operations are execute. Initialize
C. Both Linear Search and Binary Search (Q)Add (A, Q)Add (F, Q)Add (X, Q)Remove
(Q)
D. No search algorithms A. A and F

NARAYAN CHANGDER
623. In terms of an array, what is an index? B. A and X
A. A value which points to a data element C. F and X
in an array D. A, F and X
B. The first element in an array
629. Weighted graph
C. A list of all the elements in an array
A. a graph that has a data value labelled
D. none of above on each edge.
624. In notation, the operator is placed be- B. The underlying mathematical princi-
tween the operands. ples behind the use of graphs.
A. infix C. An object in a graph. Also know as a
node (vertices is the plural).
B. prefix
D. A join (relationship) between two
C. postfix
nodes-sometimes called an edge.
D. none of above
630. Which of the following is not an inherent
625. In C programming language, which of the application of stack?
following type of operators have the high-
A. Implementation of recursion
est precedence?
B. Evaluation of a postfix expression
A. Relational operators
C. Job scheduling
B. Equality operators
D. Reverse a string
C. Logical operators
D. Arithmetic operators 631. operation returns the value of the
topmost element of the stack.
626. How do you iterate through a HashMap
A. push
using a for each loop?
B. pop
A. for each (String key:map.keySet()) {}
B. for each (String key:map) {} C. peep

C. for (String key:map) {} D. update

D. for (String key:map.keySet()) {} 632. int is data type.

627. How many elements would the array A. user defined


‘student marks(10)’ hold? B. derived
A. Nine elements C. primary
B. Ten elements D. all of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 143

633. Which of these algorithms eliminates half C. Retrieval


of its possibilities each time it makes a D. Both A and B
check?

PRACTICE BOOK» NOT FOR SALE


A. Binary search 639. Which word describes lot of collisions
with using hashing?
B. Bubble sort
C. Merge sort A. contiguous

D. Linear search B. traffic


C. clustering
634. In Queue Insertion & Deletion take place
at D. mutable
A. same end 640. What is used to define a block of code
B. first end (body of loop, if else etc.) in Python?
C. different end A. Indentation
D. last end B. Curly Braces
635. In this type of search, a sequential search C. Parenthesis
is made over all items one by one. D. Quotation
A. Search
641. is visualized as vertical collections.
B. Binary Search
A. stack
C. Linear Search
D. none of above B. queue
C. circular queue
636. Which of these algorithms searches for
something by first looking in the middle of D. none of above
a list?
642. LIFO stands for
A. Bubble sort
A. List of Outputs
B. Merge sort
B. Last in First Out
C. Linear search
C. First in Last Out
D. Binary search
D. None of them
637. Act of adding values into a stack is called
A. Popping 643. In doing shell sort algorithm, what will
you do after you swapped the values us-
B. Polling ing the Knuth’s formula and the interval of
C. Pushing 1?
D. None A. Sort the remaining sub list using bub-
ble sort
638. Data in the data structures are processed
by operations like insertion, deletion, sort- B. Identify the pivot value then imple-
ing, merging and ment merge sort
A. Traversing C. Use insertion sort
B. Searching D. all of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 144

644. It is a mathematical object which arises A. generate


in many physical problems, consists of m B. unambiguous.
rows and n columns
C. precise
A. Array
D. meaning
B. Matrix
650. How can we describe an array in the best
C. Table
possible way?
D. Excel
A. The Array shows a hierarchical struc-

NARAYAN CHANGDER
645. removal of items is from the top ture.
A. Push B. The Array shows a hierarchical struc-
ture.
B. Pop
C. The Array is not a data structure
C. Peek
D. Container that stores the elements of
D. None of the above similar types
646. Which is an abstract data type that 651. A collection of field values of a given en-
serves a collection of elements called push tity
and pop?
A. Attribute and Entity
A. Queue
B. Entity Set
B. Stack
C. Field
C. Array
D. Record
D. none of above
652. Every stack has a variable associated
647. A linked list contains a pointer variable with it.
called , which stores address of first
A. TOP
node in the list.
B. BOT
A. LAST
C. POT
B. START
D. none of the above
C. MIDDLE
D. all of above 653. In algorithm assignment operation is per-
formed using the symbol
648. With a data set of 0, 1, 3, 6, 7, 8, 9How A. =
many steps would a binary search take to
find the value 8? B. :=
C. ++
A. 2
D. ==
B. 4
C. 3 654. . An edge of a graph which joins a node
to itself is called
D. 7
A. node
649. Algorithm should be clear and Each B. loop
of its steps (or phases), and their in-
puts/outputs should be clear and must C. tree
lead to only one meaning D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 145

655. Which of these is not a data structure? 660. An algorithm is


A. Stack A. A set of steps to follow in order

PRACTICE BOOK» NOT FOR SALE


B. Array B. When you sort data into the correct or-
C. Integer der
D. List C. When you search data for a specific en-
tity
656. One of the three common problems that
applications face now-a-days.As thou- D. none of above
sands of users can search data simulta-
neously on a web server, even the fast 661. Which of these pieces of code would re-
server fails while searching the data. turn the name “Harry” from the follow-
ing list? nameList = [”John”, “Harry”,
A. Data Search “Jesse”, “John”, “Harry”, “Harry”]
B. Processor Speed A. nameList()
C. Multiple Request
B. nameList[1]
D. none of above
C. NameList(4)
657. What is the information, which a D. nameList[”4”]
LinkedList’s Node must store?
A. The address of the next node if it exists 662. What is an advantage of a binary search
A. It’s very quick
B. The value of the current node
B. It only works with ordered lists
C. Both (A) and (B)
C. It is a simple algorithm
D. None of the above
D. none of above
658. Why does a circular queue use the MOD
function? 663. The worst case occurs in linear search al-
gorithm when
A. to check how many items are in the
queue A. item is somewhere in the middle of the
B. to calculate the next index to use when array
inserting an item into the queue B. item is not in the array at all
C. to check if the queue is full C. item is the last element in the array
D. to check if the queue is empty D. item is the last element in the array or
659. An algorithm shouldn’t include computer is not there at all
code. Instead, the algorithm should be
664. In Linked List implementation, a node car-
written in such a way that it can be used
ries information regarding
in different
A. software A. Data

B. programming languages. B. Link


C. hardware C. Data and Link
D. software and hardware D. Node

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 146

665. In linked list implementation of a queue, 671. The height of a tree is the length of the
where does a new element be inserted? longest root-to-leaf path in it. The max-
A. At the head of link list imum and minimum number ofnodes in a
binary tree of height 4 are
B. At the centre position in the link list
A. 31 and 5
C. At the tail of the link list
B. 32 and 5
D. None of the mentioned
C. 15 and 5
666. Algorithm is a procedure.

NARAYAN CHANGDER
D. 15 and 4
A. shortcut
B. function 672. is very useful in situation when data
have to stored and then retrieved in re-
C. reverse
verse order.
D. step by step
A. Stack
667. In the stack process of inserting an ele- B. Queue
ment in the stack is called as
C. List
A. Create
D. Link list
B. Evaluation
C. Push 673. What is a weighted graph?
D. Pop A. A graph that holds values between
nodes
668. What does a linked list use to store it’s
data? B. A heavy graph
A. Module C. A graph that holds many nodes
B. Node D. A graph that holds many edges
C. Array 674. What would the following program print
D. Step to the screen when run? my list
= [7, 0, 0, “d”, “n”, “o”, “B”]my
669. Which one of the below mentioned is lin- list.reverse()for thing in my
ear data structure? list:print(thing)
A. Queue A. 700dnoB
B. Stack
B. 007Bond
C. Arrays
C. Bond007
D. All of the above
D. 700donB
670. Which loop is most suitable to first per-
form the operation and then test thecondi- 675. In data structure, the data items are
tion? arranged in a linear sequence.
A. while loop A. linear
B. for loop B. non linear
C. do while loop C. both a and b
D. All of the mentioned D. all of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 147

676. It is consider an inventory of 1 mil- 681. In data structures all elements may
lion(106) items of a store. If the applica- or may not be of same type.
tion is to search an item, it has to search

PRACTICE BOOK» NOT FOR SALE


A. linear
an item in 1 million(106) items every time
slowing down the search B. non linear
A. Algorithm C. homogeneous
B. Data Search D. non-homogeneous
C. Data Structure
682. A linear list from which elements can be
D. Data manipulation added or removed from either end is called
677. It represents the set of operations that a A. stack
data structure supports. B. dequeue
A. Execution C. queue
B. Interconnecting
D. none
C. Interface
D. Implementation 683. What is the maximum number of children
that a node can have in a binary tree?
678. How does a Queue add/remove items? A. 3
A. Enqueue/Dequeue B. 1
B. Push/Pop
C. 5
C. Input/Output
D. 2
D. Insert/Extract
684. What is the output of the following pro-
679. How many queues are needed to im- gram? language = [’P’, ‘y’, ‘t’, ‘h’, ‘o’,
plement a stack. Consider the situation ‘n’]print(language[:-4])
where no other data structure like arrays,
linked list is available to you. A. [’t’]
A. 1 B. [’P’, ‘y’]
B. 2 C. [’P’, ‘y’, ‘t’]
C. 3 D. [’t’, ‘h’, ‘o’, ‘n’]
D. 4
685. Why are arrays used?
680. Identify the best answer for the state- A. Arrays store multiple data values un-
ment given below“ is any process of ar- der one name, reducing the complexity of
ranging items in some sequence and/or in our program
different sets, and accordingly”
B. Arrays store more data than if we
A. Searching were using variables
B. Sorting C. Arrays store more data than if we
C. Hashing were using strings
D. Fixing D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 148

686. The number of the node in the left sub- C. list.find(3);


tree and right sub-tree of the root, respec-
D. list.get(2);
tively, is
A. (4, 7) 692. Which of the following is a characteristic
B. (7, 4) of an algorithm?

C. (8, 3) A. Finiteness
D. (3, 8) B. Ambiguous

NARAYAN CHANGDER
687. Which of the following is/are the levels C. Dependent
of implementation of data structure D. Impossible
A. Abstract level
693. Given an undirected graph G with V ver-
B. Application level tices and E edges, the sum of the degrees
C. Implementation level of all vertices is
D. All of the above A. 2E
688. Which data structure allows deleting B. 2V
data elements from and inserting at rear? C. E
A. Stacks D. V
B. Queues
C. Dequeues 694. Finite set of instructions that specify a se-
quence of operations to be carried out
D. Binary search tree
A. Algorithms
689. What would be the Prefix notation for
B. Procedure
the given equation:A+(B*C)
A. +A*CB C. Flowcharting

B. *B+AC D. Pseudocodes
C. +A*BC 695. Traversing each and every record exactly
D. *A+CB once is called

690. How many passes will an insertion sort A. Insertion


go through? B. Deletion
A. Only one pass C. Traversing
B. Two passes D. Searching
C. Several passes-until the data is fully
ordered 696. The data structure which expands and
shrinks as per demand is called:
D. none of above
A. Array
691. How do you get the third element of an
ArrayList? (Remember zero-indexing!) B. Dynamic
A. list.find(2); C. Linked list
B. list.get(3); D. Non-linear

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 149

697. What will be the output of the following B. Giving chance to each player in a multi
C code? #include <stdio.h>void main(){int player game
x = 5;if (x < 1)printf(”hello”);if (x ==

PRACTICE BOOK» NOT FOR SALE


C. Implementing Stack
5)printf(”hi”);elseprintf(”no”);}
D. none of above
A. hi
B. hello 703. If the array is already sorted, then the
running time for merge sort is:?
C. no
A. O(1)
D. error
B. O(n log n)
698. In algorithm comment use by brack- C. O(n)
ets.
D. O(n2 )
A. curley
B. secure 704. State true of false.i) A node is a parent
if it has successor nodes.ii) A node is child
C. None of the above node if out degree is one.
D. both of the above A. True, True
699. What is the use of append() function? B. False, True
A. To add new row in data frame C. True, False
B. To add new column in data frame D. False, False
C. To edit last row in data frame 705. A graph where the relationship between
D. To remove first row in data frame vertices is two way.
A. Undirected Graph
700. Main Operations in Queue are Called
B. Directed Graph
A. Enqueue and Dequeue
C. Adjacency List
B. Append and Insertion
D. Adjacency Matrix
C. Push and Pop
D. append and traverse 706. Which of the following is not an aug-
mented vector?
701. Which data structure allows deleting A. Date
data elements from front and inserting
from rear? B. Tibble

A. Stack C. Factor

B. Queue D. Integer

C. Array 707. Create an array of 12 strings called


D. Linked List months.
A. String[] months = new String[12];
702. Which of the following is application of
Singly Linked List? B. String months = new String[12];

A. moving pages forward and backward C. String[] months = new String[];


in browser D. String[12] months = new String[];

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 150

708. is any node with an out-degree of C. Arithmetic expression evaluation


zero. D. All of the above
A. root
714. What is the output of the following ex-
B. internal node pression if X=345? print(“%06d”, %X)
C. parent A. 345000
D. leaf B. 000345

NARAYAN CHANGDER
709. It refers to collection of variables, pos- C. 000000345
sibly of several different data types con- D. 345000000
nected in various ways.
715. You have to sort 1 GB of data with only
A. Data Structures
100 MB of available main memory. Which
B. Database sorting technique will be most appropri-
C. Arrays ate?
D. Abstraction A. Heap Sort
B. Merge Sort
710. In type of linked lists we can traverse
in both the directions. C. Quick Sort
A. Singly linked list D. All of the above
B. Circular linked list 716. What will strcmp() function do?
C. One dimensional linked list A. compares the first n characters of the
D. Doubly linked list object
B. compares the string
711. Can boolean values be stored in an
python array? C. find the length of the string

A. Yes D. copies the string

B. no 717. The main advantage of using a linked


list is that it makes searching twice as ef-
C. As long as they only evaluate to true
ficient.
D. As long as they only evaluate to false
A. Singly
712. There is an extra element at the head of B. doubly
the list called a
C. circular
A. Antinel
D. None
B. Sentinel
718. every node contains a pointer to another
C. List header
node which is of the same type, it is called
D. List head a data type.
713. Which one of the following is an applica- A. simple
tion of Stack Data Structure? B. primitive
A. Managing function calls C. self referential
B. The stock span problem D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 151

719. It is An algorithm should have 0 or more B. list.add(1, 21);


well-defined inputs. C. list.add(2, 21);

PRACTICE BOOK» NOT FOR SALE


A. Output
D. list.add(21, 1);
B. Input
725. A tree is composed of connected by
C. Storage
edges or lines.
D. Hardware
A. Fruit
720. A queue of characters currently contained B. Leaf Node
a, b, c, d. What would be the con-
tents of queue after the following opera- C. Root Node
tionDELETE, ADD W, ADD X, DELETE, ADD D. Nodes
Y.
726. Which word means storing data in se-
A. A, B, C, W, Y
quence, next to each other?
B. A, B, C, D, W
A. contiguous
C. C, D, W, X, Y
B. contrary
D. W, Y, X, C, D
C. quantitative
721. Pointer is data type D. immutable
A. derived
727. Are generally created independent of un-
B. primary derlying languages, i.e. an algorithm can
C. user defined be implemented in more than one program-
D. none of above ming language.
A. Data Structure
722. The disadvantage in using a circular
linked list is B. Algorithm
A. it is possible to get into infinite loop C. Interface
B. last node points to fist node. D. Implementation
C. time consuming 728. What do you call a collection of items
D. requires more memory space. stored at contiguous memory locations?

723. What is the output of the following? x = A. Linked List


123for i in x:print(i) B. Linear List
A. 123 C. Array
B. 1 2 3 D. Data Structure
C. Error
729. Which of the following is the advantage
D. 1, 2, 3 of the array data structure?
724. Which is the right way to put 21 at the A. Elements of mixed data types can be
second position in an ArrayList of Inte- stored.
gers? (Remember zero-indexing!) B. Easier to access the elements in an ar-
A. list.put(2, 21); ray

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 152

C. Index of the first element starts from 735. Which of the following is an example of
1. a FIFO data structure?
D. Elements of an array cannot be sorted A. Stack
730. Select the correct tree traversal method B. Array
for the following description:Left Subtree- C. Queue
Root-Right Subtree D. Linked List
A. Pre-Order
736. How do you add an element to a

NARAYAN CHANGDER
B. In-Order HashMap with String keys and Integer val-
C. Post-Order ues?
D. none of above A. map.put(Stuff, 123);
731. Which of the following algorithms can B. map.add(”Stuff”, 123);
be used to most efficiently determine the C. map.put(”Stuff”, 123);
presence of a cycle in a given graph? D. map.add(Stuff, 123);
A. BFT
737. The addition of two vectors results in
B. Prim’s Minimum Spanning Tree Algo-
rithm A. a new vector with each relative compo-
nent summed into one
C. Kruskal’s Minimum Spanning Tree Al-
gorithm B. a new vector with all components
summed into one number
D. DFT
C. two new vectors with some compo-
732. is an operation in arrays that allows nents switched
us to add an element from the array. D. a super vector with each component
A. Delete multiplied by it’s square
B. Edit 738. The step-by-step procedure unambiguous
C. Insert instructions to solve a given problem.
D. Search A. Data Structure

733. An Algorithm that used to sort items in a B. Algorithm


certain order. C. Interface
A. Search D. Implementation
B. Sort 739. The following numbers are inserted into
C. Delete an empty binary search tree in the given
D. Update order:10, 1, 3, 5, 15, 12, 16. What is
the height of the binary search tree (the
734. How do you get a value from a height is the maximum distance of a leaf
HashMap? node from the root)?
A. map.get(index); A. 2
B. map.get(key); B. 3
C. map.get(value); C. 4
D. map.valueOf(key); D. 5

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.4 Data Structures 153

740. In Stack Insertion and deletion of an ele- C. DCAB


ment is done at single end called D. ABDC

PRACTICE BOOK» NOT FOR SALE


A. Bottom
746. In a stack, if a user tries to remove an
B. Top element from empty stack it is called
C. Start A. Underflow
D. Last B. Stack is Empty
741. Which of the following is an example of C. Overflow
an output device? D. None of the above
A. Keyboard
747. Which is the right way to create an Ar-
B. Scanner rayList of Integers?
C. Mouse A. ArrayList<Integer> list = new Ar-
D. Speakers rayList<Integer>;
B. ArrayList Integer = new ArrayList();
742. Which of the following that determines
the need for the Circular Queue? C. Integer ArrayList = new Integer Ar-
rayList();
A. Avoid wastage of memory
D. ArrayList<Integer> list = new Ar-
B. Access the Queue using priority rayList<Integer>();
C. Follows the FIFO principle
748. If the elements ‘T’, ‘H’, ‘E’, ‘V’, and ‘A’
D. None of the above are placed in a queue and are deleted one
743. A dictionary maps: at a time what will be the order when re-
moved?
A. strings to strings
A. T H E V A
B. strings to numbers
B. A V E H T
C. indices to elements
C. H E V A T
D. keys to values
D. none of above
744. If START=NULL in linked list then we need
749. Which is the correct code to acess the sec-
to write Message.
ond node in a linked list?
A. Overflow
A. head.getData()
B. Underflow
B. head.getNext().getData()
C. both C. head.getNext().getNext().getData()
D. none of above D. none of the above
745. If the elements “A”, “B”, “C” and “D” 750. Stacks
are placed in a queue and are dequeued
one at a time, in what order will they be A. can be both dynamic and static
removed? B. can only be static
A. ABCD C. can only be dynamic
B. DCBA D. cannot be both static and dynamic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 154

751. If the elements “A”, “B”, “D” and “C” B. Stack entries may be compared with
are placed in a stack and are deleted one the ‘<‘ operation
at a time, in what order will they be re- C. The entries are stored in a linked list
moved?
D. There is a Sequential entry that is one
A. ABCD by one
B. ABDC 753. Linked list data structure offers consider-
C. CDBA able saving in

NARAYAN CHANGDER
A. Computational Time
D. DCAB
B. Space Utilization
752. Entries in a stack are “ordered”. What C. Space Utilization and Computational
is the meaning of this statement? Time
A. A collection of stacks is sortable D. None of the mentioned

1.5 Algorithms
1. Any user should be able to perform an Al- A. following steps exactly as they’re writ-
gorithm without any problems, that means ten.
it should be B. coming up with a unique solution that
A. Doable works sometimes.
B. Understandable C. making a solution more efficient.
C. Infinite D. making an interface using prior knowl-
edge.
D. Precise
5. Using a flow chart to plan a program is
2. A Binary search is what? known as
A. The list is split into two and repeated A. decomposition
B. The list is either right or wrong B. abstraction
C. You are forced to guess the value C. planning
D. An Algorithm that give you directions D. programming

3. The files x1, x2, x3 are 3 files of length 6. OUTPUT and can be used interchange-
30, 20, 10 records each. What is the opti- ably by programmers. They mean the
mal merge pattern value? same thing and perform the same opera-
A. 110 tions. It usually depends on a person’s
preference as to which one they decide to
B. 90 use.
C. 60 A. BEGIN
D. 50 B. START

4. When you’re using an algorithm to solve C. PRINT


a problem, you are D. END

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 155

7. What is the purpose of a rectangle within 12. The following two lists are to be merged,
a flowchart? which element first goes into thenew
merged list? List 1:2 4 8 9List 2:1 6 8

PRACTICE BOOK» NOT FOR SALE


A. Process
4
B. Input / Output
A. 0
C. Decision B. 1
D. Start / Stop C. 2

8. What is the symbol for a decision in a D. 3


flowchart? 13. The following is pseudocode for which al-
A. A parallelogram gorithm? for each element in array if el-
ement you’re looking for return true else
B. A diamond
return false
C. A circle A. linear
D. none of above B. binary

9. Which of the following best describes C. bubble


pseudo code? D. merge
A. A written design of a program without 14. In a flow chart, what does a wonky rect-
worrying about the syntax. angle (parrellelogram) mean?
B. A diagram that shows the flow of a pro- A. Start or end
gram.
B. Decision
C. The code used to solve a problem with C. Process
all of the correct syntax.
D. Input or Output
D. none of above
15. is used to denote when a user has to
10. In scratch, this is the place where we see enter something into a program.
all the animation happening. Where we A. WRITE
put our backdrops and sprites.
B. OUTPUT
A. Stage
C. INPUT
B. Sprites
D. READ
C. Blocks
16. Data type that can only be true or false
D. Scripts
A. int
11. In Greedy method we get Feasible so- B. string
lutions
C. bool
A. one D. float
B. more than one
17. Key words written in English for solving
C. zero problems.
D. hundred A. IF THEN ENDIF

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 156

B. Algorithm 23. Which of the instructions IF, THEN and


C. Pseudocode ELSE represents a question?

D. Sequence A. IF
B. THEN
18. Which of the following routing algorithms
can be used for network layer design? C. ELSE
A. shortest path algorithm D. none of above

NARAYAN CHANGDER
B. distance vector routing 24. What algorithm do we use when we’re
C. link state routing making a cake?
D. all of the mentioned A. A set of directions

19. What do you call an ordered sequence B. A recipe


of unambiguous and well-defined instruc- C. A list of instructions
tions that performs some task and stops
D. none of above
in finite time?
A. An event. 25. Which one of the following is an advan-
B. A process. tage of a linear search?

C. A procedure. A. It takes a long time to find the item.

D. An algorithm. B. It is a relatively simple algorithm to


write.
20. Which of these is NOT an algorithm?
C. It is more efficient than a binary
A. Following recipe instructions search.
B. Working out how an engine works D. It is a complex algorithm to write.
C. Tying your shoelaces
26. Why do we decompose a complex prob-
D. Making a cup of coffee lem?
21. Which is optimal value in the case of job se- A. To make it easier to solve
quence problem Item:1 2 3 4 5..Profit:20 B. To make it more difficult to solve
15 10 5 1Deadline:2 2 3 3 3
C. To change the problem we have
A. 1, 3, 4
D. none of above
B. 1, 2, 4
C. 4, 2, 3 27. Describe a Sequential Algorithm
D. 1, 5, 2 A. A problem that requires the steps to be
taken in turn.
22. Flowcharts go from?
B. The steps do not need to be in an order.
A. Left
B. Right C. The Algorithm can only be a certain
C. Bottom amount of steps
D. Top to bottom D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 157

28. What is an Algorithm? 33. What must be true before performing a bi-
A. A chart showing the flow of a series of nary search?

PRACTICE BOOK» NOT FOR SALE


events A. The elements must be sorted.
B. Step-by-step instructions used to B. It can only contain binary values.
solve a problem
C. The elements must be some sort of
C. A decision arrived at by following in- number (i.e. int, double, Integer)
structions
D. There are no necessary conditions.
D. A computer program that follows a
chart 34. A list of steps to finish a task. A set of
instructions that can be performed with or
29. A symbol that starts or ends a flow chart without a computer.
is known as a
A. recipe
A. terminator
B. algorithm
B. decision
C. statement
C. loop
D. sequence D. loop

30. Which of the following is not a least cost 35. Which of the following contains an INCOR-
algorithm? RECT sequence when getting dressed to go
out?
A. Distance vector
A. Put on socks, put on shoes, put on coat
B. Link state
C. Path vector
B. Put on coat, put on shoes, put on socks
D. All the mentioned
31. Why is selection important? C. Put on socks, put on coat, put on shoes
A. Selection allows us to include more
than one path through a solution D. none of above
B. Selection allows us to repeat steps in
36. What is a flowchart?
a solution
A. A text-based way of designing an algo-
C. Selection allows us make our solution
rithm
more efficient
D. none of above B. A specific programming language
C. A diagram that represents a set of in-
32. What is meant by the time complexity of structions
an algorithm?
D. A bullet point list of instructions
A. The amount of time required to solve a
particular problem 37. A BINARY SEARCH looks through a list
B. How difficult a problem is to solve named studentList finds an what it was
searching for in the first spot it looked.
C. How many lines of code are required
Where was it?
to solve a problem
D. How quickly a solution can be devel- A. at index 0
oped B. at index studentList.length / 2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 158

C. at index studentList.length 43. is a set of rules that is unique to each


programming language which defines how
D. none of above
commands and instructions should be struc-
tured and ordered.
38. How many arrows should come out of a
decision symbol in a flowchart? A. None of these.
A. 0 B. Pseudocode
B. 1 C. Algorithm

NARAYAN CHANGDER
C. 2 D. Syntax
D. 3 44. A section of flowchart that repeats is
known as a
39. What is the missing part of this
Algorithm:Input-Process-? A. loop

A. Sequence B. wait
C. decision
B. Output
D. input / output
C. Abstract
D. Iteration 45. Suppose we have a sorted list with n ele-
ments. We decide to perform an insertion
40. Which of the following algorithmic efficien- sort on this already sorted set. How many
cies would be considered LEAST efficient? comparisons will the sort make?
A. Linear A. n-1
B. Constant B. n

C. Polynomial C. n (n-1)

D. Exponential D. n + 1

46. Which sorting algorithm is described


41. When is a compound condition using the
by:split a list into individual lists, then
logical operator “AND” true?
combine these, two lists at a time.
A. When either of the conditions are true
A. Bubble
B. Merge
B. When both conditions are false
C. Insertion
C. When both conditions are true
D. None of these
D. When the “NOT” operator is also used
47. In pseudo code what does the IF statement
42. Data sent from a Computer is called relate to in flowcharts?
A. Input A. Decision
B. Output B. Terminator
C. Process C. Process
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 159

48. Why do we need to think computation- 53. To repeat until a particular condition is true
ally? use

PRACTICE BOOK» NOT FOR SALE


A. To help us program A. while loop
B. To help us solve complex problems B. for loop
more easily C. if loop
C. To help us to think like a computer D. indentation
D. none of above
54. Choose the best answer below.
49. What is Python? A. Jake cut the bread into triangles.
A. a type of snake B. Jake cut the bread forcefully into trian-
B. a programming language gles.
C. Jake used his right hand to cut the
C. a music band
bread into triangles. He applied pressure
D. a theatre and cut diagonally.
50. A linear search is to be performed on the D. none of above
list:12 6 8 1 3How many comparisons
55. What is the average case complexity of
would it take to find number 1?
Quick sort algorithm?
A. 1 A. O(n log n)
B. 2 B. O(log n)
C. 3 C. O(n)
D. 4 D. O(n2)
51. A computer is performing a binary search 56. What would a rounded rectangle be used
on the sorted list of 7 numbers below. for within a flowchart?
What is the maximum number of iterations
A. Input / Output
needed to find the item? [1, 5, 20, 50, 51,
80, 99] B. Output
A. 1 C. Start / Stop
B. 3 D. Decision

C. 6 57. In pseudocode how is a decision repre-


D. 7 sented?
A. IF-THEN-ELSE
52. Consider this list of numbers:3 4 6 7 8 9.
B. IF-OTHERWISE
If the number 9 was to be found using a
linear search, how many comparisons need C. WHEN-DO
to be made? D. none of above
A. 6
58. This type of algorithm involves asking a
B. 3 question and a choice is made.
C. 8 A. Sequence
D. 4 B. Selection

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 160

C. Iteration/Looping 64. Identify which statement describes algo-


rithmic thinking
D. none of above
A. Thinking like a computer
59. What is Abstraction? B. Writing binary numbers
A. The representation of real world prob- C. Identifying the steps involved in solv-
lems in a computer ing a problem
B. The process of removing unnecessary D. Identifying what problems need to be

NARAYAN CHANGDER
information to reduce complexity solved

C. Patterns in data 65. In Link state routing a link represents


D. The process of adding more detail to a A. a host
problem B. a network
C. a packet
60. A Linear search is what?
D. none of the mentioned
A. The values are put in a line
66. Which of the instructions IF, THEN and
B. You have to guess to find the value ELSE points to what to do if the answer
C. The value is moved around the line to the question is FALSE?
A. IF
D. none of above
B. THEN
61. What is the correct symbol for a process C. ELSE
instruction in a flowchart?
D. none of above
A. A rectangle
67. The character that must be at the end of
B. A parallelogram the line for if, while, for etc.
C. A square A. :
D. none of above B. ;
C. .
62. asymptotic notations represents D. ,
A. space complexity of algo
68. What is a trace table?
B. time complexity of algo A. A technique used to test algorithms for
C. both a and b logical errors.
B. A technique used for drawing in art.
D. none of the above
C. A type of sort algorithm
63. A finite set of instructions that accomplish D. A type of search algorithm
a task.
69. Floppy disk is a?
A. Heuristic
A. Hardware-OUTPUT
B. Algorithm B. Hardware-STORAGE
C. Undecidable Problem C. Hardware-SYSTEM UNIT
D. Efficiency D. Hardware-INPUT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 161

70. What is a sequence 75. A “defined set of steps that can be used
A. Putting and executing instructions in to complete a task”. Usually related to
computers

PRACTICE BOOK» NOT FOR SALE


order.
B. A pattern of numbers. A. Algorithm

C. Instructions which a computer follows. B. Pseudocode


C. Flowchart
D. A line of code D. Selection
71. What does the instruction ELSE IF allow? 76. A problem for which no algorithm can be
A. Just one path through an algorithm constructed that is always capable of pro-
viding a correct yes-or-no answer
B. More than two paths through an algo-
rithm A. Efficiency
C. Only two paths through an algorithm B. Undecidable Problem
D. none of above C. Reasonable Time

72. This is known as a precise sequence of in- D. Distributed Computing


structions for processes that can be exe-
77. In pseudo code what would be missing
cuted by a computer and are implemented
from this code? ENTER UsernameENTER
using programming languages.
PasswordIF Username and Password are
A. Function correct THEN Login to Network xxxx
B. Parameter
C. Algorithm A. IF

D. Command B. ELSE
C. THEN
73. Link state routing uses algorithm.
D. none of above
A. Quick Sort Algorithm
B. Floyd Warshall Algorithm 78. switching a process stores state into PCB
and restore a state of different process is
C. Bellman Ford
called as
D. Dijkstra’s
A. Dispatching
74. A sorted list of numbers contains 200 ele- B. context switching
ments. Which of the following is closest to
the maximum number of list elements that C. demand paging
will need to be examined when performing D. page fault
a binary search for a particular value in the
list? 79. What symbol do flowcharts begin with?
A. 5 A. oval
B. 8 B. parallelogram
C. 100 C. rectangle
D. 200 D. diamond

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 162

80. Which algorithm is defined in Time quan- C. A logical way of getting from the prob-
tum? lem to the solution.
A. shortest job scheduling algorithm D. none of above
B. round robin scheduling algorithm
86. An algorithm asks a user to enter their age,
C. priority scheduling algorithm
the age is read into the system and the sys-
D. multilevel queue scheduling algorithm tem outputs a ‘Thank You’ message. This
is an example of which of the algorithm
81. What is decomposition?

NARAYAN CHANGDER
construct?
A. Searches the computer’s memory for
data A. Decision (Selection)
B. Repeats a program B. Loop (Iteration)
C. Getting small part of a problem and C. Order (Sequence)
adding them together
D. All of the above
D. Breaking down a complex problem
87. The following list is to be sorted using a
82. Big Ω defines
bubble sort:12 6 8 1 3What will the list
A. lower bound look like after the first iteration through
B. upper bound the list?
C. middle bound A. 6 8 1 3 12
D. none of the above B. 6 12 1 8 3
83. A control structure in which each step is C. 1 3 6 8 12
carried out in order of its position.
D. 6 8 1 12 3
A. Binary Selection
B. Flowchart 88. What is space complexity?
C. Sequence A. The space complexity is the amount of
D. Case Selection storage space an algorithm takes up

84. Case statements can be used in some lan- B. How many times a certain number
guages instead of: (base) is multiplied together to reach an-
other number.
A. a nested if
C. An algorithm is a series of steps that
B. a combined if
complete a task
C. a multiple if
D. none of above
D. a sequence if

85. Which of the following best describes de- 89. Decides if a string only contains numbers
composition? A. isalpha()
A. Removing all of the unimportant bits of B. isnumeric()
a problem.
C. int()
B. Breaking the problem down into man-
ageable chunks. D. string()

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 163

90. How many comparisons would it take to C. A number search


find the value 2 in the following list using
D. A search engine
a binary search? [1, 4, 7, 8, 5, 2, 9]

PRACTICE BOOK» NOT FOR SALE


A. 3 96. An Algorithm has 4 main characteristics. It
B. 2 should be

C. 6 A. Doable, Creative, finite and precise


D. Not possible, list is out of order B. Doable, Understandable, finite and
precise
91. What does the oval/circle mean in a
flowchart? C. Amazing, Understandable, finite and
precise
A. Input/Output
D. Doable, Understandable, Infinite and
B. Start/End
precise
C. Decision
D. For loop 97. A linear function takes the form
A. f(n) = an + b
92. Which sorting algorithm is the fastest for
a very unordered list? B. f(n) = an2 +bn + c
A. Bubble C. f(n) = alog2n
B. Merge D. f(n) = a + b
C. Insertion
98. How many edge are there in MCST gener-
D. Binary ated from graph with ‘n’ vertices
93. A program is: A. n-1
A. an algorithm that has been coded into B. n/2-1
something that can be run by a machine.
C. n-2
B. doing something over and over again.
D. n/2
C. a piece of code you can call over and
over again. 99. A boolean is
D. finding and fixing errors in a program. A. A whole number
94. Which one of the following statements is B. A number with a decimal part
NOT a characteristic of good algorithm?
C. Letters, numbers or punctuation
A. Ambiguous.
D. True or False
B. Precise.
C. Finite number of steps. 100. What are the two main categories of
loop?
D. Logical flow of control.
A. Count & Event Controlled
95. Which of the following is a search algo-
rithm? B. Count & For Controlled
A. A word search C. While & Event Controlled
B. A binary search D. Event & Selection Controlled

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 164

101. This expression:x = 3x = x- C. Compare the first and second ele-


1print(x)evaluates to ments
A. 4 D. Put the first element in the correct
B. 5 place

C. 2 107. Which sorting algorithm always requires


D. -1 the same number of iterations as the
length of the list?
102. What might happen if the sequence is

NARAYAN CHANGDER
A. Merge
wrong?
B. Bubble
A. The algorithm may be overly long
C. Insertion
B. The algorithm may be inefficient
D. None of them do
C. The algorithm may produce unex-
pected results 108. On a flowchart, a decision will always
D. none of above have:
A. Two exit arrows
103. What symbol shows a decision?
B. One exit arrow
A. oval
C. Three exit arrows
B. parallelogram
D. Four exit arrows
C. rectangle
D. diamond 109. In computer programming, what is a
‘loop’?
104. Why is a “divide-and-conquer” search A. Something that is used to end a pro-
more efficient than a linear search gram
A. You only look at half the data set B. Something that is continually repeated
B. You eliminate half the data set with until a certain condition is reached
each iteration C. Something that tells a program what to
C. You have to search all the values do
D. It is less efficient with large data sets D. Something that is required to load a
program
105. What will the output be from the follow-
ing code? print(”Hello world!” * 2) 110. Code executed based on a condition being
A. TypeError true

B. Hello world world! A. Sequence

C. Hello world!Hello world! B. Selection

D. Hello world! * 2 C. Iteration


D. Variable
106. What is the first action in an insertion
sort? 111. What is the flag for in the flowchart?
A. Make an empty new list A. To flag whether there has been a swap
B. Make a new list with the first item of on the current pass.
the original list as the ordered list B. To make it look bright and colourful.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 165

C. To identify the swapped pair of num- C. response time


bers. D. throughput

PRACTICE BOOK» NOT FOR SALE


D. none of above
117. A program is designed to accept the name
112. What is the answer of this expression, and price of an item and calculate the total
22 % 3 is? price including GCT of 16.5%.Which data
A. 7 item can be defined as a constant?
B. 1 A. name
C. 0 B. GCT
D. 5 C. totalprice
D. price
113. The following lists represent 3 passes of
a sorting algorithm. Which algorithm is be- 118. An organized set of rules or steps to per-
ing used to sort the list? 4 8 3 9 2 6 2 8 form an action, is also known as
3 9 4 62 3 8 9 4 6
A. Scratch
A. Bubble Sort
B. Software
B. Selection Sort
C. Algorithm
C. Insertion Sort
D. Block
D. none of above

114. Algorithms are made up of 3 processes: 119. is used to denote when a user has to
give something to a program.
A. Sequence, Selection and Rules
A. WRITE
B. Control Flow, Conditionals and Repeat
Functions B. OUTPUT

C. Sequence, selection and iteration C. INPUT


D. Get idea, plan steps, write code D. READ

115. In priority scheduling algorithm 120. Linear Search is faster than Binary
search
A. CPU is allocated to the process with
highest priority A. TRUE
B. CPU is allocated to the process with B. FALSE
lowest priority C. It depends on the scenario
C. Equal priority processes can not be D. none of above
scheduled
D. None of the mentioned 121. What shape represents the start and end
of a flowchart
116. The interval from the time of submission
A. Oval
of a process to the time of completion is
termed as B. Rectangle
A. waiting time C. Diamond
B. turnaround time D. Square

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 166

122. Which symbol is used for a connector in a C. A parallelogram


flowchart? D. A circle
A. A parallelogram
128. What type of operators are AND OR
B. A diamond
NOT
C. A circle
A. Arithmetic
D. none of above
B. Relational
123. What is required when creating an algo-

NARAYAN CHANGDER
C. Boolean
rithm?
D. none of above
A. Strict/Bossy Wording
B. First-person tense 129. Which of the following would represent
an input in a flow chart?
C. Confidence
A. Put teabag in cup
D. Informal Speach
B. Drink tea
124. How do we represent the complexity of
C. Wait for water to boil
an algorithm?
D. Is water boiled?
A. Big-R
B. Big-O 130. A symbol that automatically performs an
C. Big-N action in a flow chart is known as a

D. Big-A A. sequence
B. input / output
125. What is a Greedy strategy for Optimal
storage on tape C. decision
A. Arrange all programs in decreasing or- D. wait
der of length
131. What is computational thinking?
B. Arrange all programs in First in first
come basis A. It allows you to break down a large /
complex problem into smaller parts.
C. Arrange all programs in increasing or-
der of length B. It is thinking like a robot

D. Arrange all programs in random order C. It is being able to bake a cake.


D. It is creating a coding solution to a
126. What is iteration? problem.
A. Repeating steps in an algorithm
132. is a sequence of instructions (or algo-
B. A decision in an algorithm
rithm) written in a language or code that
C. An error in an algorithm a computer can understand and put into ac-
D. none of above tion. Must be accurate to be correct.
A. Procedure
127. In a flowchart a calculation (process) is
represented by B. Algorithm
A. A rectangle C. Program
B. A rhombus D. Loop/ Repeat

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 167

133. How do you determine the cost of a span- 138. Distance vector algorithm uses equa-
ning tree? tion to find the least cost route.
A. Euclid

PRACTICE BOOK» NOT FOR SALE


A. By the sum of costs of the edges of the
tree B. Floyd Warshall
B. By the sum of the costs of the edges C. Bellman Ford
and vertices of the tree
D. Pythagorus
C. By the sum of the costs of the vertices
of the tree 139. Algorithms have main characteris-
tics.
D. By the sum of costs of the edges of the
graph A. 3
B. 6
134. Which module gives control of the CPU
to the process selected by the short-term C. 4
scheduler? D. 5
A. dispatcher 140. Which of the following is not a compo-
B. interrupt nent of computational thinking?
C. scheduler A. Abstraction
D. NONE B. Typing
C. Decomposition
135. An Algorithm asks the user to enter their
gender (M or F) and prints out a differ- D. Algorithmic thinking
ent comment depending on what they en- 141. what is an oval in a flow diagram used
tered.This is an example of which of the for?
algorithm constructs?
A. input
A. Decision (Selection)
B. output
B. Loop (Iteration)
C. start and end a program
C. Order (Sequence)
D. process
D. All of the above
142. For a binary search algorithm to work, it
136. people = [”John”, “Rob”, “Bob”]print is necessary that the array (list) must be
(people[1]) what would this result be?
A. sorted
A. John
B. unsorted
B. Rob
C. in a heap
C. Bob
D. popped out of a stack
D. none of above
143. What is the pseudo-code instruction for
137. How many passes will both the selection user to supply data to system?
and insertion sorts make? A. GET or READ
A. N B. PROCESS
B. N-1 C. COMPUTE or CALCULATE or DETER-
C. N+1 MINE or PROCESS
D. (N+1)/2 D. DISPLAY or WRITE or PRINT or SHOW

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 168

144. A string is B. Coding


A. A whole number C. Algorithms
B. A number with a decimal part D. none of above
C. Letters, numbers or punctuation 150. Which of the following best describes ab-
D. True or False straction?

145. When your programming is achieving A. Removing all of the unimportant bits of
a problem.

NARAYAN CHANGDER
some desired outcome while minimizing
wasted effort or resources, we would say B. Breaking the problem down into man-
that its: ageable chunks.
A. Top Notch C. A logical way of getting from the prob-
lem to the solution.
B. Comparable
D. none of above
C. Efficient
D. Problematic 151. A string is a data type that contains
A. numbers
146. The Table used to organize the elements
needed to build a solution is called B. text (words or characters)
A. Input Process Output Table C. True
B. In And Out Table D. False
C. Algorithm 152. A variable that can hold a collection of
D. Problem Solving Table values, often called an array in other pro-
gramming languages
147. The two main types of programming
A. list
methodologies are:
B. int
A. Procedural & OOP
C. string
B. Selection & OOP
D. constant
C. OOP & Iterative
D. Procedural & Iterative 153. Every algorithm can be constructed on us-
ing:
148. What is sequencing? A. Sequencing
A. The order in which steps are carried B. Selection
out in an algorithm
C. Iteration
B. The order in which we think computa-
tionally D. Questions
C. The process of repeating a number of 154. What does the parallelogram represent
steps in an algorithm in a flowchart?
D. none of above A. Decision

149. A logical step-by-step process for solving B. Connector


a problem is called C. Input/Output
A. Binary Numbers D. Start/Stop

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 169

155. How many binary searches will it take to C. Parallel Computing


find the value 10 in the list [1, 4, 9, 10, D. Algorithm
11]?

PRACTICE BOOK» NOT FOR SALE


160. what is an advantage of binary search?
A. 0
A. data doesn’t need to be sorted
B. 1
B. it is east to implement
C. 2
C. faster with a large data set
D. 3
D. none of above
156. Why is this not a sequence? Step 1:Start 161. What type of problem cannot currently be
carStep 2:Put in keyStep 3:Turn keyStep determined or explained by an algorithm?
4:Drive away
A. Indefinite
A. There are spelling mistakes
B. Undecidable
B. The instructions are in the correct or-
C. Intractable
der
D. Impossible
C. The instructions are in the wrong or-
der 162. What is meant by a process?
D. None of the above A. an action that takesplace.
B. a way of calculating something
157. Which of the following instructions repre-
sent questions? C. an output from a system
A. ELSE and ELSE IF D. a way of inputting information into a
computer program
B. ELSE and THEN
163. What does an arrow represent in a flow
C. ELSE IF and THEN
chart
D. none of above A. Decision making
158. Given the four functions f1(n) = n100, B. Data Flow
f2(n) = (1.2)n, f3(n) = 2n/2, f4(n) = 3n/3 C. Start
which function will have the largest
D. Stop
value for sufficiently large values of n
A. f4 164. Many small sub-tasks together consti-
tute a large
B. f3
A. sub-tasks
C. f2
B. sequence
D. f1
C. task
159. A search algorithm that starts at the mid- D. algorithm
dle of a sorted set of numbers and re-
moves half of the data; this process re- 165. The Scratch logo contains a
peats until the desired value is found or A. Koala
all elements have been eliminated. B. Cat
A. Binary Search C. Lion
B. Heuristic D. Dog

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 170

166. When a computer is performing the in- 171. first name is and example of what
structions contained in a program, it is commonly used way to name a variable
called: A. camelcase
A. Debugging B. snakecase
B. Compiling C. linecase
C. Assembling D. hillcase
D. Executing

NARAYAN CHANGDER
172. Which of the following sorting algorithms
use recursion?
167. Which of the following is an example of
a simple (atomic) variable? A. Selection Sort
B. Insertion Sort
A. score = 7
C. Mergesort
B. name = “Jack”
D. none of above
C. scores = [4, 2, 12, 7]
D. grades = [”A”, “F”, “B”] 173. What does a rectangle represent in a
flowchart?
168. The committee wrote a report, ex- A. Input/Output
tolling only the strengths of the proposal B. Process
A. reasonable C. Start/End
B. supportive D. Display
C. biased 174. In the exam all instructions / commands
D. fragmented should be written in:
A. Upper Case
169. Joining elements together to make a
string is called what? B. Lower Case

A. Combining C. First letter upper and the rest lower


case.
B. Connecting
D. First letter lower and the rest upper
C. Concatenation case.
D. Stringing 175. What am I? This is where a question is
asked and depending on the answer, a
170. Parallel Programs: choice is made.
A. typically are slower programs than Se- A. Sequence
quential
B. Selection
B. cannot be slowed down even if only
C. Iteration
one of many devices is slow
D. none of above
C. can improve every single time more
processors are added 176. What is meant by testing a condition?
D. are often times the fastest option, but A. Checking to see if a condition has been
there is a limit met

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 171

B. Checking which path to take through 181. To repeat a fixed number of times use a
the solution A. while loop

PRACTICE BOOK» NOT FOR SALE


C. Checking how many steps to repeat B. for loop
D. none of above C. if loop
177. We are sorting the following list in de- D. indentation
scending order:1 4 2 9 3 8 5 What does 182. The process of transforming the descrip-
the list look like after one pass of the se- tion of a problem into a solution is called
lection sort algorithm.
A. Problem Solving
A. 1 4 2 9 3 8 5
B. Problem Analysis
B. 9 4 2 1 3 8 5
C. Programming
C. 4 2 9 3 8 5 1
D. Algorithm
D. none of above
183. Which scheduling algorithm allocates the
178. You are required to design an algorithm CPU first to the process that requests the
for finding the average of six numbers, CPU first?
where the sum of the numbers is given. A. first-come, first-served scheduling
Which one of the following control struc-
tures should you use? B. shortest job scheduling

A. Iteration. C. priority scheduling


D. none of the mentioned
B. Repetition.
C. Selection. 184. How is iteration represented in a
flowchart?
D. Sequence.
A. As a process
179. What is a compact and informal high- B. As an input
level description of a computer program-
ming algorithm that uses the structural C. As a decision
conventions of a programming language, D. none of above
but is intended for human reading rather
185. Describe an Insertion sort
than machine reading?
A. You insert the value into the correct
A. Algorithm.
place in the list
B. Flowchart.
B. You swap the values by comparing
C. Pseudocode. value 1 and 2
D. Website. C. You remove the odd value out

180. Express the formula (n-1)*(n-5) in terms D. none of above


of big Oh notation 186. If then else endif check
A. O(1) A. one condition
B. O(log n) B. two conditions
C. O(n) C. three conditions
D. O(n2) D. many conditions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 172

187. Fractional knapsack is based on 193. firstName is and example of what com-
method monly used way to name a variable
A. Greedy A. camelcase
B. Branch and Bound B. snakecase
C. Dynamic Programming
C. linecase
D. Divide and Conquer
D. hillcase
188. What is the correct symbol for an input

NARAYAN CHANGDER
in a flowchart? 194. A piece of code that you can easily call
over and over again. Sometimes called
A. A diamon
procedures.
B. A square
A. digital footprint
C. A parallelogram
B. run program
D. A rectangle
C. abstraction
189. How many searches would take place for
an array containing 50 data items (worst D. function
case) using a linear search algorithm
195. What is the main disadvantage of a bi-
A. 50 nary search compared to a linear search?
B. 1
A. It requires the data to be in order
C. 6
B. It requires more memory
D. 19
C. It does not execute as quickly with
190. Which algorithm must start with an or- larger data sets
dered list/array?
D. Not all CPUs are capable of executing
A. linear the algorithm
B. binary
196. An is a precise, step by step set of
C. bubble
instructions to perform a specific task.
D. merge
A. task
191. What does OOP stand for?
B. sequence
A. Object Orientated Programming
C. sub-tasks
B. Order Orientated Programming
D. algorithm
C. Objective Order Programming
D. Objective Orientated Programming 197. WHILE loops are
192. when can algorithms be used A. loops which run an unknown number
of times
A. Any time to design solutions to prob-
lems B. loops which run for a specific number
B. Only with computers of times
C. Only when programming C. the same as if statements
D. Only with flowcharts D. not part of programming

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 173

198. Why is sequencing important? A. write a tv show without pen and paper
A. To ensure the algorithm is kept to a

PRACTICE BOOK» NOT FOR SALE


reasonable length B. perform any activity.
B. To ensure the algorithm functions as C. understand how to build a rocket in a
intended full moon in mars when you are a unicorn
C. To ensure the algorithm is efficient D. digest our food
D. none of above 204. Converts a number to a string
199. What is the most important reason that A. str()
data needs to be sorted? B. int()
A. It is organised and easier to make C. parseInt()
sense of.
D. convert
B. So it looks nice.
C. To show we can do it. 205. In scratch, this where we create our char-
acters or objects. We can import or cre-
D. none of above ate a new one that later on will be on the
stage.
200. What does the Start/End symbol do?
A. Stage
A. Ends the program Only
B. Sprites
B. Can be used to show the beginning or
ending of a program. C. Blocks
C. Visual representation of the entire pro- D. Scripts
gram
206. Parallel computing consists of both a par-
D. Starts the program Only allel portion that is shared and por-
tion.
201. what is an algorithm?
A. Distributed
A. a piece of hardware
B. Sequential
B. a series of steps to solve a problem
C. Unreasonable
C. a subroutine within a program
D. Reasonable
D. a computer program
207. Which of these is not a sorting algo-
202. what are the three constructs used to rithm?
write algorithms in pseudocode
A. Bubble
A. sequence, selection, iteration
B. Insertion
B. beginning, middle, end
C. Merge
C. name, option, variable
D. Binary
D. userinput, total, option
208. Routing tables of a router keeps track of
203. Choose the option that better completes
the statement. “Algorithms are useful to A. MAC Address Assignments
help us B. Port Assignments to network devices

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 174

C. Distribute IP address to network de- C. Conditions


vices D. Input
D. Routes to use for forwarding data to
its destination 214. What is the correct definition of an algo-
rithm?
209. A section of flowchart that happens con- A. An algorithm is a step by step instruc-
tinuously is known as a tions to solve a problem.
A. loop B. An algorithm is a process of baking

NARAYAN CHANGDER
B. wait bread.
C. decision C. An algorithm is a software used to
D. input / output compute numbers.
D. An algorithm is the process of break-
210. What does the following code do? ing problems.
myAge = int (myAge)
A. Converts the var (variable) myAge to a 215. What are the two main ways that algo-
string rithms can be designed?

B. Converts the var (variable) myAge to a A. Images or videos


integer B. In pseudocode or as a flowchart
C. Converts the var (variable) myAge C. By hardware or software
from a integer to a string
D. none of above
D. Converts the var (variable) myAge to if
statement 216. Sequential statements
A. run one after the other in the order
211. is used by programmers to display in-
given
formation from the screen to the user.
B. run only when a condition is true
A. START
C. run until a loop finishes
B. WRITE
D. run until the user types “exit”
C. INPUT
D. OUTPUT 217. Ways of representing algorithms?
A. Flow Charts and Pseudocode
212. Letters in the English alphabet constitute
a B. Program and Flow charts
A. Algorithm C. Java and Object Oriented
B. task D. none of above
C. sub-tasks 218. A diagram that represents a set of in-
D. sequence structions is called:

213. Algorithm starts from initial state with A. Flow Chart


some B. Pseudocode
A. Statement C. Shapes
B. Control flow D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 175

219. If you want more than one option for 224. What is a counter used for in iteration?
your code, what do you use (after if)? A. To keep track of how many different

PRACTICE BOOK» NOT FOR SALE


A. elif steps have been completed
B. else B. To keep track of how many times the
solution has iterated
C. ifif
C. Keep track of how many steps to re-
D. none of above peat
D. none of above
220. Which data type would be MOST appro-
priate for storing the initial of a person’s 225. What do you Start a Flowchart with?
first name?
A. Square shape
A. character B. Parallelogram shape
B. string C. Diamond shape
C. integer D. Sausage shape
D. real 226. An integer is

221. A is a named location in memory that A. A whole number


stores a value that does not change during B. A number with a decimal part
the program C. Letters, numbers or punctuation
A. literal D. True or False
B. sentinel 227. How is iteration represented in pseu-
C. variable docode?
D. constant A. IF-THEN-ELSE
B. IF-THEN-OTHERWISE
222. Which option is a SEARCHING algo-
C. REPEAT-UNTIL
rithm?
D. none of above
A. Quick
228. what is a con of linear search?
B. Binary
A. it is slow
C. Bubble
B. not very effective
D. Insertion
C. hard to implement
223. The complexity of three algorithms is D. none of above
given as:O(n), O(n2) and O(n3). Which
229. In scratch, this is the place where we pro-
should execute slowest for large value of
gram. Where we give orders to our sprites
n?
and backdrops.
A. O(n)
A. Stage
B. O(n2) B. Sprites
C. O(n3) C. Blocks
D. All will execute in same time. D. Scripts

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 176

230. Which of the algorithm allows the send- 236. A loop that is carried out a set number of
ing host to impose policy on route? times
A. link state A. Count controlled
B. distance vector B. Condition controlled
C. path vector
C. Infinite
D. all the mentioned
D. Array
231. What is logical reasoning?

NARAYAN CHANGDER
237. An algorithm is only as good as the infor-
A. Counting rules in an algorithm
mation it acts upon hence the phrase:
B. Using steps to solve problems
A. Don’t count your chickens before they
C. Using rules to solve problems hatch
D. none of above
B. Measure twice, cut once
232. If one would like to read through a large C. Garbage in, garbage out
list of names and read every name on the
list, which big O notation would you use? D. Computers do exactly what you tell
them
A. O(log n)
B. O(n) 238. Define ABSTRACTION
C. O(nlog n) A. Breaking a task into smaller tasks.
D. O(n!) B. Drawing a map to show how to reach
233. Which type of loop runs a set number of a destination.
times? C. Creating step by step instructions.
A. Indefinite D. Focusing on what is important and ig-
B. While noring what is unnecessary.
C. Infinite
239. Examples of O(1) algorithms are
D. For
A. Multiplying two numbers.
234. Find the slowest algorithm:
B. assigning some value to a variable
A. O(n)
C. displaying some integer on console
B. O(n2 )
D. All of the above
C. O(n!)
D. O(2n ) 240. Given this array:1, 2, 4, 5, 6, 7, 8, 12,
14, 21, 22, 42, 53How many comparisons
235. Consider this list of numbers L:3 4 5 6 7
are required to find 42 using the Binary
8 9. Which number would be checked first
Search?
in a binary search?
A. 3
A. 6
B. 3 B. 2
C. 9 C. 10
D. 4 D. 5

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 177

241. Which operation does the following C. Iteration


pseudo codes indicates? GET numberGET
D. Variable
another numberMultiply numbersPRINT

PRACTICE BOOK» NOT FOR SALE


result 246. You are required to design an algorithm
A. Decision. to keep asking a user to enter a number in
B. Loop. the range of 1 to 100, not accepting any
invalid numbers or characters. Which one
C. Nested. of the following control structures should
D. Sequence. you use?

242. Why is this not a sequence? Start carPut A. Boolean.


in keyTurn keyDrive away B. Iteration.
A. There are spelling mistakes C. Selection.
B. The instructions are in the correct or- D. Sequence.
der
C. The instructions are in the wrong or- 247. What are the three key parts of compu-
der tational thinking?
D. It is a sequence A. Programming, flowcharts and pseudo
code
243. The following lists represent 3 passes of
a sorting algorithm. Which algorithm is be- B. Abstraction, decomposition and algo-
ing used to sort the list? 4 5 9 6 2 74 5 9 rithm
6 2 74 5 9 6 2 74 5 6 9 2 7 C. Input, processing and output
A. Bubble Sort D. Patterns, shapes and numbers
B. Selection Sort
248. An Algorithm, should have a beginning
C. Insertion Sort
and an end. That means it should be
D. none of above
A. Doable
244. Abstraction is B. Understandable
A. The process of drawing abstract pic- C. Finite
tures.
D. Precise
B. The process of assigning values to vari-
ables. 249. A generic term for a type of program-
C. The process of breaking down prob- ming statement (usually an if-statement)
lems. that uses a Boolean condition to determine,
D. The process of removing unnecessary or select, whether or not to run a certain
details from a problem. block of statements is
A. Iteration
245. Code repeated / looped until a condition
has been met or a set number of times. B. Selection
A. Sequence C. Sequencing
B. Selection D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 178

250. SERIES OF COMMANDS if element is to right search right half of


A. PROCESSING arrayelse return false
A. linear
B. FUNCTION
B. binary
C. STORAGE
C. bubble
D. ALGORITHM
D. merge
251. What shape is used for decision in

NARAYAN CHANGDER
flowcharts 256. What do we mean by COMPUTATIONAL
THINKING?
A. Square
A. Understanding a complex problem and
B. Triangle developing possible solutions.
C. Diamond B. Breaking a task into smaller tasks.
D. Circle C. Selecting a computer to use.
252. Which of the following BEST declares a D. Focusing on what is important, ignor-
variable for storing the number of items ing what is unnecessary.
purchased from a user?
257. When can algorithms be used?
A. Number of items Purchased
A. Only with computers
B. numberofitemspurchased B. Only when programming
C. noofitem C. Only with flowcharts
D. no of item D. Any time to design solutions to prob-
lems
253. Quick sort running time depends on the
selection of 258. What does an algorithm have to do with
A. Size of array processing?
B. Pivot element A. Algorithms are the steps that change
it from input to an output
C. Sequence of values
B. Algorithms have nothing to do with pro-
D. None of the above cessing
254. Merge Sort is? C. Algorithms are the steps that change
it from output to input
A. When a list is kept as one and com-
pared D. Algorithms are a series of steps
B. List is split into 2 and merged together 259. Which sorting algorithm is described
by:moving through a list repeatedly,
C. List is split into 2 and kept seperate swapping elements that are in the wrong
order.
D. Nothing
A. Merge
255. The following is pseudocode for which al- B. Bubble
gorithm? look at middle of arrayif element
you’re looking for return trueelse if ele- C. Insertion
ment is to left search left half of arrayelse D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 179

260. The following is pseudocode for which al- 265. A whole number such as 7 is stored as
gorithm? Repeat, starting at the first el-
ement:If the first element is what you’re

PRACTICE BOOK» NOT FOR SALE


A. an integer
looking for (the target), stop.Otherwise,
move to the next element. B. a float

A. linear C. a boolean

B. binary D. a string

C. bubble 266. A section in a flowchart that displays a


message to a user is known as a
D. merge
A. output
261. Which of the following would represent B. decision
a pause (represent by a wonky rectangle-
parallelogram) in a flow chart? C. sequence

A. Put teabag in cup D. wait

B. Boil Water 267. An instruction that determines the order


/ flow of a program is known as a
C. Wait for water to boil
A. Selection Statement
D. Is water boiled?
B. Looping Statement
262. What is the missing number in the follow- C. Variable Statement
ing sequence? 2, 12, 60, 240, 720, 1440,
0 D. Abstract Statement

A. 2880 268. What is pseudocode?


B. 1440 A. Simplified programming language,
that is not a specific language
C. 720
B. Complicated programming language
D. 0
C. Simple programming language, which
263. Else statements is linked to a specific language

A. run each time an “if” condition is true D. A type of cheese

B. run when an “if” condition is false 269. A model in which programs run in order,
one command at a time.
C. run every time an “if” statement runs
A. Linear Search
D. do not need an “if” statement
B. Binary Search
264. Which python operator means ‘less than C. Unreasonable Time
or equal to’?
D. Sequential Computing
A. >=
270. In a flowchart how are symbols con-
B. >
nected?
C. <
A. Symbols do not get connected together
D. <= in a flowchart

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 180

B. With lines and an arrow to show the 276. Which sorting algorithm takes an item
direction of flow from the list, and puts it in the correct
C. With dashed lines and numbers place in a sorted list?
A. Merge
D. With solid lines to link events
B. Bubble
271. What is the function of the router? C. Insertion
A. converting the data from one format to D. None of them do
another

NARAYAN CHANGDER
277. A concrete step is an algorithmic step
B. Forward the packet to the up links
where
C. error detection in data
A. All the details are specified.
D. None of the above B. Some details details are unspecified.
272. An Algorithm asks the user to enter their C. There is a top down design.
scores for 5 different tests. This is an D. Details are object orientated.
example of which of the algorithm con-
structs? 278. What is a flowchart symbol?
A. Decision (Selection) A. Specific shape used to create a visual
representation of the program
B. Loop (Iteration)
B. It is a directional symbol for traffic
C. Order (Sequence)
C. it shows a connection
D. All of the above
D. words that flow with the chart
273. What does this pseudocode do? print 279. Which option is a searching algorithm
“Hello”
A. Bubble
A. Nothing
B. Linear
B. Prints the word “Hello” to the output C. Merge
C. hello is print in pseudocode D. none of above
D. The code won’t work
280. Algorithms can be designed using
274. Which of these is a way can you repre- A. A pie chart.
sent and algorithm? B. A bar graph.
A. Code C. Use case diagrams.
B. List D. Flowcharts and Pseudo codes.
C. Pseudocode
281. Which correctly illustrates the structure
D. Shapes of a pseudocode algorithm?

275. When can an algorithm be used? A. Declaration, Body, Terminator


B. Header, Body, Declaration, Terminator
A. Only with computers
B. For programming
C. Header, Declaration, Body, Termina-
C. To design a solution to any problem tion
D. none of above D. Header, Declaration, Start, Body, Stop

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 181

282. Algorithms are normally written as a A. Pseudocode


flowchart or in B. Correctness

PRACTICE BOOK» NOT FOR SALE


A. your thought process. C. Conditions
B. Repeats a program D. Events
C. Getting small part of a problem and
288. Which algorithm for building a shelf
adding them together
would be most precise?
D. pseudocode
A. an algorithm written with exact lan-
283. If the given input array is sorted or nearly guage anyone can follow.
sorted, which of the following algorithm B. an algorithm written without any mea-
gives the best performance? surements or verbs.
A. Insertion sort C. an algorithm with one step.
B. Bubble sort D. an algorithm with no steps.
C. Merge sort 289. Before an algorithm can be designed
D. Quick sort A. it is important to check that the prob-
lem is completely understood
284. Which sorting algorithm makes one swap
per pass (possibly swapping an element B. have specific syntax that must be used
with itself)?
A. Selection Sort C. Freedom from representing art
B. Bubble Sort D. Detects errors while program is run-
ning
C. Insertion Sort
D. none of above 290. Define the term decomposition within
computational thinking
285. A is a type of diagram that represents A. The breaking down of a program until
an algorithm, workflow or process it no longer exists
A. Program B. The creation of music that can be
B. Flowchart played on a computer
C. Instruction C. The breaking down of a problem into
D. Image smaller problems
D. The breaking down of waste to make
286. What links each instruction in a compost
flowchart?
291. A binary search is to be performed on the
A. A line
list:1 5 10 13 48 68 100 101How many
B. A double line comparisons would it take to find number
C. An arrow 101?
D. A double arrow A. 0-1
B. 1-2
287. What is/are used to determine whether
code should be run for both “IF” state- C. 3-4
ments and “WHILE” loops D. 4-5

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 182

292. Flowcharts are from 297. How are symbols connected together in a
flowchart?
A. Left
A. Symbols do not get connected together
B. Right
in a flowchart
C. Bottom
B. With lines and an arrow to show the
D. Top to bottom direction of flow

293. Which of the following is a searching al- C. By numbers

NARAYAN CHANGDER
gorithm used by computer systems? D. none of above
A. Linear search
298. Describe an advantage of a linear search
B. Bubble search algorithm
C. Open search A. Data does not need to be in order.
D. none of above B. Performs well over large ordered lists.

294. An Algorithm can be used to accomplish


not only a single task but a whole group C. Can only work on an ordered list. If
of related tasks. unordered must use a linear search.

A. Always D. Slow with large data sets.

B. often 299. What is the purpose of a parallelogram


C. Never within a flowchart?

D. none of above A. Input / Output


B. Sub-process
295. Which of the following describes a merge
sort? C. Decision

A. Compares each pair and swaps D. Output

B. List is split in two and merged together 300. Which sorting algorithm splits a list of
in order items into individual lists?
C. List is split into 2 and kept seperate A. Merge
D. None of the above B. Bubble

296. Algorithms in computer science have C. Insertion


three main steps D. None of them do
A. Start by mathematics equations, Ana-
301. What should be considered when design-
lyze data, Stop when finding answer
ing an algorithm?
B. Start with complex calculation, find val-
A. If the correct hardware is being used
ues of variables, Stop when we find an-
swer B. If the correct software is being used
C. Start with input data, Do complex cal- C. If there is more than one way of solv-
culation, Stop when we find answer ing the problem
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 183

302. The second part of if, that is executed 307. Algorithm is problem solving pro-
when the condition is false cess.

PRACTICE BOOK» NOT FOR SALE


A. if A. Loop based
B. else B. Conditional

C. for C. Step by Step


D. All of the above
D. input
308. To repeat a task number of times we use
303. An abstract step is an algorithmic step
where A. input statement
B. conditional statement
A. Some details are still unspecified.
C. loop statement
B. All details are specified.
D. output statement
C. There is top-down design.
309. For which of the following lists can a bi-
D. The solution is object orientated.
nary search be used to search for an item
in the list? [”blue”, “green”, “jade”,
304. Identify the correct definition for ‘algo-
“mauve”, “pink”] [5, 5, 5, 5, 6, 7, 8, 8,
rithm’
8] [10, 5, 3, 2, -4, -8, -9, -12]
A. A problem
A. I only
B. A solution to a problem B. III only
C. The steps that are taken to solve a C. I and III only
problem
D. I, II and III
D. The words to enter when typing
310. If something needs to be done (process-
305. What is an Integer? ing) what flowchart symbol do we use?
A. A data type that contains whole num- A. oval
bers. eg:3, 45, 124 B. parallelogram
B. Numbers with decimal point. eg:0.5, C. rectangle
2.45, 56.04 D. diamond
C. Group of characters between quota-
311. Term for the physical parts of the com-
tion marks. eg:“dog”
puter
D. Data type that can only be True or A. HARDWARE
False.
B. HARD DRIVE
306. Which of the following would be consid- C. SOFTWARE
ered unreasonable?
D. INPUT DEVICES
A. 3n
312. Which of the following tasks would you
B. 3n most likely use an algorithm to complete?
C. n3 A. building a lego.
D. n30 B. baking cookies.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 184

C. following directions from your house 318. Describe a bubble sort


to the park.
A. The list is split into two and repeated
D. all of the above.
B. The values are compared and swapped
313. is used to denote when the program
will stop.
C. The list is randomly sorted
A. FINISH
D. The list is sorted in alphabetical order.
B. BEGIN

NARAYAN CHANGDER
C. END 319. Putting commands in correct order so
D. ELSE computers can read the commands is
A. algorithms
314. A simple way of describing a set of in-
structions that does not have to use spe- B. selection
cific syntax is called:
C. sequencing
A. Flow Chart
D. none of above
B. Pseudocode
C. Shapes 320. What is the purpose of a diamond in a
D. none of above flowchart?

315. How many paths can be followed from a A. Process


decision? B. Input / Output
A. As many as is needed C. Sub-process
B. Three
D. Decision
C. Two
D. none of above 321. Describe a disadvantage of a linear
search algorithm
316. In a flowchart input and output actions
are represented by: A. Data does not need to be in order.
A. Parallelograms B. Performs well over large ordered lists.
B. Diamonds
C. Rectangles C. Can only work on an ordered list. If
unordered must use a linear search.
D. Circles
D. Slow with large data sets.
317. In scratch, this is the place where we see
all the possible commands for our project. 322. Which of these values would be useful as
Includes movement, control, events and a constant?
other options.
A. Pi
A. Stage
B. Sprites B. Di

C. Blocks C. Ni
D. Scripts D. Pie

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 185

323. Given this array:1, 2, 4, 5, 6, 7, 8, 12, 328. The time used to complete a task sequen-
14, 21, 22, 42, 53How many comparisons tially divided by the time to complete a
are required to find 42 using the Linear task in parallel

PRACTICE BOOK» NOT FOR SALE


Search / Sequential Search? A. Efficiency
A. 3 B. Undecidable Problem
B. 2 C. Unreasonable Time
C. 12 D. Speedup
D. 5
329. With a problem that cannot be solved for
324. What am I? This is where instructions are all cases, what can sometimes be used as
done one after another. a close approximation?
A. Sequence A. a traveling solution
B. Selection B. a solvable solution
C. Iteration C. a heuristic solution
D. none of above D. an intractable solution

325. In Python, the output is made using the 330. Which one of these is floor division?
command A. /
A. display() B. //
B. print() C. %
C. show() D. None of the mentioned
D. see
331. Which sorting algorithm is described by
326. The following lists represent 3 passes of taking each item in turn, compare it to the
a sorting algorithm. Which algorithm is be- items in the sorted list and place it in the
ing used to sort the list? 4 5 9 6 2 72 5 9 ordered position in the sorted list?
6 4 72 4 9 6 5 72 4 5 6 9 7 A. Merge
A. Bubble Sort B. Bubble
B. Selection Sort C. Insertion
C. Insertion Sort D. None of the above
D. none of above 332. Define DECOMPOSITION
327. A program is designed to accept the name A. Breaking a task into smaller tasks.
and price of an item and calculate the total B. Looking for similarities and trends.
price including GCT of 16.5%.What vari-
ables can be used to store the input from C. A sequence of instructions.
the user? D. Focusing on what is important and ig-
A. name, price, totalprice noring what is unnecessary.
B. price and GCT 333. What is Pseudocode used for?
C. name, price, GCT A. For testing a program.
D. name and price B. For coding a program.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 186

C. To write program steps. C. Bubble


D. Denoting the program flow. D. Insertion

334. What is syntax? 339. Which of the algorithm uses the concept
of best spanning tree?
A. Syntax is the word used to describe an
error A. Path vector
B. Syntax is the rules of the programming B. distance vector
language C. link state

NARAYAN CHANGDER
C. It is used to read information D. none of the mentioned
D. It is used to output information 340. You are required to design an algorithm
to calculate the pay for an artiste. The
335. The process carried out in computer sys-
pay is top rate for most popular artiste
tems is represented by in flowchart.
otherwise is at normal rate. Which one
A. Rectangle of the following control structures should
B. parallelogram you use?
C. Square A. Iteration.

D. Diamond B. Repetition.
C. Selection.
336. The following lists represent 3 passes of
D. Sequence.
a sorting algorithm. Which algorithm is be-
ing used to sort the list? 4 8 6 2 5 7 4 8 341. The breaking down of a system into
6257468257 smaller parts is called
A. Bubble Sort A. Instruction
B. Selection Sort B. Syntax
C. Insertion Sort C. Variable
D. none of above D. Decomposition

337. How is sequencing represented in pseu- 342. In a flow chart, what does a oval mean?
docode? A. Start or end
A. Each step of the algorithm is written B. Decision
on a line of its own, in sequence C. Process
B. Each step of the algorithm is explained D. Input or Output
in a diagram
C. All the steps of the algorithm is written 343. Which one of the following statements is
on the same line TRUE about Algorithm?
A. It is a computer program.
D. none of above
B. It is a link to another web page.
338. Which of these is NOT a Sort algorithm
C. It is a set of steps applied to solve a
for OCR GCSE computer science?
problem.
A. Binary D. It is a set of steps that are arranged in
B. Merge no particular order.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 187

344. Which of these would not be involved in C. Hello Hello world! world!
decomposing a problem? D. SyntaxError

PRACTICE BOOK» NOT FOR SALE


A. Thinking about how the problem could
be divided into smaller parts 349. A binary search is to be performed on the
list:3 5 9 10 23How many comparisons
B. Working out who could help you solve
would it take to find number 9?
a part of the problem
A. 0-1
C. Adding more parts to the problem so it
becomes more complaex B. 2-3
D. none of above C. 4-5

345. Decomposition is a term used to define D. I can’t find the number 9

350. Which control structure will execute an


A. The process of assigning value to a instruction only after the computer eval-
variable. uates conditions to determine if a certain
B. The process of taking out unnecessary condition exists?
details from problems. A. Selection
C. The process of breaking down prob- B. Loop
lems into smaller problems.
C. Functional
D. The process of coding a problem.
D. Sequence
346. device to exchange items such as data,
instructions, and information with another 351. The correct pseudocode for a loop that
computer. runs a set number of times is:

A. Hardware-Communication device A. FOR

B. Hardware-STORAGE B. WHILE
C. Hardware-SYSTEM UNIT C. REPEAT
D. Hardware-INPUT D. LOOP

347. Which sorting algorithm shifts elements 352. Identify the search algorithm
instead of swapping elements if needed in A. Random search
each pass.
B. Binary search
A. Bubble Sort
C. Denary search
B. Selection Sort
D. Next Item search
C. Insertion Sort
D. none of above 353. Which of the following is not a pseudo
code keyword or instruction?
348. What will the output be from the fol-
A. READ
lowing code? print(”Hello” + str(2) +
“world!”) B. WRITE
A. Hello world! Hello world! C. START
B. Hello2world! D. END IF

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 188

354. Which sorting algorithm is the fastest for 360. what is a pros of linear search?
a list that is in the correct order?
A. good with long lists
A. Bubble
B. very easy to implement
B. Merge
C. Insertion C. quick
D. Binary D. none of above
355. Tells the interpreter that the code which

NARAYAN CHANGDER
361. Which of the following variables names
follows is a function
is an example of camel case?
A. const
A. totalScore
B. int
C. def B. TOTALSCORE

D. while C. TotalScore

356. A benefit of using flowcharts is: D. none of above


A. They help you program faster
362. How would a condition loop be created
B. They write the program for you when writing pseudocode?
C. They are easier
A. With a FOR loop
D. They help you to visually plan a pro-
gram B. With a WHILE loop or a REPEAT-UNTIL
loop
357. Define the term computational thinking
C. With a REPEAT-UNTIL loop
A. Using a computer
B. Developing an algorithm to solve a D. none of above
problem
363. What does “De-bugging” mean?
C. Making a computer use arti cial intelli-
gence A. It is an interactive computerised robot.
D. Google is computational thinking
358. is used by programmers to display in- B. It is when you solve and correct a com-
formation to the user. puter related error.
A. START C. It is a piece of virus software.
B. WRITE D. none of above
C. INPUT
D. OUTPUT 364. What shape in the flow chart represents
a decision
359. Booleon operators are also know as:
A. Square
A. Logical operators
B. Diamond
B. Combination operators
C. Algorithmic operators C. Rectangle
D. Flow operators D. Oval

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 189

365. What is the variable name in this Pseu- 370. Dijkstra algorithm is also called the
docode? STARTSEND ‘Whats your name? shortest path problem.
’ TO DISPLAYRECEIVE agE FROM KEY-

PRACTICE BOOK» NOT FOR SALE


A. multiple source
BOARD (INT)
B. single source
A. age
C. single destination
B. Age
D. multiple destination
C. AGE
D. agE 371. Which of these is NOT a Sort algorithm
A. Binary
366. What symbol is used in python to assign
values to a variable? B. Merge

A. equals = C. Bubble

B. plus + D. Insertion

C. forward slash / 372. The ordered steps in a program.


D. asterisk * A. Sequence

367. What type of operators are == != < > <= B. If Then Else
>= C. Conditional
A. Arithmetic D. Value
B. Relational 373. What is a pseudocode?
C. Booleon A. Story-telling written in English.
D. none of above B. Complicated programming language.
368. What does Router do in a network? C. Simple English language, with more
A. Forwards a packet to all outgoing links detailed steps to describe the flow of al-
gorithm.

B. Forwards a packet to the next free out- D. Simplified programming language.


going link 374. Deciding to wear a jacket or not to school
C. Determines on which outing link a would be an example of
packet is to be forwarded A. Sequence
D. Forwards a packet to all outgoing links B. Selection
except the originated link
C. Iteration/looping
369. Which is the easiest set of instructions to D. none of above
follow?
A. Draw a house. 375. What algorithm do we use when we’re
looking for the Post Office?
B. Draw a house with 4 windows, a door,
chimney and a path. A. A set of directions

C. Draw a house with windows and a B. A recipe


drive. C. A list of instructions
D. Draw a square, with 4 squares inside. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 190

376. What are the three algorithm con- 381. The output of Kruskal and Prims algo-
structs? rithm is
A. Sequence, selection, repetition A. Maximum spanning tree
B. Input, output, process B. Spanning tree
C. Input/output, decision, terminator
C. Minimum spanning tree
D. Loop, input/output, process
D. None

NARAYAN CHANGDER
377. What is the pseudo-code instruction out-
put data? 382. What decisions need to be made in the
problem, is part of
A. GET or READ
B. PROCESS A. Understanding the Problem

C. COMPUTE or CALCULATE or DETER- B. Understanding the solution to the prob-


MINE or PROCESS lem
D. DISPLAY or WRITE or PRINT or SHOW C. Understanding the Stages of the plan

378. Which of the following best describes al- D. none of above


gorithmic thinking?
383. We are sorting the following list in as-
A. Removing all of the unimportant bits of cending order:1 4 2 9 3 8 5 What does the
a problem. list look like after one pass of the bubble
B. Breaking the problem down into man- sort algorithm.
ageable chunks.
A. 1 2 4 3 8 5 9
C. A logical way of getting from the prob-
lem to the solution. B. 1 4 2 5 3 8 9

D. none of above C. 4 2 9 3 8 5 1

379. What is important to remember when de- D. none of above


signing an algorithm?
384. What is another name for iteration?
A. whether to use a flowchart or pseu-
docode A. Loop
B. the instructions are in the correct or- B. Sequence
der C. Selection
C. that it must be easy to read
D. none of above
D. none of above
385. The statement that tells the computer to
380. An identifier is the ‘name’ given to a
get a value from an input device and store
variable. For example:distanceToSchool =
it in a memory location.
10What is the value of the variable?
A. READ
A. 10
B. = B. WRITE
C. distanceToSchool C. START
D. none of above D. ENDIF

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 191

386. How is sequencing represented in a C. Every day, often without thinking


flowchart? about it

PRACTICE BOOK» NOT FOR SALE


A. With sentences that look like a pro- D. Only in the morning, when getting
gramming language ready for the day
B. As a series of boxes that follow each 392. The processes that are residing in main
other, linked by arrows memory and are ready and waiting to ex-
C. As a series of diamond shaped boxes ecute are kept on a list called
that follow each other, linked by arrows A. job queue
D. none of above B. READY queue
387. What three building blocks are used C. EXECUTE queue
when designing algorithms D. DEVICE queue
A. Sequencing, programming, iteration
393. A section in a flowchart that requires an
B. Sequencing, selection, iteration
action from a user is known as a
C. Sequencing, selection, programming
A. decision
D. none of above
B. loop
388. Which combination of statements can be C. wait
used to express algorithms?
D. input
A. Iterative, selection, sequential
394. What are the three main programming
B. Correctness, efficiency, readability
structures?
C. Readability, iterative, efficiency
A. Sequence, selection, loop
D. Selection, conditional, and Boolean
B. Structured, object-oriented, procedu-
389. Which value is a String? ral
A. 64 C. Java, Python, Visual Basic
B. “cat” D. Machine, assembly, high-level
C. True 395. In a flow chart, what does a rectangle
D. 0.5 mean?
A. Start or end
390. How can an algorithm be represented?
B. Decision
A. As a flowchart only
B. As pseudocode only C. Process

C. As a flowchart or pseudocode D. Input or Output

D. none of above 396. How could an algorithm be defined?

391. How often do we decompose problems? A. a sequence of steps to perform a spe-


cific task
A. We never decompose them, comput-
ers do this for us B. a sequence of steps

B. Occasionally, but we don’t really need C. a serie of inputs and outputs


to D. a serie of processes

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 192

397. What means Executable in Algorithm 403. A flowchart


A. the steps are clear A. Helps you plan out computer code
B. the steps are interpreted in one unique B. is a type of graphic diagram that rep-
way resents an algorithm,
C. the steps are ordered
C. Uses shapes to help organize a pro-
D. none of above cess
398. Which of the following is a sort algo- D. All of the above

NARAYAN CHANGDER
rithm?
404. What is a binary search?
A. A linear sort
B. A bubble sort A. Each item is checked in order

C. A ordered sort B. The list is split into 2 and compared


D. A binary sort C. The first 2 values are compared and
moved
399. What is the variable name in this Pseu-
docode? STARTPRINT “Whats your name? D. Nothing happens
”READ agE
405. Why is iteration important?
A. age
A. It allows us to choose one of several
B. Age
paths through an algorithm
C. READ
B. It allows us to simplify an algorithm by
D. agE removing unnecessary steps
400. Which one of the following is a pictorial C. It allows more steps to be included in
representation of an algorithm? an algorithm
A. Flowchart. D. none of above
B. Program.
406. How many linear searches will it take to
C. Pseudo code.
find the value 7 in the list [1, 4, 8, 7, 10,
D. Bar chart. 28]?
401. In a sorting algorithm-What is a “Pass” A. 2
A. Finishing the sort. B. 3
B. You begin the sort. C. 4
C. You complete one “round” of the sort
D. 5
D. The sorting algorithm is over.
407. Which type of statement is an example
402. Which key word will return the remain-
of a selection programming structure?
der of a division
A. If/else
A. DIV
B. MOD B. while
C. SHOW C. do while
D. TCP D. for

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 193

408. If an Algorithm is performed correctly 413. What is the worst case complexity of
should always give same result, that Merge sort?
means it should be

PRACTICE BOOK» NOT FOR SALE


A. O(n log n)
A. Doable
B. O(log n)
B. Understandable
C. O(n)
C. Finite
D. O(n2)
D. Precise
414. A real is
409. What is selection?
A. A whole number
A. A set of steps to follow
B. A number with a decimal part
B. A path through a solution
C. Letters, numbers or punctuation
C. A decision
D. True or False
D. none of above
415. The number of executions grows ex-
410. Algorithms with exponential or factorial
tremely quickly as the size of the input in-
efficiencies are examples of algorithms
creases
that run in an unreasonable amount of
time. A. Exponential Time
A. Algorithm B. Linear Time
B. Sequential Computing C. Polynomial Time
C. Unreasonable Time D. Constant Time
D. Distributed Computing
416. In the exam all variables should be writ-
411. What algorithm do we use when we’re ten in:
building a wardrobe? A. Upper Case
A. A set of directions B. Lower Case
B. A recipe C. First letter upper case and the rest
C. A list of instructions lower.

D. none of above D. First letter lower case and the rest up-
per.
412. Unambiguous in Algorithm means
417. What is abstraction?
A. the steps are interepted only in one
unique way A. The process of filtering out unneces-
sary detail.
B. the person or device executing the in-
struction must know how to accomplish B. The process of filtering out irrelevant
the instruction without any extra informa- characteristics
tion. C. The process of filtering out irrelevant
C. the steps should be clear characteristics and unnecessary detail.
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 194

418. To compute a speedup calculation: 423. What is a type of diagram that shows the
A. Divide Parallel Time by Sequential sequence of steps in an algorithm?
Time A. flow chart
B. Subtract Sequential Time by Parallel
B. pie chart
Time
C. Substract Parallel Time by Sequential C. bar graph
Time D. line graph

NARAYAN CHANGDER
D. Divide Sequential Time by Parallel
Time 424. Which of the following contains a correct
sequence to make a cup of tea?
419. What do you call English-like statements
that represent program logic? A. Add water to kettle, boil water, add hot
water to cup
A. Flowcharts.
B. Pseudocodes. B. Add hot water to cup, add water to ket-
tle, boil water
C. Machine language.
D. Low-level languages. C. Boil water, add hot water to cup, add
water to kettle
420. Which of the following is FALSE regarding
D. none of above
algorithms?
A. Option 1:Different algorithms can be 425. Another name for a terminator in a flow
developed to solve the same problem chart is
B. Option 2:Different code can never be
A. start / end
written to implement the same algorithm
C. Both Option 1 and 2 are true B. decision
D. Both Option 1 and 2 are false C. process

421. In multilevel feedback scheduling algo- D. data input / output


rithm
426. Which of these is the correct symbol for
A. a process can move to a different clas-
a process in a flowchart?
sified ready queue
B. classification of ready queue is perma- A. A diamond
nent B. A rectangle
C. processes are not classified into
C. A parallelogram
groups
D. NONE D. none of above

422. which characters in programming get 427. A parallelogram indicates


mostly confused?
A. input/output
A. l and i
B. process
B. o and 0
C. m and n C. input
D. none of above D. output

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 195

428. When an algorithm is written in the form 434. A symbol that leads to two possibilities
of a programming language, it becomes a in a flow chart is known as a
A. loop

PRACTICE BOOK» NOT FOR SALE


A. Syntax B. decision
B. Flowchart C. end
C. Program D. sequence
D. Pseudo code
435. Writing an algorithm is useful for a task
429. What RAM stands for? that
A. Random Access Memory A. will need to be completed only once.
B. Random Autonomous Memory B. will need creativity to complete.
C. Read Action Memory C. will need continued research to com-
plete.
D. Rare Ally Memory
D. will need to be completed many times.
430. Pseudocode can be understood by:
436. is a procedure or formula for solving
A. Only Users a problem.
B. Only Computers A. Quantitative questioning
C. Both B. Original asset
D. none of above C. Algorithm
431. What is the correct symbol for a decision D. None of these.
in a flowchart?
437. Link State packets are transmitted
A. A rectangle through
B. A diamond A. flooding
C. A square B. multicast routing
D. none of above C. unicast routing
432. Which of the following searching tech- D. through any of the mentioned
niques require the data to be in sorted 438. How do you repeat things in a
form Flowchart?
A. Binary search A. Loop
B. Linear search B. Start/Stop
C. Interpolation search C. Play
D. All of the above D. none of above
433. What 3 types of flowchart are there? 439. the process is swapped out of memory
A. Process, Swimlane, Dataflow Diagram and later swapped into memory is done by
A. short term
B. Circle, Square, Triangle B. medium term
C. Execute, Input, Output C. long term
D. none of above D. none

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.5 Algorithms 196

440. Breaking a complex problem down into 445. What symbol shoes something you need
smaller problems and solving each one in- to do?
dividually.
A. oval
A. Decomposition
B. parallelogram
B. Abstraction
C. Programming C. rectangle

D. Algorithmic Thinking D. diamond

NARAYAN CHANGDER
441. What are algorithms used for? 446. What is the pseudo-code instruction for
A. To plan out the solution to a problem calculation?
B. As a platform to program a solution A. GET or READ
C. To test a solution to a problem B. PROCESS
D. none of above
C. COMPUTE or CALCULATE or DETER-
442. Which of the following is true about Huff- MINE or PROCESS
man Coding.
D. DISPLAY or WRITE or PRINT or SHOW
A. Huffman coding may become lossy in
some cases 447. What is a condition?
B. Huffman Codes may not be optimal
A. A decision
lossless codes in some cases
C. In Huffman coding, no code is prefix of B. A situation that is checked every time
any other code. iteration occurs
D. All C. A type of iteration

443. What is a Boolean? D. none of above


A. A data type that contains whole num-
448. In a flow chart, what does a diamond
bers. eg:3, 45, 124
mean?
B. Numbers with decimal point. eg:0.5,
2.45, 56.04 A. Start or end
C. Group of characters between quota- B. Decision
tion marks. eg:“dog”
C. Process
D. Data type that can only be True or
False. D. Input or Output

444. Which type of programming structure re- 449. What are the drawbacks of using merge-
quires each instruction to be performed in sort?
order, with no possibility of skipping an
action or branching off to another action? A. It has no drawbacks.
A. Loop B. It only works on arrays.
B. Sequence C. There are special cases where it runs
C. Selection very slowly.
D. Iteration D. It uses more memory.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 197

450. Process are classified into different C. 3


groups in D. 1

PRACTICE BOOK» NOT FOR SALE


A. shortest job scheduling algorithm
455. What is a control Algorithm?
B. round robin scheduling algorithm
A. A problem that requires the steps to be
C. priority scheduling algorithm
taken in a certain order
D. multilevel queue scheduling algorithm
B. The algorithm can be changed
451. means to repeat in order to achieve, C. The algorithm can be completed in any
or get closer to, a desired goal. order.
A. Sequence D. none of above
B. Iterate
456. What am I? This is where instructions are
C. Select
repeated.
D. none of above
A. Sequence
452. A linear search is to be performed on B. Selection
the list:12, 6, 8, 1, 3How many searches
would it take to find the number 1? C. Iteration

A. 1 D. none of above
B. 2 457. A datatype that can hold more than one
C. 3 value is known as
D. 4 A. Composite
B. Concrete
453. What approach does MergeSort use?
A. divide and conquer C. Abstract

B. iterative D. Atomic
C. search and swap 458. An Algorithm, should be easy to follow
D. search and insert (clear). That means it should be
A. Doable
454. How many passes will it take to sort this
data in ascending order, 1, 2, 3, 5, 4. B. Understandable
A. 2 C. Finite
B. 5 D. Precise

1.6 Operating system


1. The CPU is the of the computer. 2. Which statement is not explain about
A. Knee batch system

B. Brain A. User is NOT the operator


C. Body B. Automatic job sequencing
D. Heart C. Resident monitor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 198

D. No need to distinguish job from job and 8. Which one is not type of operating system
data from program A. Batch system
3. What happens when RAM is full? B. Distribute system
C. Multi-level system
A. The computer crashes
D. Multi-programming system
B. Virtual Memory is used
C. An interrupt is raised 9. The operating system that a computer uses
sometimes is called which of the follow-

NARAYAN CHANGDER
D. The computer explodes ing?
A. Base
4. are programs that designed to help
users complete a task. B. Platform
A. Software C. Index
D. Boot System
B. System Software
C. Application software 10. Instructions that enable the operating sys-
tem to interact with a device.
D. Utility program
A. Virtual Memory
5. Which is the first program run on a com- B. Application software
puter when the computer boots up? C. System softwarre
A. System operations D. Driver
B. System software. 11. What is a hardware utility software used
C. Operating system. for?
D. System operations. A. Make hardware function better
B. Make Software function better
6. Which is not a traditional phase in prepar-
C. Make users function better
ing a disaster recover plan
D. None of the above
A. Risk analysis
12. Which is NOT a function of Operating Sys-
B. Testing, Maintenance, Awareness, and
tems?
Training
A. Booting the Computer
C. identify all systems used in the organi-
zation B. Networking
C. Streaming content
D. none of above
D. Device Management
7. Which of the following is NOT a step of
13. Which of the following controls the orien-
the information system process?
tation of your phone?
A. Gather
A. Gyroscope
B. Create B. Accelerometer
C. Store C. Geotracking
D. Process D. Capacitive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 199

14. Which one of these is a real File System? 20. Which Operating System function allows
A. NTSF more than one program can run at the
same time?

PRACTICE BOOK» NOT FOR SALE


B. EXT2
A. User Interface
C. FSX2
B. Memory Management
D. HTFSN
C. User Management
15. How many satellites does GPS need to D. File Management
work?
A. 2 21. the shourtcut key for Setup access

B. 4 A. F2, F12, Del


B. Ctrl + Shift + Del
C. 6
C. F8
D. 8
D. none of above
16. An operating system that allows a single
computer to deal with simultaneous pro- 22. Efficiency ratings for Power Supplies are
cessing requests from multiple users. based on this, which is drawn to supply
sufficient power to the PC
A. single user operating system
A. amperes
B. hand held operating system
B. ohms
C. desktop operating system
C. volts
D. multi-user operating system
D. watts
17. The operating system is held
23. What type of software am I? I am the com-
A. in permanent storage and loaded into
municator between applications software
RAM when the computer is booted up
and hardware.
B. in the loader program
A. Operating System
C. in the boot up program
B. Application software
D. none of above
C. Utility software
18. software that is available for free of cost D. none of above
called
24. iPad would most likely run on the plat-
A. Freeware
form
B. Hardware A. Windows RT
C. Shareware B. Mac iOS
D. none of above C. Android
19. Which utility protects against viruses? D. LINUX
A. Antivirus 25. space in memory where user processes
B. Restore Utility run.
C. Search Utility A. user management
D. File Compression B. providing a user interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 200

C. Multitasking process 31. when a computer has been taken over by


D. None of Above criminal malware it is called what?
A. a bing
26. One of the operating system Error mes-
sages B. a bang

A. Blue screen error C. a bit

B. Printing problems D. a bot

NARAYAN CHANGDER
C. Event log errors 32. kernel space
D. none of above A. develop than single programming sys-
tems
27. What is the CPU?
B. is the location where the code of the
A. Circled processing unit kernel is stored, and executes
B. Storage device C. operating system can support two or
C. Central processing unit more CPUs
D. Hard drive D. Computer program requests a service
from the kernel
28. This type of operating system can be im-
proved and enhanced by users 33. What is a virus?
A. MacOS A. blocking access until money is paid
B. UNIX B. A piece of code that can copy itself and
attack a computer
C. Windows 7
C. Sends information covertly
D. Windows 10
D. when someone steals your computer
29. Key is a specific
software-based key for a computer pro- 34. What is a device driver?
gram. It certifies that the copy of the pro- A. Acts as a way of turning machine code
gram is original and was legally purchased in to low level programming
A. Application B. A type of printer or scanner
B. Product C. A program that manages the devices
C. Software attached to your computer.
D. Windows D. Something that manages your vari-
ables.
30. The last character in a file name, after the
period that usually identifies the program 35. The part on the right side of the task bar
used to create the file is known as?
A. Windows Exploer A. Start button
B. Android-Os B. Menu bar
C. File Extension C. Notification area
D. Windows 10 D. Quick launch toolbar

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 201

36. Which of the following helps distinguish in- 42. Which type of user interface requires the
dividual computers, serving the same pur- user to input text?
pose as a street address

PRACTICE BOOK» NOT FOR SALE


A. GUI
A. Firewall
B. MUI
B. Metropolitan area networks
C. Transmission control protocol C. CLI

D. Graphical user interface D. TDI

37. When does BIOS run? 43. BIOS is a part of which function?
A. Runs after Windows loads
A. Memory Management
B. Runs before you shut down
B. Bootstrap Process
C. Runs after you log in
C. Process Management
D. Runs before Windows loads
D. System Restore
38. Which is the best advantage of using Win-
dows?
44. What is windows XP?
A. The price
A. legacy operating systems
B. The security
C. Availability of Software B. current operating system

D. the people C. Shareware software

39. Which of the following is the most recent D. none of above


version of Windows?
45. Which of the following is the extension of
A. Windows 8
Notepad?
B. Windows 7
A. .txt
C. Windows 10
B. .xls
D. none of above
C. .ppt
40. Which of the following is not an example
of an OS for Smart phone? D. .bmp
A. UNIX
46. One of the capabilities of operating sys-
B. IOS
tems:A program can be broken into smaller
C. Windows Phone 7 parts that are loaded as needed by the op-
D. Android erating system. This feature allows dif-
ferent parts of a program to be run at the
41. Which is wrong statement about dis- same time.
tributed system
A. multi-tasking
A. Hardware very cheap
B. multi-threading
B. Human very expensive
C. Requires secure memory C. multiprocessing
D. Client/server architectures D. multi-user

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 202

47. What can an operating system do? C. Turns binary in to denary


A. Manage all the hardware and all the D. Deals with transferring data from the
software to communicate CPU
B. Make a computer run faster
53. The out put of the printer is known as
C. Manage hardware only
A. Print out
D. carry out hospital operations
B. Soft copy
48. By combining the words ‘malicious’ and

NARAYAN CHANGDER
‘software’ we get the word ‘malware’. C. Hard copy
What does malicious mean? D. none of above
A. Malicious means delicious.
54. The option which gives you detailed infor-
B. Malicious means Mali Juice. mation about files, folders, drives.
C. Malicious means harmful. A. Start button
D. None of these
B. Navigation pane
49. What is an operating system? C. Windows/File explorer
A. interface between the hardware and D. Show files
application programs
B. collection of programs that manages 55. Before the operating system is completely
hardware resources running the handles the start up in-
C. system service provider to the applica- structions.
tion programs A. RAM
D. all of the mentioned B. ROM
50. Which type of User Interface is text-based C. CPU
and requires the user to write commands? D. BIOS
A. Command Line Interface
B. Graphical User Interface 56. What is the most popular operating sys-
tem in the world?
C. Menu Interface
A. iMac Pro
D. No User Interface
B. Windows 7
51. Which of the followings is not GUI operat-
C. MacBook Air
ing system?
A. DOS D. Windows 95 OSR2.5
B. Windows 57. is a program that controls the execu-
C. iOS tion of application programs
D. Linux A. CPU

52. What doesn’t an operating system do? B. Driver


A. Sorts out data on disk drives C. Operating System
B. Deals with security D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 203

58. Operating system License? B. Android


A. Describes the legal rights pertaining to C. Microsoft Windows

PRACTICE BOOK» NOT FOR SALE


the authorized use of D. none of above
B. Allows users to review and modify the
source code 64. The Registry is
C. Collection of instructions that enable A. Part of the operating system responsi-
the user to interact with a computer ble of App installation
D. none of above B. A feature that transfer pages of data
from Ram to the H desk
59. Which of these mobile operating system
C. Database that contain all configuration
are open source?
information
A. Windows Mobile
D. none of above
B. Linux
65. What does GUI stand for?
C. Android
A. Genuine Umpire Impressions
D. Apple iOS
B. Graphical User Interface
60. Which Operating System function ensures
any device can be used with the operating C. Graphic Up Industry
system, as long as a driver is available for D. none of above
it?
66. Wich is the best advantage of using
A. Memory Management Linux?
B. Peripheral Management A. family of open-source operating sys-
C. User Management tems,
D. File Management B. The design
61. Linux Operating System Code is written C. The programs
in: D. the people
A. JavaLanguage
67. It was developed in 1970s when micro-
B. CLanguage computers was introduced
C. BashScripts A. Windows
D. none of above B. Machintosh’s OS X/OS2
62. How are operating systems made? C. DOS
A. Physical Construction D. Unix/Linux
B. Through Programming 68. What type of operating system would be
C. From the internet available on an iPad?
D. From DVDs A. tablet

63. Windows 7 and Windows Vista are exam- B. OpenSource


ples of: C. Desktop
A. IOS Phone D. Handheld

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 204

69. What can be a cause of deleting files in 75. what is the most important aspect before
your system? installing the OS?
A. Self-replicatingvirus A. The OS must be compatible with the ex-
B. Systemrestore isting hardware and the required applica-
tions.
C. Forget thelogin password
B. Have more than 500GB of storage
D. none of above space
C. Install the OS regardless of computer

NARAYAN CHANGDER
70. Which of the following should be per-
formed in order to prevent an issue with specs
information system? D. none of above
A. Decreasing security on computers
76. A signal sent by a hardware or software
B. Increasing expenses/costs to CPU indicating that something needs at-
C. increasing complexity of systems tention
D. Increasing security on computers A. disturbance
B. interrupt
71. What is Malware?
C. waiting
A. Types of Networks
D. exclusion
B. Types of Hardware
77. Which of the following is not one of the
C. Types of Software
most common operating systems for per-
D. Types of Social Media sonal computers?
72. Which of these is not a file type? A. Microsoft Windows
A. .txt B. IBM
B. .pdf C. Linux
C. .exe D. Mac OS X
D. .pp 78. Which code allows people from different
countries to use the computer in their own
73. How many subdirectories are you allowed language?
to create within a single directory is an
OS? A. ASCII

A. It depends on the OS B. Pseudo


C. Unicode
B. 32, 000
D. Binary
C. 64, 000
D. Unlimited 79. attack is an attempt to make an online ser-
vice unavailable by overwhelming it with
74. Which is NOT a type of malware? traffic from multiple sources.
A. Virus A. DDos
B. Worm B. Virus
C. Trojan horse C. Service Hacker
D. Sandwich D. Trojan Horse

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 205

80. keys helps you to open Windows Ex- 86. The final step in the problem solving pro-
plorer. cess is
A. Finding possible solutions

PRACTICE BOOK» NOT FOR SALE


A. Win + E
B. Ctrl + E B. Recognizing and defining the problem
C. E + Win C. Log the problem
D. Shift + E D. none of above

81. A computer uses hold files 87. Best resources of information for hard-
ware and software products:
A. Folder
A. Warranty
B. Icons
B. Vendor website
C. Recycle bin
C. Salesinvoice
D. Applications D. none of above
82. A network that cover large area city, coun- 88. Which part of the operating system will re-
try, called? move data that is no longer needed to free
A. WAN up space for other programs being used?
B. Bridge A. Memory management
C. Router B. File and disk management
D. none of above C. User management
D. User interface
83. The enclosure that contains the internal
components of a computer is called the 89. Select the free operating system with a
A. Portable Storage version called Ubuntu?
A. iOS
B. Hardware
B. Android
C. Tower Casing
C. Windows
D. USB Port
D. Linux
84. A(n) is the most important software
that runs on a computer. 90. What is the main part of the operating sys-
tem
A. Operating System
A. user interface
B. Windows
B. kernel
C. Anti Virus C. system utilities
D. iOS D. device drivers
85. Which of the following operating system 91. Which of the following operating system
is open-source software does not implement multitasking truly
A. Windows A. MS DOS
B. Mac OS X B. WINDOWS 7
C. Linux C. WINDOWS 98
D. UNIX D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 206

92. A type of operating system sometimes B. Laser heads.


called a network operating system that C. Platters.
provides management tools for distributed
networks, e-mail servers, and web host- D. Spindle motor.
ing sites.
98. Which of the following is not systems soft-
A. multi-user operating system ware?
B. server operating system A. Web Browser

NARAYAN CHANGDER
C. single user operating system B. Anti Virus
D. desktop operating system C. Firewall
93. Which of the following is an advantage of D. Zip Compression
Micro kernel Kernel
99. In Linux booting process it is the GRUB
A. Fast Execution phase is where
B. Easily Extendable A. Userallowed to select the Kernel
C. Large in size B. The system accessthe hard drive parti-
D. None of the above tions, and other hardware

94. Which is not a type of OPERATING SYS- C. The system definewhich subsystems
TEM SOFTWARE? are working

A. Windows 7 D. none of above

B. LINUX 100. Before purchasing software, make sure


C. UNIX to

D. RAM A. unplug your computer


B. check the system requirements
95. What does the OS manage to allow multi-
tasking? C. restart your computer
A. Hard disk D. remove user permissions
B. Memory and CPU 101. Select the operating system used Mac-
C. Motherboard Books or iMacs?
D. none of above A. Chrome OS
B. Android
96. When the OS creates temporary RAM on
the Hard Drive it is known as C. MacOS X
A. Virtual Memory D. Linux
B. Cache 102. Why is it important that you name a doc-
C. Registering ument correctly?
D. Defragmenting A. To allow anyone to access the file.

97. Which one of the following is not a part in B. So that it doesn’t feel lonely.
the hard disk drive? C. To find it easily.
A. Actuator. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 207

103. How does the operating system handle 108. Which of these is NOT an operating sys-
file management? tem?
A. Windows

PRACTICE BOOK» NOT FOR SALE


A. Deals with movement, editing and
deletion of data B. Linux
B. Colour codes data C. itunes
C. Translates data into binary D. Android
D. none of above 109. Data is permanent stored in?
A. Hard desk
104. Which of the following is a set of pro-
grams containing instructions that coor- B. RAM ( memory)
dinate all the activities among computer C. Printer
hardware resources? D. none of above
A. Management System
110. Which of the following functions does the
B. Disk Base System operating system not provide?
C. Operating System A. Monitors health and functionality
D. Boot System B. Folder and file structure
C. Interface between user and hardware
105. These are example of Server OS Except
for
D. Coordinate tasks between application
A. Linux software
B. OpenSolaris 111. Process is
C. Solaris A. program in High level language kept on
D. Microsoft Windows 10 disk
B. a program in execution
106. What type of Software is needed to con-
C. a job in secondary memory
trol the computer’s hardware?
D. None of the above
A. Programming Software
112. Where can you find the devices that are
B. Systems Software
installed in your computer?
C. Application Software A. Device Manager
D. Bespoke Software B. Task Manager
107. Mandatory User Profiles is C. System Information
D. System Setting
A. Profile that system created automati-
cally 113. Which operating system is iOS based off
B. Profile thatthe network administrator of?
create A. Linux
C. Profile to manage password and set- B. Mac OSX
ting C. Windows NT Kernel
D. none of above D. Unix

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 208

114. Which one is not an operating system? 120. The information contained in a file sys-
A. iOX tem
B. Windows A. The computer characteristics
C. Android B. the direction web
D. Poloroid C. Location, name, type of flie
115. What is the reason computer memory D. Type of OS, tipe of memory, name
needs to be managed?

NARAYAN CHANGDER
121. The OS provides a platform that enables
A. the amount of memory in a computer
what to be run?
is limited
B. to protect your data from hackers A. Applications

C. applications can’t be trusted to use B. Hardware


memory properly C. Cache
D. none of above D. Processes
116. what software is used to run a hard-
ware? 122. When using the interface shown in the ac-
companying figure, the set of instructions
A. Operating system entered into a computer is called which of
B. Device Driver the following languages?
C. chrome A. Command
D. none of above B. Window
117. The purpose of the GUI is to C. Instructional
A. hide the complexities of the machine D. Prompt
from the user
B. Guide the user 123. Which of the following is the process of
starting or restarting a computer or mobile
C. to make the screen look nice
device?
D. none of above
A. Booting
118. Android OS is
B. Lauching
A. Linux based
C. Loading
B. Unix based
D. Keying
C. Windows based
D. All of these 124. To access the services of the operating
system, the interface is provided by the
119. what software that is used to run a hard-
ware?
A. Library
A. Operating system
B. Device Driver B. System calls
C. application system C. Assembly instructions
D. utility system D. API

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 209

125. Which of the following is not a resource 131. Which cannot self replicate?
managed by the OS? A. Virus

PRACTICE BOOK» NOT FOR SALE


A. CPU B. Trojan Horse
B. Cache C. Worm
C. Graphics Processor D. none of above
D. Data 132. DOS is an acronym for
126. a set of instructions which control the A. Data Operating System
computer is B. Disk Operating System
A. Hardware C. Data Operating Software
B. Software D. Disk Operating Software
C. Firmware 133. Which of these Virtual Assistants is de-
D. Loungewear signed for Android
A. Google
127. Recycle Bin to Windows is what Trash
Can is to B. Siri
A. Mac C. Cortana
B. Linux D. Yahoo
C. IBM 134. Which of these is an advantage to using
D. none of above a command-line interface over a GUI?
A. More interactive
128. What format is an Android Application
B. Easier to use
gonna be created as?
C. Less resource heavy
A. SDK
D. none of above
B. APK
C. xCode 135. What do operating systems provide?
A. A backspace button that you can press.
D. Android Studio

129. Which of the following commands ap- B. Communication from you to the com-
pears in the Insert menu or tab? puter.
A. Table C. A server that makes the keyboard
B. Undo/Redo work.
C. Bold D. Communication between your touch-
screen and the speakers.
D. Line Spacing
136. A user interface made up of a command
130. What operating system is on a pc? prompt is called:
A. OS X A. Graphical User Interface
B. Vista B. Super User Interface
C. Safari C. Command Line Interface
D. Windows D. Command User Interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 210

137. mobile operating system developed by B. Linux


Apple C. Unix
A. AOS D. Windows NT Kernel
B. EOS
143. The operating system retrieves files from
C. UOS the computer’s
D. IOS A. monitor
B. hard drive

NARAYAN CHANGDER
138. This option replaces your current version
of Windows, but doesn’t preserve your C. guest drive
files, settings, and programs. D. application software
A. BIOS
144. A role of the operating system that helps
B. Custom keep storage devices well organized and
C. Update maintained.
D. Upgrade A. Application Management
B. Disk Management
139. THE ANDROID OPERATING SYSTEM IS A
C. Service Management
A. MULTI-USER OS
D. Device Management
B. SINGLE-USER OS
C. REAL-TIME OS 145. Which of these tasks is a function of the
operating system?
D. BATCH-OPERATING OS
A. Scanning a photograph
140. Application software is B. Copying a file
A. help the user run specific tasks like C. Producing a database report
word processors, web browser, email,
D. Adding data to a spreadsheet
clients, games, etc
B. run tasks like the operating systems, 146. Which of the following means the operat-
utilities, etc ing system automatically configures new
devices as users install them?
C. help the user run things down
A. Operational Buffering
D. run tasks like the doing my homework,
revision, etc B. Plug and Play
C. Virtual Memory
141. All users of a particular class should have
access based on: D. Page Logging

A. The class of user 147. What is the Advantage and Disadvan-


tages of “Layered Approach”?
B. he organisational guidelines
A. Simplicity of construction and debug-
C. The group to which the user belongs
ging and less efficient
D. none of above
B. Maintainability and cost
142. Which operating system is the Android C. Convenience and economical
OS based off of? D. Computation speed up and financial
A. Mac OSX loss

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 211

148. The binary system allows digital devices 154. Which of the following is NOT a desktop
to represent any number by using operating system?

PRACTICE BOOK» NOT FOR SALE


A. 0s and 1s A. OS X
B. letters and numbers B. Windows
C. DOS Code C. Chrome OS
D. 1s and 2s D. Google Android

149. Which of these codes can’t be used to rep- 155. How do you select a file or folder inWin-
resent character data on digital devices? dows Explorer?
A. Binary A. [Ctrl][X]
B. ASCII B. Single-click it.
C. Pseudo C. shortcut menu
D. EBCDIC D. Folder

150. Palm OS and Personal Digital Assistants 156. In this kind of memory, the operating
make use of what kind of operating sys- system allocates a portion of a storage
tem? medium, usually the hard disk or a USB
A. Single User, Multi Task flash drive, to function as additional RAM.
What kind of memory is this?
B. Real time
A. Performance
C. Multi User
B. Managed
D. Single User, Single Task
C. Device
151. What types of data can be transferred D. Virtual
using windows Easy transfer tool?
A. Ram addressing 157. Operating Systems perform basic tasks
such as
B. Files and User settings
A. creating BIOS data for users.
C. Security options
B. recognizing input from the system
D. none of above clock.
152. what is the use of firewall in computer? C. recognizing input from the keyboard.
A. For security D. creating programs for unauthorized
B. For data transmissions users.

C. For authentication action 158. What would be the result of having a cor-
D. none of above rupt Master Boot Record?
A. The printer will function incorrectly.
153. What does GB stand for?
B. The operating system will fail to start.
A. Gigabyte
B. Giantbyte C. A new application will fail to install.
C. Giagabyte D. The keyboard will be unresponsive to
D. Giggabyte the user.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 212

159. THE SHORTCUT MENU IS ALSO KNOWN A. Right Side


AS
B. Top
A. FILE MENU
C. Left Side
B. CONTEXT MENU
D. Bottom
C. SMART MENU
D. none of above 165. Which mobile operating system feature
helps you avoid accidentally placing a call

NARAYAN CHANGDER
160. Which is the definition of free software? or taking a picture?
A. The freedom to study how the program A. Virtual personal assistant
works, and change it
B. Pinch gesture
B. The freedom is cheap software
C. Dock
C. The free in the use
D. Lock screen
D. fredom of the designer
166. What is a firewall?
161. How many digits does a binary number
system have? A. Antivirus software
A. 10 B. Security device that monitors incoming
B. 4 and outgoing network traffic

C. 8 C. Security device that monitors only in-


coming traffic
D. 2
D. Security device that monitors only out-
162. To allow a user to interact with an Oper- going traffic
ating System-it must have a ?
A. User Connection 167. Which of the following is a segment of
memory or storage, such as the disk in
B. User Interface the accompanying figure, in which items
C. Virtual Connection are placed while waiting to be transferred
from an input device or to an output de-
D. Remote Accesss
vice?
163. Which of the following is the primary pur- A. Process
pose of an operating system?
B. Index
A. To make computers easier to use.
C. Buffer
B. To allow people to use the computer.
D. Throttle
C. To keep systems programmers em-
ployed. 168. What do device drivers do?
D. To make the most efficient use of the
A. Allows the OS to communicate with
computer hardware.
hardware
164. On a Mac this is called a “Menu Bar”, B. Drives around the motherboard
on on the Windows desktop screen it is a
C. Increases the amount of storage
“Task Bar”. Where is this located on your
screen? D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 213

169. BIOS stands for 175. runs external devices


A. Basic Instruction Operating System A. device runners

PRACTICE BOOK» NOT FOR SALE


B. Basic Information Output System B. device drivers
C. Basic Input Output System C. device instructors
D. Binary Information Output System
D. none of above
170. Which of the following is NOT an exam-
ple of software? 176. windows helps the computer to
A. External storage device A. start
B. Security program B. turn off
C. Operating system C. it is not useful to computer
D. Photo or video editing program D. none of above
171. A synonym for operating system is 177. Which of these is NOT a Server OS?
A. Platform
A. Linux
B. FUI
B. OpenSolaris
C. Hard Drive
C. Solaris
D. Driver
D. Microsoft Windows 10
172. *A ******* is a type of malware*It is a
standalone program that does need to at- 178. An operating system developed by Apple
tach itself to an existing program in order used for the iPhones, iPads, and iPods
to spread
A. Apple-IOS
A. Virus
B. Mac-OS
B. Trojan Horse
C. Android-OS
C. WAN
D. Worm D. Linux

173. The ability for a computer to execute 179. Device Driver is


more than one task simultaneously A. Mobile Operating System
A. multitasking B. File Management
B. multiprogramming
C. Software
C. multiprocessing
D. Utility program
D. timesharing
180. What is the top folder of the file tree
174. What is an example of short term mem-
called?
ory?
A. SSD A. .jpg

B. RAM B. windows
C. HDD C. ?
D. Google Drive D. the root

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 214

181. What program is used to start and shut 186. What is “Layered Approach”?
down a computer or mobile device, pro- A. A number of layers
vide a user interface, manage programs
and memory, and provide file manage- B. The interaction of the layers
ment, among other functions? C. A small operating system core
A. An operating System D. A networked computer system.
B. A File Utility
187. System software is a set of needed

NARAYAN CHANGDER
C. A System Utility for a computer to
D. Application Software A. program, work

182. Why do we need Operating Systems? Be- B. instructions, pause


cause it C. instructions, work
A. Enables the user to interact with the D. none of above
computer
188. Solaris is
B. Protect your computer from viruses
A. Linux Based
C. Is of obligation to run the computer
B. Unix Based
D. Because of the applications
C. Windows Based
183. is an embedded operating system re-
D. None of the above
sides on a ROM chip on a mobile device or
consumer electronic device. 189. The system software of the computer
A. Stand-alone OS A. Operating
B. Server OS B. Application
C. Mobile OS C. PowerPoint
D. Free OS D. CPU

184. What type of operating system monitors 190. A network OS will provide user user
external events & processes data consis- names to identify users and and pass-
tently within a set deadline words to
A. Real Time A. Authenticate Users
B. Single User Single Task B. Validate Users
C. Single User Multi Tasking C. Scan Users
D. Multi User D. Secure Users

185. Batch systems is 191. Kernel interacts with


A. A programmer function A. User
B. An operating system characteristic B. Hardware
C. Memory Addresses C. Both User and Hardware
D. none of above D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 215

192. Which f these is a type of Operating Sys- 198. The operating system is on every
tem computer.

PRACTICE BOOK» NOT FOR SALE


A. Multi User Single Application A. game
B. Single User Single Application B. new unit
C. Multi User Multi Tasking C. discovery unit
D. Single User Multi Tasking
D. pre-installed
193. Things that you need to do with your files
before reformatting your computer. 199. is a complete operating environment
with applications, management, and user
A. Backup interface.
B. Delete
A. IaaS
C. Erase
B. PaaS
D. Remove
C. SaaS
194. The operating system is a type of D. All of the mentioned
A. system software
B. general purpose software 200. What language do operating systems
use?
C. utility software
A. The operators language e.g. English
D. application software
B. Binary Code
195. Keyboard, mouse, scanner and webcam
are examples of which devices? C. Code

A. Input D. XOXO
B. output 201. What manages the hardware and runs
C. Software the software?
D. USB A. Computer Systems
196. THIS BOX APPEARS ON THE DESKTOP B. Dedicated Systems
WHEN WE START A PROGRAM C. Embedding Systems
A. WINDOW D. Operating Systems
B. OPERATING SYSTEM
C. TASKBAR 202. Which of the following is a function of the
operating system?
D. none of above
A. To compose and send email.
197. Which is not the function of the Operating
B. To edit photographs and other high-
System?
resolution images.
A. Memory management.
C. To control communication and manage
B. Disk management. files.
C. Application management. D. All of these are operating system func-
D. Virus Protection. tions.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 216

203. Which is the best advantage of using Mac A. Your user profile
OS? B. Your domain
A. The price C. Your lock screen
B. The publicity
D. Your permission level
C. Better graphic design
209. Provides a graphical view of all of the
D. the people
drives, folders and files on your computer

NARAYAN CHANGDER
204. What type of software am I? Presenta- A. Windows Explorer
tion software, e.g. Microsoft PowerPoint
B. Picture View
A. Operating System
C. ROM
B. Application software
D. RAM
C. Utility software
D. none of above 210. CUIs HAVE COMPONENTS SUCH AS
A. WINDOWS
205. These are example of Mobile OS Except
for B. MENUS
A. iOS C. COMMAND LINES
B. Symbian OS D. ICONS
C. Linux OS 211. What does Kernel mean?
D. Android OS A. Hardware of the OS
206. With which of the following do users in- B. Central component of the operative
teract with menus and visual images such system
as icons, buttons, and other objects to is- C. Is the processor of the system
sue commands?
D. Is a Firmware
A. Graphical user interface (GUI)
B. Menu-driven interface 212. The transfer rate of a hard disk drive de-
pends primarily on the drive’s HDA (Hard
C. Performance-monitor interface Drive Assembly) and secondarily on the
D. Command-line interface A. drive controller.
207. THE TASKBAR IS AT THE OF THE DESK- B. file management.
TOP.
C. operating system.
A. LEFT
D. file allocation table.
B. TOP
213. Select the operating system used on the
C. BOTTOM
Chromebook?
D. RIGHT
A. Chrome OS
208. Which of the following is the collection B. Android
of stored settings that ensure your cus-
tomizations are in effect whenever you log C. Windows
on? D. Linux

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 217

214. is a program that control or main- C. Any set of instructions that you can
tain the operations of the computer and its work with
hardware

PRACTICE BOOK» NOT FOR SALE


D. Any set of instructions that tells the
A. Software hardware what to do
B. Operating System Software 220. The term OS is short for?
C. Application software A. Apple
D. Utility program B. Operating Software
215. An operating system used by a handheld C. Operating System
device like a smartphone. D. Overload System
A. Google
221. Storage that loses its memory every time
B. Hand held operating system
the computer is turned off
C. Data representation
A. RAM
D. android
B. ROM
216. A graphical user interface can be identi- C. CPU
fied by the it displays.
D. Hard Drive
A. commands
222. A type of memory where data is lost
B. data
when the computer is switched off
C. icons
A. HDD
D. network
B. USB
217. How does the OS handle file manage- C. ROM
ment?
D. RAM
A. Deals with movement, editing and
deletion of data 223. Does a mobile device need an Operating
System?
B. Colour codes data
A. Yes
C. Translates data into binary
B. No
D. none of above
C. Sometimes
218. Which of the following is a binary code?
D. none of above
A. ABCD
B. 0301121 224. Networks, servers, mainframes, and
supercomputers allow hundreds to thou-
C. 010111 sands of users to connect at the same time,
D. kf1110 and thus their operating systems are re-
ferred to as which of the following?
219. What is software?
A. Single User
A. Anything connected to the computer
that is soft B. Multiuser

B. Anything connected to the computer C. Multi processing


that you can touch D. Single processing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 218

225. RAM and ROM are both 231. THE OPERATING SYSTEM CONTROLS
A. primary storage THE

B. secondary storage A. HARDWARE


C. clocking devices B. SOFTWARE
D. on the CMOS C. MEMORY
D. ALL THE PARTS OF A COMPUTER
226. Encryption is a way of

NARAYAN CHANGDER
A. Securing Information on a network 232. Which of the following is a way of Iden-
tifying critical systems?
B. Deleting applications
A. Checklist to test and evaluate the sys-
C. Hacking Passwords
tem
D. none of above
B. identify organization importance or
227. Before a document prints it waits in the criticality
C. Interruption Test on the system
A. BIOS D. none of above
B. buffer
233. Which of the following is a unique combi-
C. boot process
nation of characters, such as letters of the
D. swap alphabet and/or numbers, that identifies
one specific user?
228. What is the best way to shut down a com-
puter? A. Client
A. Press the power button on the com- B. Username
puter case. C. Password
B. Click Start, Power, Shut down, then let D. Cycle
the process complete.
C. Press CTRL+ALT+DEL twice. 234. Most computers require what type of
software?
D. Press ESC.
A. Binary
229. Who might send out an emergency B. Operating System
alert?
C. Application
A. Mr. Doering
D. Hardware
B. Trump
C. Obama 235. How can the OS help manage security of
the system?
D. Professional Organizations
A. The OS can hire backup
230. The following is not a part of GUI:
B. User accounts may be password pro-
A. command prompt tected
B. scroll bar C. Files can self destruct after a set time
C. text box
D. radio button D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 219

236. What type of code is data converted to 241. A discontinued OS that was last used by
once it is input into a computer? Nokia for their smartphone.

PRACTICE BOOK» NOT FOR SALE


A. Binary A. WINDOWS OS
B. EBCDIC B. IOS
C. C++ C. SYMBIAN OS
D. ASCII D. NOKIA OS

237. In the tree structured directories, 242. A type of OS which can respond instantly
A. the tree has the stem directory. to any inputs or sensors

B. the tree has the leaf directory. A. Distributed

C. the tree has the root directory. B. Multi-tasking

D. the tree has Allocation Table. C. Embedded


D. Real-time
238. why the operating system has the mini-
mum hardware requirements that must be 243. What is cloud computing?
met for OS? A. Storing files on the Internet
A. For the purposes of the customer’s B. Running programs on a remote server
computer to work faster
B. To make it easier for customers to C. Running an operating system
work
D. All of the above
C. For OS purposes can be installed and
working correctly. 244. What is a D.O.S
D. none of above A. Denial of service

239. File system File system is? B. Delay of service

A. The shell keeps the end users access C. Downing of service


kernel . D. Destruction of service
B. uses to name, store, and organize files 245. What are the function key in the com-
on a drive puter?
C. produce basic information about data A. They are shortcuts key that perform
D. All of above certain functions

240. Identify the basic function of an operat- B. They are basic Key to open the com-
ing system puter

A. Limit specifies the length of the seg- C. They are used to to open and close pro-
ment grams

B. Easy to isolate error and to debug D. none of above

C. Execute user programs and make solv- 246. Which of the following Windows dialog
ing user problems easier box features allows you to select several
D. To allow the system to enter the dead- options?
lock state then recover A. Drop-down lists

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 220

B. Radio buttons 252. A system tool used to clean up your disk


C. Check boxes A. Disk clean up
D. Command buttons B. Cookie
C. defragmenter
247. The operating system performs the task
of what person? D. GUI
A. Lawyer 253. Software is a series of that tells a

NARAYAN CHANGDER
B. TV Host computer what tasks to perform and how
to perform them.
C. File clerk
A. data
D. Computer tech
B. information
248. Where are deleted files sent to prevent C. instruction
you from accidentally deleting files?
D. utility
A. Trash Can/Recycle Bin
254. The following is not a function of an op-
B. A folder
erating system:
C. They are automatically deleted
A. Checking for viruses
D. none of above
B. Directing information from peripheral
devices like a mouse or a printer
249. Windows is the Product of?
C. Allowing users to open applications
A. Apple
D. Allocating the computer’s memory be-
B. HP
tween different tasks.
C. Dell
255. What is multiprocessing?
D. Microsoft
A. The computer has more than one core
250. Example of a real time control system processor
A. Payroll processing B. where tasks are done apparently at
the same time
B. Seat booking system
C. Where more than one computer is
C. Engine control unit in a car used to carry out instructions
D. none of above D. none of above

251. System lock-up problem is type of 256. Which is the layer of a computer system
A. An operational operating system prob- between the hardware and the user pro-
lems gram?

B. An operational operating system error A. None


messages B. Operating Environment
C. network access feature C. Operating System
D. none of above D. System Environment

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 221

257. An example of a potential deadlock situ- 262. Which of the following does an operating
ation is system not do

PRACTICE BOOK» NOT FOR SALE


A. a one way bridge A. Manages memory (RAM)
B. a two way bridge B. Manages printing using spooling
C. a single lane bridge C. Manages the ALU

D. a one way train line D. Manages security


263. Windows 10 is successor of?
258. Allison and Jessica send messages to
each other at their place of employment A. Windows 8
using an online chat room. What is this B. Windows 7
process called? C. Windows 9
A. Real-time operating D. None of These
B. Unix serving
264. The binary number 11 represents in
C. Firewall manipulation the decimal system
D. Network messaging A. 2
B. 3
259. Which of the following mobile operating
systems has the largest install base in the C. 4
world? D. 11
A. Android 265. Which is NOT a characteristic of desktop
B. Blackberry 10 operating systems?
C. Windows 10 Mobile A. It supports a single user

D. iOs B. It runs single-user applications


C. It supports print servers
260. The process of starting or restarting com- D. It shares files and folders on a small
puter is called network with limited security
A. operating system
266. These are example of Stand-alone OS Ex-
B. Booting a computer cept for
C. Managing the resources A. Ubuntu
D. none of above B. Linux
C. Microsoft Mac
261. A disaster recovery plan:
D. Mac OS X
A. Should be created as part of a risk as-
sessment process 267. Most people have this Operating System
on their Computer System.
B. only covers the backup procedures
A. UNIX
C. Is a secret document, the contents of
which are known only to senior managers. B. LINUX
C. IOS
D. none of above D. Microsoft Windows

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 222

268. Which of these is NOT a task of Operat- 274. Which of the following consists of one
ing Systems or more chips on the motherboard that
A. communicating with the user hold items such as data and instructions
while the processor interprets and exe-
B. communicating with the hardware cutes them?
C. managing memory A. POST
D. browsing the Internet B. ROM

NARAYAN CHANGDER
269. Ctrl + S option file. C. RAM
A. starts D. Basic Input Output System
B. creates
275. Problem of Light print, or fade.
C. opens
A. Replacethe toner cartridge
D. saves
B. Reinstallthe Driver
270. Operating system used on PC platform or C. a) Cleanlaser scanner mirrors.
IBM computer.
D. none of above
A. IOS
B. Windows XP 276. Which part of Operating system is re-
sponsible for sending basic instructions
C. Android and managing the hardware?
D. Mac OS
A. Kernel
271. witch of the following is an email client? B. Shell
A. Outlook express C. The shell allows the user develop the
B. Mozilla Firefox D. Freeware
C. Internet explorer
277. is a complete operating system that
D. Yahoo works on a desktop computer, notebook
computer, or mobile computing device.
272. Where is BIOS stored?
A. Stand-alone OS
A. On the RAM
B. On the Motherboard ROM B. Server OS

C. On the GPU C. Mobile OS

D. in the CPU D. Free OS

273. When you save your document to your 278. A system designed to prevent unautho-
computer, where is it stored? rized access to or from a private network
A. in the cloud A. Adware
B. in a folder B. Firewall
C. on the Internet C. Antiviruis
D. on a hard drive D. Spyware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 223

279. Select an open source operating system C. Super internet explorer Pro
A. Windows 10 D. none of above

PRACTICE BOOK» NOT FOR SALE


B. iOS 285. What mobile payment service uses the
C. Windows Phone physical phone?
D. Ubuntu Linux A. SMS
B. Direct Mobile Billing
280. This is a type of system software
C. NFC
A. Disk Cleaner
D. Mobile Web Payments
B. Notepad
286. Which of these devices can have an
C. Backup and restore MULTI-TASKING operating system?
D. VideoLAN A. Laptop
281. are software which is used to do par- B. Microwave oven
ticular task C. Simple mobile phone
A. Operating system D. Playstation 4
B. Program 287. Which Operating System function en-
C. Software ables the allocation of folders?
D. none of above A. User Interface
B. Memory Management
282. What is the operating system responsible
for? C. User Management
D. File Management
A. managing the hardware, processor
time and memory 288. A file type that mostly can do harmful ac-
B. managing only the hardware and soft- tion in the computer is:
ware A. .txt
C. managing hardware, and application B. .docx
software and allocating processor time C. .exe
and memory
D. none of above
D. controlling processor time only
289. Example of a batch processing system
283. Which of these is NOT a Stand-alone OS? A. Payroll processing
A. Ubuntu B. Seat booking system
B. Linux C. Engine control unit in a car
C. Microsoft Mac D. none of above
D. Mac OS X 290. POST is short for
284. What is the name of new built in browser A. Power On Self Test
included in windows 10? B. Power Off Self Test
A. Oprah C. Program On Self test
B. Edge D. Program Off Self Test

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 224

291. Which of the following is Cloud Platform 297. Places all the parts of a file in one loca-
by Amazon? tion
A. Azure A. zipped
B. Cloudera B. malware
C. AWS C. defragmenters
D. All of the above D. disk clean up
292. displays battery status, current date 298. Which one of the following is NOT a com-

NARAYAN CHANGDER
and time, volume level monly used operating system?
A. Notification area A. BIOS
B. Navigation area B. OS X
C. Clock C. LINUX
D. Status area D. WINDOWS
293. Hard drive space that can work as RAM. 299. Which runs on computer hardware and
A. Virtual Memory serves as platform for other software and
the user program?
B. Application software
A. System software.
C. System Software
B. System operations.
D. Driver
C. Operating system.
294. The kernel can be stored in D. Utilities.
A. ROM
300. to manage processor, memory and I/O
B. RAM device, we are need
C. the Hard Disk A. Operating System
D. Computer Disk B. CPU
295. Where can a technician look to determine C. Inter process communication
if specific computer hardware or software D. none of above
has been tested to work with Windows
OS? 301. SQL is?
A. Microsoft Compatibility Center A. Programming structured Language
B. Microsoft Knowledge Base B. Software
C. Windows 7 manual C. Unstructured Language
D. Windows Easy Transfer D. none of above
296. Which of the following is NOT a network 302. Where are all of the start up files lo-
operating system? cated?
A. Windows Server 2003 A. ROM
B. Banyan VINES B. RAM
C. Unix C. CPU
D. Xerox Network Systems D. Motherboard

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 225

303. What is one reason there is a greater per- B. program


centage of Windows users than Mac OS C. application
X?

PRACTICE BOOK» NOT FOR SALE


D. server
A. Not as good
B. Do not meet the individual needs 309. It is the program that controls the execu-
tion of application programs and acts as an
C. More expensive interface between user and the computer
D. Bad reviews A. Operating system
304. is an operating system that is de- B. Device manager
signed specifically to support a network. C. Utility programs
A. Stand-alone OS D. Application system
B. Server OS
310. Circuit board that connects everything in-
C. Mobile OS side your computer together
D. Free OS A. RAM
305. Which of these is NOT a function of the B. ROM
operating system? C. Motherboard
A. Processor management D. CPU
B. Memory management
311. Software that help to keep your com-
C. Word processor management puter running efficiently like anti virus
D. Security products are called?
A. Web Sites
306. What type of OS is used for Apple Com-
puters? B. Utility Programs
A. Windows C. Operating System
B. Linux D. Application Programs
C. Mac OS 312. Which part of the operating system deals
D. Chrome OS with the movement, editing and deletion
of data?
307. is type of installation method of an A. Memory management
operating system?
B. File and disk management
A. Using CDs orDVDs.
C. User management
B. Connect router to firewall
D. User interface
C. update windows features
D. none of above 313. How can a trojan infect your pc?
A. On memory sticks.
308. Function of system software is to serve
as the between the user, the applica- B. Through email attachments.
tion software, and the computer’s hard- C. By being disguised as legitimate soft-
ware ware.
A. interface D. Dodgy web links

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 226

314. Which of these devices can have an 319. What are the most popular operating sys-
MULTI USER operating system? tems?
A. Personal computer A. Nintendo Switch
B. Simple mobile phone B. Windows and Mac OS X
C. Mainframe C. Apple

D. Smartphone D. Microsoft
320. Make copies of files in case of loss.

NARAYAN CHANGDER
315. The File system used for?
A. backup
A. The shell keeps the end users access
kernel . B. subfolder
C. rename
B. uses to name, store, and organize files
on a drive D. copy
C. produce basic information about data 321. Which of these is not a function of an OS:
D. All of above A. Provide a user interface
B. Communicate with hardware
316. Which file and disk management tool at-
tempts to locate a file on your computer or C. Allow the computer to multi-task
mobile device based on specified criteria? D. Improves CPU performance
A. Locator 322. A user interface where the user interacts
B. Search with menus and icons is called:
C. Seeker A. Graphical User Interface

D. Find B. Graphical Super Interface


C. Command Line Interface
317. One of The file system basic functions D. Command Super Interface
A. Determine the free space in the hard
drive 323. Choose the CORRECT operating system
structure
B. Operating System software
A. Kernel
C. determining the physical location of B. Monolithic
the file on the hard drive
C. Single processing
D. none of above
D. Multiprocessing
318. A file that has been squeezed down us- 324. What does the organization have to
ing compression software to make the file avoid losing data or information
smaller so it can travel faster between
modems. A. policies and procedures that detail net-
work security requirements
A. zipped
B. Periodically tested in work environ-
B. small ment
C. compression C. Disaster Communications Plan
D. cookie D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 227

325. Which method is considered one of the 330. Software program that carries out some
general methods to pass parameters? action

PRACTICE BOOK» NOT FOR SALE


A. Exchange information on the same A. process
computer B. command
B. Pass the parameters in registers C. software
C. Allocating resources to multiple jobs D. direction
running at the same time.
331. What type of software am I? Windows
D. Interrupts computer after specified A. Operating System
period
B. Application software
326. Dividing tasks so that the Operating Sys- C. Utility software
tem appears to multitask is dealt with un-
D. none of above
der:
A. Memory Management 332. What is the main advantage of a GUI?
A. Reduces the cost of computing
B. File Management
B. Makes the computer easier to use
C. Processor Management
C. Required a less powerful computer
D. Peripheral Management
D. Does not need updating
327. Operating system is a set of programs 333. A list of options a user can choose from
that connects and manages software with is a
A. list
A. System B. tab
B. User C. menu
C. Hardware D. form
D. Application 334. In ENICA computer, programs were
loaded into memory manually using
328. In the Bootstrap Process, which is first? switches or
A. POST A. memory
B. Load BIOS B. punch card
C. Charge of electricity to system C. magnetic disk
D. Load OS D. none of above
335. Operating systems are responsible for
329. What is an example of emergency notifi-
logging users in and out. This function is a
cation?
part of:
A. Amber Alert
A. user interface
B. Domino’s Pizza B. memory management
C. Mom Missed Call C. managing hardware and devices
D. Doering Edmodo Post D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 228

336. What type of software am I? Spread- C. Allows users to review and modify the
sheet software, e.g. Microsoft Excel source code source code is release.
A. Operating System D. none of above
B. Application software
342. Which is not a process state?
C. Utility software
A. waiting
D. none of above
B. terminated

NARAYAN CHANGDER
337. Which type of system needs interactive
processing C. blocked

A. Calculating the electricity bill for you D. redirected


customers
343. Which of the following is least likely to
B. On-Line check in for flights be the reason for an automatic update.
C. Controlling an airplane in the air
A. Improving Functionality
D. none of above
B. Enhancing Security
338. Icons, menus and windows are part of: C. Modifying Device Drivers
A. Graphical user interface D. Providing Decryption
B. System security
C. Applications and user files 344. Preemption means

D. Graphics or games packages A. process can be paused by system


B. process cannot be halted once execu-
339. RIM stands for
tion begins
A. Region in Motion
C. process has high priority
B. Real Interface Multiprocessing
D. process is short
C. Research in Motion
D. Real Interface Multitasking 345. provides virtual machines, virtual
storage, virtual infrastructure, and other
340. Most modern OS integrate what into the hardware assets.
kernel?
A. IaaS
A. GUI
B. PaaS
B. Hardware
C. SaaS
C. Processes
D. Cache D. All of the mentioned

341. proprietary license Requirements? 346. System environment a type of


A. Describes a product that is owned by A. System requirements
single company not allowed to modify the
B. Secure Data
software
C. Network Implementing
B. Collection of instructions that enable
the user to interact with a computer D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 229

347. Which is the most widely used operating C. Multiuser


system? D. Multiprogram

PRACTICE BOOK» NOT FOR SALE


A. blackberry
353. The following are the system recom-
B. linux mended requirements before installing ex-
C. windows cept one.
D. ios A. 1 GHz 32-bit or 64-bit processor

348. One of the capabilities of operating sys- B. 1 GB of system memory


tems:The computer is capable of operating C. High Definition Audio Device
multiple applications at the same time.
D. 16 GB of available disk space
A. multi-user
354. In computers, what software is consid-
B. multitasking
ered the most important?
C. multiprocessing
A. Application Software
D. multi-threading
B. User Software
349. Who founded Apple Computer? C. Operating Software
A. Steve Jobs D. Utility Software
B. Steven Fry
355. What is Operating System
C. Bill Gates
A. Collection of programs that manages
D. Steve Wozniak AKA THe Great and hardware resources
Powerful Woz
B. System service provider to application
350. Symbian OS is designed for program
A. Samsung C. Interface between hardware and ap-
plication programs
B. HTC
D. All of the above
C. Blackberry
D. Nokia 356. Which of the following is an example of
Real Time Operating System
351. Give one example of Single-User, Multi-
A. NOS/VE
Tasking operating systems
B. IBM AS400
A. RT Linux
C. GEnie
B. Windows CE
D. LynxOS
C. Windows
D. VxWorks 357. Which of the following is required to cre-
ate Apple iOS apps?
352. If an OS has the ability to run more than
one program simultaneously what is this A. SDK
called? B. Xcode
A. Mutlihandling C. Google IDE
B. Multitasking D. Apple Development

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 230

358. One of the capabilities of operating sys- 363. The primary purpose of an operating sys-
tems:Two or more users have individual ac- tem is:
counts that allow them to work with pro-
A. To make the most efficient use of the
grams and peripheral devices at the same
computer hardware
time.
B. To allow people to use the computer
A. Multi-user
C. To keep systems programmers em-
B. multiprocessing
ployed

NARAYAN CHANGDER
C. multitasking
D. To make computers easier to use
D. multithreading
364. A computer uses to organize all of
359. What is the most common way people’s the different files and applications that it
computers get infected by a virus? contains.
A. Receive a call A. Folder
B. Install a new hardware B. Icons
C. Download email attachments C. Trash Can
D. None of these D. Applications

360. Allocating time on the processor to indi- 365. Which of the following is a main function
vidual processes is known as of an operating system?
A. CPU Scheduling A. managing applications
B. CPU Timing B. text processing
C. CPU Clocking C. flow chart editing
D. CPU Sorting D. program compilation

361. What feature in operating systems 366. what is Unattended Installation?


makes it possible to connect to other com-
A. Asnapshot of a system and then will be
puters?
deployed to multiple systems.
A. Networking
B. Assigningfolder permissions
B. Security
C. Runningthe Installation with Answer
C. Updating Files
D. Internet D. none of above

362. Shortcut key to delete the files/folders 367. What is the first program that usually
permanently: runs when you turn on a computer?
A. Shift + Ctrl A. Windows
B. Del + Shift B. BIOS-ROM instructions
C. Ctrl + Del C. Mac OS
D. Shift + Del D. Binary

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 231

368. What acts as the master controller for 373. Which company was created by Bill
all activities that take place within a com- Gates?
puter system?

PRACTICE BOOK» NOT FOR SALE


A. Windows
A. Hardware
B. Macintosh
B. CPU
C. Application software C. Android
D. Operating System D. Blackberry?
369. I am writing a new operating system and
begin implementing some processor man- 374. What type of software am I? Email soft-
agement. Which of the three below under- ware e.g. Microsoft Outlook
pins the others and so should be the one I A. Operating System
start work on first?
A. multi-programming B. Application software

B. multi-tasking C. Utility software


C. multi-processing D. none of above
D. none of above
375. This piece of software is used to control
370. *may open a “back door” into your com-
hardware devices and allow an Operating
puter system through which your personal
System to make use of the hardware
information can be harvested.*It can also
use your computer power and network A. Device Management
bandwidth to send thousands of spam
emails to others. B. Device Driver

A. Virus C. Device System


B. Trojan Horse D. Hardware Peripheral Device
C. WAN
D. Worm 376. option helps you to arrange the icons
quickly.
371. System goals from using operating sys-
tem is the O.S should be A. Sort by
A. easy to design B. Auto arrange icons
B. difficult to detect errors C. Personalise
C. cannot reliable in it
D. New
D. none of above
372. Select the operating system used on our 377. Linux is an example of
desktop computers?
A. Single user OS
A. iOS
B. Power consumption
B. Android
C. Windows C. Multi Processing User
D. Linux D. Operating system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 232

378. What is an interrupt? C. To start the computer and operating


A. The primary component of a computer system quickly
that processes instructions. D. To allocate system resources stored in
B. Control signal used to synchronise the ROM
internal components.
384. SJF is short for
C. A signal sent from a device or software
to the processor requesting its attention. A. Shortest Job First

NARAYAN CHANGDER
D. A temporary memory area within a de- B. Software Job First
vice. C. System Job First
379. You can arrange the tiles by: D. Shortest Job Final
A. You can’t move them 385. A type of OS which makes use of Parallel
B. Right Click Processing to spread the load over multi-
C. Dragging and Dropping ple servers

D. Double click A. Distributed


B. Multi-tasking
380. FCFS is operates similar to a
C. Embedded
A. stack
B. sorting algorithm D. Real-time

C. circle 386. What type of account is created automat-


D. queue ically when Windows is installed on a com-
puter?
381. Which of these devices can have an
A. Administrator account
BATCH operating system?
A. Server B. Standard user account

B. Gaming console C. System administrator account


C. ATM D. Guest account
D. Tesla car 387. Round Robin is also known as
382. The most widely used operating system A. Merry go round
for personal computers is B. circle drive
A. Mac OS X
C. time slicing
B. Facebook
D. time sharing
C. Microsoft Windows
D. Ubuntu Linux 388. If you want to record on the paper of
what you are doing, you’ll need a
383. What is the purpose of memory manage-
A. calculator
ment?
B. monitor
A. To store data in the most efficient man-
ner C. keyboard
B. To optimize the use of RAM D. printer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 233

389. A type of OS which would be suited to 395. Which methods should a technician use to
use inside aeroplane autopilot systems or update a device driver?
nuclear reactors

PRACTICE BOOK» NOT FOR SALE


A. Insert the operating system installa-
A. Distributed tion media and load the driver from there
B. Multi-tasking
C. Embedded B. Buy another operating system license
C. Download the driver from the website
D. Real-time
of the manufacturer
390. Which type of operating system is com- D. Perform a firmware update
monly used?
396. Which is not in the PCB
A. Single-User, Single-Task
A. Process state
B. Multi Tasking
B. resources needed
C. Real Time
C. program counter
D. Single-User, Multi-Tasking
D. processor size
391. DOS stands for
397. Which is not a GUI element?
A. Disk Operating System.
A. Button
B. Disk operating session.
B. Wallpaper
C. Digital Operating System.
C. Icon
D. Digital Open System.
D. Window
392. CLI stands for
398. An operating system used to run on mo-
A. Command Line Interface bile devices such as mobile phones, tablets,
B. Common Line Interface and other hand held devices
C. Command Line Instruction A. Mobile-OS
D. Common Line Instruction B. Traveling-OS
C. Apple-OS
393. where is Task bar is Located in Windows
D. MS-DOS
A. Top
B. Bottom 399. Which of these is not a function of an op-
erating system?
C. Right
A. Provide a user interface
D. Left
B. Communicate with hardware
394. Windows 7 and Windows 8 are exam-
C. Allow the computer to multi-task
ples of:
D. Improves CPU performance
A. Android
B. Microsoft Windows 400. a set of programs containing instruc-
tions that work together to coordinate all
C. iOS the activities among computer hardware
D. Mac OS resources

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 234

A. Operating system C. server operating system


B. System Software D. single user system
C. Application software
406. How does a computer virus infect a pc?
D. Utility program
A. Email attachments
401. Which Windows tool is used to determine
B. Attached to files on memory sticks
if a dynamic disk is corrupted?
C. Suspicious web links

NARAYAN CHANGDER
A. Disk Management
B. Device Manager D. All of the above

C. Microsoft System Preparation 407. Select the best choice for the statement.
D. Bootmgr Acomputer icon is a(n):

402. The Operating System is a program that A. embedded computer


allows different and various pieces of B. small image on a Windows screen tha-
hardware to with each other. trepresents a file or folder
A. application, software C. file containing the full image of thes-
B. software, application mall one displayed
C. application, communicate D. folder
D. software, communicate
408. What should be the extension to execute
403. A administrator is responsible for files?
managing computers that are connected to A. . EXE
a shared printer.
B. .BAT
A. system
C. .COM
B. database
D. none of above
C. technology
D. network 409. Which operating system is referred to as
a network operating system that is used
404. What do you press on the DELL com- to handle network management?
puter keyboard in order to open the BIOS
screen? A. multi-user operating system
A. F6 B. server operating system
B. Esc C. binary operating system
C. F2 D. management operating system
D. Tab
410. One of the Operating system feature is
405. An operating system specifically de- A. File handling
signed for use on personal computers or
a Mac. B. Internet service provider
A. multi-user system C. Internet service provider
B. desktop operating system D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 235

411. What is a kernel? 417. What does the user interface do?
A. The battery on motherboard. A. Allows users to communicate with the

PRACTICE BOOK» NOT FOR SALE


B. The core of an operating system computer

C. Program language. B. Downloads programs and applications

D. An application launcher.
C. Manages printers and scanners
412. Operating Systems will allocate sections D. Acts as the essential center of a com-
of RAM to the processes as part of: puter operating system
A. Processor Management
418. What kind of operating system comes
B. File Management pre-installed with tools to protect a com-
C. Peripheral Management puter from threats.
D. Memory Management A. Multi User OS
B. Security OS
413. Windows 10 and Windows 7 are exam-
ples of: C. Single-User, Multi-Tasking OS
A. IOS Phone D. Single-User, Single Tasking OS
B. Android 419. What is an Operating System?
C. Microsoft Windows A. Physical parts of a computer
D. none of above B. A keyboard
414. Latest Version of Windows Series is? C. A videogame
A. Windows 8 D. Software that let a user work with a
B. Windows 8.1 computer

C. Windows 10 420. The first step in the problem solving pro-


D. Windows 19 cess is:
A. Recognizing anddefining the problem
415. Windows are developed by?
B. Logthe problem
A. Apple
C. Planningand preparing to implement
B. Microsoft the solution
C. Unix D. none of above
D. Linux
421. Is the way a system is set up, or the as-
416. A message sent by the OS to change the sortment of components that make up the
CPU schedule is known as system.
A. Interupt A. Booting
B. Poll B. Configuration
C. Cache C. Installing
D. Defrag D. Reformatting

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 236

422. A file system is.. A. Memorymanagement


A. The memory of the computer B. Multitasking
B. used when we store documents in USB C. Providinga user interface
memories
D. none of above
C. How are the file named and logically
stored in the hard drive 428. A process is a
D. they have batteries and need to be A. program in execution

NARAYAN CHANGDER
charged
B. program on the hard drive
423. One of the capabilities of operating sys-
tems:The operating system can support C. high level program
two or more CPUs. D. low level program
A. multi-user
429. What does the term file management
B. multitasking mean?
C. multiprocessing
A. How your manager is able to find your
D. multi-threading file.
424. Which of the following uses an embedded B. The way in which we organise our files
operating system? and documents on the computer.
A. Computer C. How you organise the rough edges of
B. Smart Phone your nails

C. GPS D. none of above


D. Tablet 430. What are the 3 most common operating
systems for personal computers?
425. Who can establish standard user accounts
that allow alterations to security set- A. TV’S, Movie Theaters, and Quizizz
tings?
B. Apple Watches, Apple Computers, and
A. Key Users Grill
B. Any Users C. Personal Computers, Phones, and Ta-
C. Secured Users bles
D. Administrators D. Microsoft Windows, Mac OS X, and
Linux
426. What is character data composed of?
A. symbols only 431. Diving processor time between processes
so that they appear to multitask is known
B. numbers only
as:
C. numbers, letters and symbols
A. Time Slicing
D. numbers and letters
B. Fish Slicing
427. When Android provides pop-up boxes to
C. Time waiting
allow working with calendar app while
you work with other application, this is D. Idle Time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 237

432. A type of OS which can run on a stan- 437. What is meant by multi-tasking?
dalone PC (or other device) and supports
A. The computer executes more than one
the use of running more than one job simul-

PRACTICE BOOK» NOT FOR SALE


instruction at a time
taneously
B. The processor carries out small parts
A. Distributed of multiple larger tasks in turn, very
B. Multi-tasking quickly
C. Embedded C. Doing more than one job at the same
time
D. Real-time
D. none of above
433. Processor scheduling is one of the func-
tions managed by the OS. Which one is a 438. Operating System provide service like
scheduling method used by the scheduler
A. Round To It A. Processer Management

B. Round Table B. Memory Management

C. Round Robin C. System access

D. none of above D. all mentioned above

439. WIMP stands for


434. Operating Systems need to manage Sys-
tem ? A. Windows, Interface, Menus, Pointers
A. Objectives B. Windows, Icons, Multimedia, Pointers
B. Electricity
C. Windows, Images, Multimedia, Point-
C. Restores
ers
D. Resources
D. Windows, Icons, Menus, Pointers
435. If you have a problem in the HTTP server, 440. provides process and memory man-
who is responsible for solving it? agement services that allow two or more
A. Network admin tasks, jobs, or programs to run simultane-
ously.
B. website admin
A. Multitasking
C. Sales Manager
B. Multithreading.
D. none of above
C. Multiprocessing.
436. The screen that you see when your com- D. Multicomputing.
puter has finished starting up is called the
441. Which term relates to a multiuser system
A. Task Bar A. batch jobs
B. Start up screen B. timesharing
C. Home C. serial processing
D. Desktop D. punch cards

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 238

442. Which of the following is a private combi- 447. A role of the operating system that man-
nation of characters associated with a user ages applications or programs that are in-
name that allows access to certain com- stalled on a system.
puter resources? A. Application/Program Management
A. Password B. Service Management
B. Username C. Access Control/Protection
C. Folder D. Windows Settings App

NARAYAN CHANGDER
D. Cipher
448. The function of the operating system is
443. It is a computer operating system; a sys- to serve as the between the user, the
tem that is designed primarily to support application software, and the computer’s
workstation, personal computer, and, in hardware
some instances, older terminal that are A. interface
connected on a local area network (LAN).
B. program
A. Network Operating System
C. application
B. WAN
D. server
C. MAN
D. OSI 449. Which of the following kinds of software
consists of the programs that control or
444. Which of these is NOT a Mobile OS? maintain the operations of a computer and
its devices?
A. iOS
A. System
B. Symbian OS
B. Application
C. Linux OS
C. Program
D. Android OS
D. Management
445. Which one related to MULTITASK
450. What is an Operating System? Is the one
A. Bigger parts of a program are loaded
that..
when needed by OS
A. Is a software that manages the com-
B. Smaller parts of a program are loaded
puter hardware and software
when needed by OS
B. Is a huge program that allows you to
C. CPU can only run many program at a
write and connect to the net
time
C. is commomly known as the brand of
D. CPU can only run one program at a
computers
time and OS will switch programs for it
D. It is the system followed by the opera-
446. Windows are tor
A. Symbols of application 451. Being able to run several applications at
B. Rectangular area on screen the same time is known as
C. Graphical User Interface A. Multi tasking
D. All of the above B. Application management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 239

C. Multi cores 457. What does SDK stand for?


D. Application control A. Software Design Kit

PRACTICE BOOK» NOT FOR SALE


B. Specific Developed Keys
452. Which type of User Interface contains
Windows, Icons, Menus, and Pointers? C. Software Development Kit
A. Command Line Interface D. Stand-alone Desk Kit
B. Graphical User Interface 458. What software manages hardware,
C. Menu Interface other applications and user

D. No User Interface A. Security software


B. Application Software
453. What kind of operating system would a
Mars Rover robot require C. Operating System Software

A. Batch D. Utility software

B. Interactive 459. What does BIOS stand for?


C. Real TIme A. Bonus Input/Output System
D. none of above B. Basic Interface Output System
C. Basic Input/Output System
454. Which touchscreens need to be constantly
calibrated? D. Basic Input/Outsource Shape
A. Resistive Touchscreen 460. The main storage of your computer
B. Capacitive Touchscreen A. RAM
C. New Touchscreens B. ROM
D. Gyroscope Screens C. Motherboard
D. Hard Drive
455. One of the function of operating system
is it serves an interface between user and 461. The operating system works behind the
? scenes on your computer with tasks.
A. Data ware. A. spreadsheet
B. Hardware. B. opening
C. Software. C. management
D. Utilities. D. closing
456. The following is not a type of Systems 462. What is an advantage of Action
Software Launcher?
A. Device Drivers A. Increases the bandwidth of your apps
B. Utility Programs B. Allows quicker access to applications
C. Applications C. Manages Application
D. Operating Systems D. Calibrates your screen

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 240

463. A system usually designed to handle 468. What kind of operating system would be
large volumes of data periodically such as needed for payroll processing
calculating tax payable is an example of A. Batch
what kind of system?
B. Interactive
A. single user C. Real TIme
B. batch D. none of above
C. real-time 469. Which one of these is not Cloud Storage

NARAYAN CHANGDER
D. network A. OneDrive
B. Icloud
464. Organization documents For IT contains
C. IOS
A. The Businessplans for the cash flow
D. DropBox
B. The procedures and policies that will
be adopt in work 470. Which is NOT an example of a peripheral
device?
C. The contract with the suppliers
A. Printer
D. none of above
B. Monitor
465. Which operating system are IOS applica- C. Projector
tions designed in? D. Computer
A. Windows 8.1/10 471. the Network information technology sys-
B. Unix tem include

C. Mac OSX A. Internet


B. Service level agreements
D. Linux
C. System functionality
466. What does a driver software do? D. none of above
A. Make software work 472. The methods used by operating systems
B. Stops viruses to assign needed resources to preform
tasks is called
C. Make internet work
A. Task management and allocation
D. Make hardware work
B. Resources management and alloca-
tion
467. What is a buffer?
C. Process management and scheduling
A. The primary component of a computer
that processes instructions. D. Process distribution and assignment

B. Control signal used to synchronise the 473. This following is an example of a periph-
internal components. eral.

C. A signal sent from a device or software A. Processor


to the processor requesting its attention. B. Main Memory (RAM)
D. A temporary memory area within a de- C. Hard Disk Drive
vice. D. ROM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 241

474. How does a worm infect a computer? C. Google Chrome


A. E-mail attachments D. Physicals parts of a Computer

PRACTICE BOOK» NOT FOR SALE


B. Through security loopholes, your com- 480. O.S Is an interface between the user and
puter is not up to date
C. Suspicious web links A. processor
D. On memory sticks B. software
475. Backing up your files is important be- C. Hardware
cause D. none of above
A. Computer drives could fail
481. Google Docs or Microsoft Word allows
B. A virus could corrupt your work
you to:
C. You could accidentally delete a file
A. create, edit, share and store forms for
D. ALL ARE IMPORTANT! user input.
476. The ability for an operating system to B. create, edit, share and store web-
give the appearance to manage the alloca- pages and sites.
tion of different processes to multiple pro- C. create, edit, share and store spread-
cessors/cores sheet documents.
A. multi-programming D. create, edit, share and store word-
B. multi-tasking processing documents.
C. multi-processing 482. Which of the following software man-
D. multi-plying ages the files and folders on your com-
puter’s hard disk drive?
477. CPU performance is measured through
A. Word processing software
B. Anti-virus software
A. Current Root directory
C. Operating System
B. MHz
D. Database software
C. Throughput
D. None of Above 483. Linux is the?
A. Open Source OS
478. Where do multiple documents line up in a
printer? B. Friendly OS
A. Glossary C. Licences OS
B. Queue D. Limited OS
C. Index 484. Copying software without purchasing it
D. Roster is .

479. What is Hardware? A. Software piracy

A. Microsoft Word B. Freeware

B. Programs or Apps that can be run on a C. Shareware


computer D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 242

485. Used to select multiple files in a series 491. Operating systems are available on
A. Control Key which types of computers?

B. Shift Key A. Desktop


B. Laptop
C. Task Bar
C. Smartphones
D. Ram
D. All of these
486. Choose the Apple operating system
492. What OS typically comes pre-installed on

NARAYAN CHANGDER
A. Windows non-Apple computers?
B. Android A. Linux
C. Linux B. Windows
D. Mac OS X C. Mac OS
487. Which one of the following is one the ben- D. Unix
efits of a Microkernel Organizaton?
493. Hardware is different from software be-
A. Portability cause
B. Safety A. you can see hardware
C. Privacy B. it costs more
D. Productivity C. hardware needs a person to make it
work
488. Ext2, Ext3 is an example of Linux
D. a computer doesn’t need software to
A. Process scheduling work
B. Linux Process scheduling
494. Choose the Microsoft operating system
C. Memory address
A. Windows
D. File system
B. Android
489. How many applications can be processed C. Linux
by the CPU at a time? D. Mac OS X
A. 1
495. Operating systems that can be used by
B. 2 only one person at a time on a single ap-
C. 3 plication is called
D. Several A. Single User, Multi Task
B. Single User, Single Task
490. Left, Center, Right, and Justify are op-
tions for which tool located on the toolbar C. Multi Task
or ribbon? D. Real time
A. Zoom
496. The grouping of jobs that require similar
B. Line Spacing resources
C. Bulleted Lists A. timesharing
D. Text Alignment B. serial processing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 243

C. multiprogramming 502. Which of the following regularly pro-


D. batch processing vides new features or corrections to a pro-
gram?

PRACTICE BOOK» NOT FOR SALE


497. What hardware may involve cost- A. Speed Read
effective to upgrade one or more compo-
nents? B. Automatic Update

A. Ram C. Recurring Restandardization

B. Headsink D. Cold Fix

C. Cooling Fan 503. The ability for different people to use the
D. none of above same computer is made possible through:
A. Open-source software
498. are a types of systems are regarded
as critical system B. Desktop elements

A. Financial, customer-related, cash flow C. User accounts


D. Settings app
B. External information 504. what is the most widely used operating
C. Backup files system?
D. none of above A. blackberry

499. Which of the following is a set of pro- B. linux


grams containing instructions that control C. windows
all the activities of computer? D. ios
A. Management System
505. What does the operating system man-
B. Application software ages
C. Operating System A. Memory
D. Boot System B. Processes
500. Which of the following operating sys- C. All of the above
tems is free and open-source? D. none of above
A. Windows
506. What is not one of the basic functions of
B. Mac OS X an operating system?
C. Linux A. Manage applications
D. UNIX B. Tracking the date and time
501. are programs that designed to help C. Provide a user interface
users to be more productive with their per- D. Control hardware access
sonal tasks.
A. Software 507. This option replaces your current version
of Windows with Windows 7, and keeps
B. System Software your files, settings, and programs in place
C. Application software on your computer.
D. Utility program A. Boot

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 244

B. Custom D. Completely protects your information


C. Remove from cloud hackers

D. Upgrade 513. is one of the areas to consider for


508. Keeping track of the location of processes data recovery
in memory and allocating space to new pro- A. Confidence in the backup/restore pro-
cesses is known as cess
A. Memory Management B. Apply Emergency procedures

NARAYAN CHANGDER
B. Process Management C. Business Continuity Planning
C. Memory Scheduling
D. none of above
D. Process Scheduling
514. Which type of screen relies on the electri-
509. DATA PROCESSING JOBS ARE DIS-
cal properties of the human body to detect
TRIBUTED AMONG THE PROCESSORS IN
where a display was tapped?
A
A. MULTI-USER OS A. Resistive Touchscreen

B. SINGLE-USER OS B. Capacitive Touchscreen


C. DISTRIBUTED-SYSTEMS OS C. SAW
D. REAL-TIME OS D. Infrared
510. Windows 7 and Windows Vista are pro- 515. Which of the following is an Operating
duced by: System?
A. Apple
A. Word
B. Google
B. Apple
C. Microsoft
C. Windows
D. none of above
D. Memory
511. During the boot process, the looks for
the system files. 516. Group of 8 bits is called?
A. CPU A. Recod
B. BIOS
B. Byte
C. CD Room
C. File
D. none of above
D. none of above
512. Which of these is not a benefit to cloud
computing? 517. who founded windows?
A. Saves storage space on your PC A. Alan Sugar
B. Gives you access to files from any com- B. Bill Gates
puter
C. Bill Gaties
C. Protects your files from being lost due
to PC failure D. Ben Gates

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 245

518. What is the user goals of an Operating B. Word


System? C. Excel

PRACTICE BOOK» NOT FOR SALE


A. Convenient to use, easy to learn, reli- D. PS3
able, safe and fast
524. Which of these devices can have an REAL
B. Easy to design, implement and main-
TIME operating system?
tain
A. Server
C. flexible, reliable, error-free and effi-
cient B. Gaming console
D. Speed, cost and volatility C. ATM
D. Tesla car
519. Which Operating System function en-
ables access levels to be given? 525. Installing multiple operating systems in
A. User Interface one computer called?
A. Dual-BootSystem
B. Peripheral Management
B. Multi-processing
C. User Management
C. Functionsof a computer
D. File Management
D. none of above
520. Which of the following is an example of
Time sharing OS 526. When software is no longer required on
a device, what happens?
A. Windows NT
A. It gets updated
B. GEnie
B. It gets uninstalled
C. Unix
C. Add more software
D. Linux
D. Nothing
521. Each file on NTFS is stored as a file de-
527. The ability for an operating system to
scriptor in a
give the appearance to the user of simulta-
A. Disk File Table neous process execution by rapidly chang-
B. Master File Table ing between processes in short scheduled
time slices
C. Fie Allocation Table
A. multi-programming
D. Name Allocation Table
B. multi-tasking
522. Which of the following is a Program C. multi-processing
Group?
D. multi-plying
A. ACCESSORIES
528. It instruct the computer on how to per-
B. PAINT
form a number of basic functions such as
C. WORD booting and keyboard control.
D. ALL OF THE ABOVE A. BIOS
523. Which of these is an example of an oper- B. Custom
ating system? C. Update
A. Windows D. Upgrade

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 246

529. What is a virtual memory? C. Short text


A. Primary memory located on the com- D. Linux
puter
534. Why is it important to keep the operating
B. Part of the operating system to pro-
system up to date?
cesses theinstruction
A. To impress your friends
C. Temporary memory used to extended
system memory B. To avoid buying a new one

NARAYAN CHANGDER
D. none of above C. To protect your computer form mal-
ware
530. The ability for an operating system to
save and switch context to change proces- D. Because it’s the law
sor execution between multiple processes
535. What technology makes WiFi calling pos-
A. multi-programming sible?
B. multi-tasking A. VOIP
C. multi-processing B. WiFi
D. multi-plying C. WiMax
531. How much processor speed is needed to D. WWAN
run windows XP operating system?
536. Operating Systems need to manage Sys-
A. 233 MHz tem ? (1-3)
B. 133 MHz A. Objectives
C. 800 MHz B. Electricity
D. 259 MHz C. Restores
532. Which of the following is the design goals D. Resources
of an Operating System?
537. Which utility organizes files efficiently on
A. Sensory Experience, Brand Image and
the hard drive?
Durability
A. Uninstaller
B. Maintainability, Accessibility and Pro-
ductivity B. Disk defragmenter
C. Learnability, Discoverability, Conve- C. Backup Utility
nience and Safety D. File Manager
D. Flexible, Reliable, Error-free and Effi-
cient 538. The following are the benefits of format-
ting hard drive except one.
533. A short line of text that a web site puts
A. Speed up your computer
on your computer’s hard drive when you
access their website. They may be used B. Fix malware and virus problems
to monitor your computer. C. Get rid of outdated personal informa-
A. Malware tion
B. Cookies D. Increase hard drive capacity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.6 Operating system 247

539. Windows, Icons, menus and Pointers are C. UBUNTU


all part of this? D. MACOSX

PRACTICE BOOK» NOT FOR SALE


A. Graphical User Interface
545. The spindle speed of a typical hard disk
B. Command Line Interface drive is
C. Menu Interface A. 540 rpm.
D. No User Interface B. 1000 rpm.
540. If there is not enough RAM. Virtual mem- C. 7200 rpm.
ory is created by the Operating System. D. 28000 rpm.
Virtual memory is
546. button is present on the extreme
A. memory that is not real
right of the task bar.
B. part of the hard drive allocated as RAM
A. Show Desktop
B. Navigation
C. a type of sheep
C. Start
D. a type of goat
D. Quick launch toolbar
541. Which of the following is an example of
a global setting on a Windows system? 547. Which part of the operating system will
allocate memory to applications to allow
A. Desktop background picture more than one piece of software to be run
B. Screen resolution at once?
C. Accent color A. Memory management
D. Screen saver B. File and disk management

542. A type of operating system that is de- C. User management


signed for one user at a time using one set D. User interface
of input devices.
548. BOOTING A COMPUTER IS TO LOAD
A. handheld operating system AN OPERATING SYSTEM INTO THE COM-
B. desktop operating system PUTER’S
C. data representation A. RANDOM ACCESS MEMORY
D. single-user operating system B. HARD DISK
C. PEN DRIVE
543. What is the most common type of oper-
ating system? D. ROM
A. Windows 549. Standards for how quick an organisation
B. Chrome OS should be able to recover its system soft-
ware from a disaster are likely to be found
C. Mac OS
in:
D. Android A. Backup documentation
544. which one is not the example of linux OS B. Service level agreements
A. FEDORA C. Standards Australia handbook
B. REDHAT D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Unix 248

550. What is defragmentation? 551. What is used by an operating system


A. Rearranging files to occupy contiguous to communicate with hardware compo-
space. nents?

B. Speeding up processing. A. device driver

C. Rearranging the RAM. B. BIOS

D. Rearranging processes queued for C. CMOS


processing. D. Application Program Interface

NARAYAN CHANGDER
1.7 Unix
1. A command that does not have an indepen- 5. What is your Lecture name in Unix Opera-
dent existence is called tor System Subject
A. External command A. MOHD SHAHRIL AFANDI BIN ABDUL
MAJID
B. Internal command
B. MOHD SHAHRIL BIN AFFANDI
C. kernal
C. MOHD SHAHRIL AFFANDI BIN ABDUL
D. shell
MAJID
2. how to find out which shell our system D. MOHD SHAHRIL AFFANDI BIN MAJID
has?
6. What is execute permission?
A. echo $shell
A. permission to execute the file
B. echo $SHELL
B. permission to delete the file
C. cat shell
C. permission to rename the file
D. echo sh
D. permission to search or navigate
3. “grep-v” command is used to through the directory

A. Multiple Choice 7. What year was the Unix operating system


born?
B. displays all lines except lines mathcing
pattern while filtering A. in the early 90s
C. Displays all line while filtering B. in the early 60’s
D. none of these C. in the early 70s
D. in the early 80s
4. Which permission, when applied to a direc-
tory in the file system, will allow a user to 8. Which command in UNIX is used to change
enter the directory? the user account passwords.
A. Read A. pwd
B. Write B. password
C. Execute C. passwd
D. Access Control D. none of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Unix 249

9. which directory contains all the users’ 15. To make a pipe put a on the command
home directories line between two commands

PRACTICE BOOK» NOT FOR SALE


A. home A. |
B. Home B. /
C. usr C.
D. bin D. $

10. What does the following command do? $ 16. print the last line of a file
mkdir dir 01 dir 02 dir 03 A. sed ‘$p’ file
A. create dir, dir 01 and dir 02 B. sed ‘ & p’ file
B. creates dir 02 C. sed ‘!p’ file
C. creates dir only D. sed ‘np’ file
D. throws an error
17. I want to show a list of users logged in
11. Unix operating system is written in for a specific host. Which command will I
A. Ada Language use?

B. Perl Language A. who

C. C Language B. whoami

D. Pascal Language C. users


D. users-l
12. The complete set of positional parameters
is stored in as a single string. 18. UNIX is a
A. $n A. Compiler
B. $# B. Interpreter
C. $* C. Operating System
D. $$ D. linker

13. The following command can list out all the 19. How many levels of Unix core structure
current active logins. are there?
A. A-whoami A. 2 levels
B. B-who am i B. 3 levels
C. C-who C. 4 levels
D. D-None of the above. D. 5 levels

14. Which command is used to create a direc- 20. Which command is used to list your files
tory? and directories in unix opearting system?
A. create directory A. list
B. create folder B. cd
C. mk dir C. ls
D. mk directory D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Unix 250

21. UNIX operating system supports 27. If the command cat x is executed after suc-
A. Multi User cessfully executing the command time sort
filename > x, then
B. Pattern Matching
A. only the time details will be displayed
C. Multi Tasking
D. All of the above B. only the sorted contents of the file file-
name will be displayed
22. Command used to list all hidden files is
C. an error message will be displayed

NARAYAN CHANGDER
A. Multiple Choice
D. None of the above
B. ls-l
C. ls-d 28. is like an engagement dairy that con-
D. ls-a tains text information and offers a re-
minder services based on a file.
23. Which syntax is used to move a file from
one place to another place or directory? A. cal
A. rm filename1 filename2 B. date
B. li file C. mkdir
C. mv filename
D. calendar
D. mv filename1 filename2
24. how to sort according to the 4th character 29. The is responsible for the management
of the 3rd column of a file in decreasing of processes.
order? A. Shell
A. sort-t3, 4 file B. User
B. sort-r-d3, 4 file
C. Kernel
C. sort-k3, 4-r file
D. Administrator
D. sort file
25. mv command is used to move files and di- 30. Which year UNIX created?
rectories.
A. 1969
A. True
B. 1978
B. False
C. 1965
C. Can’t determined
D. None D. 1971

26. Unix shell command that lists directory 31. Which command is used for changing the
contents of files and directories with hid- current directory?
den files.
A. cd
A. ls-d
B. cp
B. ls-F
C. ls-a C. pwd
D. ls-l D. rm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Unix 251

32. Driving is in the city unless you like 38. Which among the following interacts di-
traffic. rectly with system hardware?

PRACTICE BOOK» NOT FOR SALE


A. for the birds A. Shell
B. scratching his back B. Commands
C. letting the cat out of the bag C. Kernel
D. none of above D. Applications
33. Which of the following is default permis- 39. Which command is used to arrange lines of
sion set for directories? text alphabetically or numerically?
A. rw-rw-rw- A. sort
B. rwxrwxrwx B. psort
C. r-r-r- C. asort
D. rw-rw-rwx D. series
34. Which command is used to get information 40. What is a shell script?
about currently logged in user on to sys-
tem A. group of commands
A. who am i B. a file containing a series of commands
B. who
C. group of functions
C. who i am
D. a file containing special symbols
D. None of the above
41. Which of the following commands is used
35. The mv command changes
to display file attributes
A. Only the directory entry
A. cat
B. Only the directory entry and i-node
B. ls-l
C. Only the i-node number
C. mkdir
D. None of the above
D. ls
36. The first argument is read by the shell into
the parameter 42. NTP is used to synchronize the system
with a central resource.
A. 1$
A. clock
B. $3
B. restoration
C. $$
C. backup
D. $1
D. command processor
37. The absolute path always start at which
directory? 43. Who introduced UNIX operating system
A. current directory A. Dennis Ritchie
B. root directory B. Ken Thompson
C. home directory C. Brian kernighan
D. Default partition D. Both a and b

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Unix 252

44. The of UNIX is the hub of the operating 50. Which command is used to remove a direc-
system tory?
A. Kernel A. rd
B. Shell B. rmdir
C. Commands C. dldir
D. None of these D. rdir

NARAYAN CHANGDER
45. Which is the default editor of Unix Oper- 51. is a program written to perform cer-
ating System? tain specific action.
A. Notepad A. Kernal
B. vi B. Shell
C. Dreamweaver C. Command
D. All of the above D. getty

46. A command with an independent existence 52. Which of the following is not a filter in
in the form of a separate file is called Unix?
A. External Command A. cat
B. Internal Command B. head
C. Shell C. tail
D. Kernal D. cd

47. Which command searches a file or files for 53. What is used for confirmation before delet-
lines that have a certain pattern? ing any file?
A. erep A. rm-r
B. pgrp B. rm-i
C. grep C. del-filename
D. drep D. del-f

48. Which symbol is represented as root direc- 54. Which of the following is not a part of all
tory? the versions of UNIX?
A. % A. Kernel and Shell
B. * B. Commands and utilities
C. & C. Graphical user interface
D. / D. System Calls

49. Unix OS was first developed by 55. In Unix, Combining commands are
A. Dennis Ritchie A. & %
B. Bjarne stroustrup B. & & %
C. Ken Thompson C. ; & &
D. Brian Kernighan D. ; &

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Unix 253

56. Shell Program is stored in a file called 62. In Linux everything stored as a
A. Unix A. file

PRACTICE BOOK» NOT FOR SALE


B. Sh B. directory
C. Dd C. executables
D. Cc D. None of the above
57. What is the name of the operating system
63. What command is used to remove files?
on the PDP-7?
A. UNICS A. dm

B. Multics B. rm
C. Unix C. delete
D. wisdom D. erase

58. which commands gives the no of recently 64. Which command is used to remove a file?
logged in users?
A. remove
A. who
B. del
B. who | wc-w
C. rm
C. whoami | wc-l
D. mv
D. who | wc-l

59. The command is used to display some 65. A disk partition is used to for?
process attributes A. Allocate space for a filesystem
A. pwd B. Compress space on disk
B. od C. Set permission on files
C. cd D. Eliminate need for home directory
D. ps
66. The standard tree structure starts at which
60. When was the UNIX Programmer’s Man- directory?
ual book first published?
A. home
A. November 4, 1987
B. user
B. November 4, 1971
C. root
C. November 3, 1971
D. bin
D. November 3, 1987

61. Which command Is used to change current 67. To remove a file from a system, is
directory to parent directory used

A. Multiple Choice A. rm filename


B. cd. B. remove
C. cd.. C. delete
D. none of these D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Unix 254

68. In what year did the Uniplexed Informa- 73. What does the script do?
tion and Computing System operating sys- A. Set the entry direction of the Output-
tem undergo a small change and become shell.
called UNIX?
B. Set the direction of the input.
A. 1900 C. determine the direction of entry In-
B. 1980 put/Outputshell
C. 1970 D. Determine the direction in and out of

NARAYAN CHANGDER
Input/Outputshell
D. 1988
74. Which of the following command is used to
69. Which directory contain device special create file in Linux?
files? A. touch
A. /etc B. cat
B. /etc/dev C. echo
C. /root/bin D. All of the above

D. /dev 75. Solaris is the name of a flavor of UNIX


from
70. A user needs to open a file, edit it, and A. HP
then save the changes. What permissions
B. IBM
does he need to do this? (Choose two.)
C. Digital Equipment Corp
A. Read
D. Sun Microsystems
B. Write
76. Which is the core of the operating sys-
C. Execute tem?
D. Modify A. Shell
B. Kernel
71. Unix command to get the word count
C. Commands
A. WC demo.txt
D. Script
B. wc demo.txt
77. which command renames a file?
C. wc-l demo.txt
A. cp
D. wc-w demo.txt
B. rename
72. Which of the following is incorrect? C. mv
A. Tzi Yeung loves his everyday basket- D. cat
ball practice time. 78. command provides a list of all the cur-
B. Tzi Yeung walks in the park everyday rent users .
with his dog. A. tput
C. Tzi Yeung has to go to school every day B. mkdir
except weekends. C. who
D. none of above D. tty

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Unix 255

79. Which of the following OS is not based on D. All of The above


Linux?
85. change permission of a file to rw-r r-

PRACTICE BOOK» NOT FOR SALE


A. Ubuntu x?
B. Redhat A. chmod 546 file
C. CentOs B. chmod 642 file
D. BSD
C. chmod 645 file
80. To run the script, we should make it exe- D. chmod 655 file
cutable first by using
86. Which command is used to create a file
A. chmod +x
A. ls
B. chmod +r
B. cat
C. chmod +w
C. vi
D. chmod +rwx
D. lyrix
81. The system call is used to create a pro-
cess. 87. Which command is used for removing an
A. exec empty directory?

B. fork A. mkdir

C. wait B. rmdir

D. phase C. del
D. remove
82. command helps to know the details of
the one’s Unix system. 88. Which symbol is used as a command
A. date prompt in unix?
B. uname A. !
C. cal B. @
D. who C. $
D. #
83. Which command is used for making the
scripts interactive? 89. What is group ownership?
A. ip A. group of users who can access the file
B. input
C. read B. group of users who can create the file
D. write
C. group of users who can edit the file
84. If rmdir dir001 fails, what could be the rea-
son(s)? D. group of users who can delete the file

A. dir001 doesn’t exist 90. To Display line of text/string that are


B. dir001 is not empty passed as an argument with a command

C. permissions of dir001 doesn’t allow to A. cat


remove it B. echo

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Unix 256

C. ls C. Output of one command to input of an-


D. none of the above other command
D. All the above
91. Unix is a
A. Single User, Single tasking OS 97. What was the first name given to the Unix
B. Single User, Multi-tasking OS operating system?

C. Multi-User, Multi-tasking OS A. IBM 704

NARAYAN CHANGDER
D. None B. Solaris
C. OpenBSD
92. In a system, if 5 people are currently us-
ing the vi editor. then the number of cor- D. Uniplexed Information and Computing
responding processes will be System
A. 1
98. Firefox is an example of a(n).
B. 5
A. Animal
C. 2
B. Internet Browser
D. 0
C. Internet
93. how to print the date of the system
D. E-mail program
A. date
B. date +%d-%m-%y 99. The write permission for a directory deter-
mines that
C. date +’%D-%M-%Y’
D. date +’%d-%m-%Y’ A. we can write to a directory file
B. we can read the directory file
94. find out the 7th character of the word ‘EN-
CYCLOPAEDIA’? C. we can execute the directory file
A. cut-f7-d’ ‘ ‘ENCYCLOPAEDIA’ D. we can add or remove files to it
B. cut-d’ ‘-c7 ‘ENCYCLOPAEDIA’
100. Unix is which kind of Operating System?
C. cut-c7 ‘ENCYCLOPAEDIA’
A. Multi User
D. none of the above
B. Multi Processes
95. Which command is used for printing the
C. Multi Tasking
current working directory?
A. HOME D. All of the mentioned

B. cd 101. Which command is/are used to remove


C. pwd directory in Linux?
D. dir A. rmdir

96. Pipes are used for redirecting B. rm-r


A. Output to file C. only b
B. Output to Standard output D. Both a and b

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.7 Unix 257

102. What is the meaning of independent? B. /bin


A. Someone who rely on others and can’t C. /dev

PRACTICE BOOK» NOT FOR SALE


take care of him/herself well without help.
D. /usr

B. Someone who is not dependable. 108. Which of the following commands is used
to display the directory attributes
C. Someone who doesn’t rely on others,
can take care well of him/herself without A. cat
help. B. ls
D. none of above C. mkdir
103. Naming a file or directory can use any let- D. cp
ter in the name. except any letter
109. To display the given string, number or
A. letter a
any other format specifier on the terminal
B. sign window
C. number 1 A. echo
D. mark * B. printf
104. command is used to control the move- C. sort
ment of the cursor on the screen. D. cat
A. mkdir
110. Which meta character takes output of
B. echo
first command as input of second com-
C. tput mand?
D. tty A. Multiple Choice
105. UNIX Architecture contains B. ;
A. KERNEL C. |
B. SYSTEM CALL D. ||
C. SHELL
111. Unix is
D. ALL OF THE ABOVE
A. Application Software
106. Which of the following is true about past B. System Software
perfect tense?
C. Utility Software
A. We use it when there is only 1 event.
D. Operating System
B. Had + P.P
C. We use it when events happened at 112. The first line in any shell script begins
the same time. with a
D. Have + P.P A. &
B. !
107. All device files are stored in which direc-
tory? C. $
A. /etc D. #

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 258

113. Which command is used for creating direc- 116. POSIX refers
tories? A. Portable operating system interface
A. rmdir B. Portable operating system index
B. mkdir C. Position operating system interface
C. cd D. Partial operating system interface
D. cp
117. command can display the current date

NARAYAN CHANGDER
114. delete all file starting with d and ending along with the nearest to the seconds.
with t? A. date
A. rm dt* B. cal
B. rm d*t C. who
C. rm td* D. mkdir
D. rm t*
118. command is used to display mes-
115. Which is wrong? sages
A. Potato-potatoes A. mkdir
B. Piano-pianoes B. echo
C. Bench-benches C. bc
D. Girl-girls D. ls

1.8 Database management system


1. What does DBMS stand for? D. none of above
A. Database Management System 4. The column in a table is called
B. Database Manufacture System A. Record
C. Database Malfunction System B. Row
D. none of above C. Field
2. The term attribute refers to a of a ta- D. none of above
ble
5. Columns in a database are called
A. Record
A. Rows
B. Foreign key
B. Fields
C. Primary key
C. Tables
D. Field
D. none of above
3. In database table, rows are called
6. Which one of the following is NOT an ad-
A. field vantage of DBMS
B. column A. Increased data consistency
C. record B. Reduced data redundancy

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 259

C. Improved data security 12. Types of Database System where focus on


D. Increase data isolation storing data used to generate information
required to make tactical or strategic deci-

PRACTICE BOOK» NOT FOR SALE


7. Where the database does not have any sion
transitive dependency? A. Data Warehousing database
A. First normal form B. Distributed Database
B. Second normal form C. Operational Database
C. Third normal form D. none of above
D. Fourth normal form
13. Which of the following is NOT an example
8. Which of the following is not a Storage of a database?
Manager Component?
A. telephone book
A. Transaction Manager
B. real estate listing
B. Logical Manager
C. online library catalog
C. Buffer Manager
D. DVD
D. File Manager
14. Each item from this list is classified as
9. Which type of application should you use if Name, Birthdate, Street, County, Post-
you need to store a large quantity of data Code
in an organized format that you can easily
query? A. Table
A. Database B. Record
B. Presentation C. Field
C. Spreadsheet D. none of above
D. Word Processor 15. is responsible for the management of
10. The architecture of a database can be the data resource.
viewed as the A. Data Administrator (DA)
A. One level B. Database Administrator (DBA)
B. Two level C. Database Designers (Logical & Physi-
C. Three level cal)

D. Four level D. Application Programmers

11. What are the advantages of DBMS? 16. Occurs when multiple users seeking access
to the same set of records lockout each
A. Low cost of hardware & software
other.
B. DBMS are simple to use
A. Data manipulation
C. Uniform administration procedures
B. Deadlock
for data
C. Database lockout
D. Offers a variety of techniques to store
& retrieve data D. Data redundancy

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 260

17. Which of the following is the disadvan- 22. Update the data of the database including
tages of DBMS? A. Import, edit, delete data
A. Cost of setup of DBMS is relatively B. Sort
cheap
C. Search
B. Database systems are complex D. Report
C. Database will not be corrupted
23. Features in MS access build to provide help
D. Database systems are fast to be de- topics and topics on tasks performed work-

NARAYAN CHANGDER
signed ing with Access
A. Index
18. Database management system is soft-
ware B. Office Assistant
A. System C. Query
D. Ribbon
B. Relational
C. Application 24. Consider attributes ID, CITY and NAME.
which one of these can be considered as
D. Game a primary key?
19. The following are purpose of a database, A. NAME
which is NOT true? B. ID
A. To store data C. CITY
B. To create a responsive web page D. ID, NAME

C. To provide an organizational structure 25. The relationship between two entities can
for data be given using the lower and upper lim-
its.This information is called
D. To provide a mechanism for CRUD data
A. Cardinality
20. One or more very large databases contain- B. Composite entity
ing both detailed and summarized data for
C. Optional relationships
a number of years that is used for analysis
rather than transaction processing. D. Business rules

A. Data warehouse 26. The following shows the functionalities of


DBMS except
B. Data Sharing
A. Manipulate
C. Database
B. Multiply
D. Data Mining
C. Share
21. How data is stored in relational D. Construct
database?
27. Rows in a database tables are called
A. Stored in the form of objects A. Fields
B. Stored hierarchically B. Records
C. Stored in fixed structures C. Tables
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 261

28. Sets of related data C. Physical level


A. Table D. Conceptual level

PRACTICE BOOK» NOT FOR SALE


B. Form
34. Which of the following is not an Schema?
C. Report
A. Database Schema
D. Field
B. Physical Schema
29. The record is a field unique identifies every
record in a table C. Critical Schema
A. Query D. Logical Schema
B. Primary Key
35. The DBMS that most difficult to use is
C. Record
A. Microsofts SQL Server
D. Secondary Field
B. Oracle Corporation Oracle
30. The four main objects of a relational
database consist of: C. Microsoft Access

A. form, table, query, report D. IBM DB2


B. form, table, database, query, report
36. Data types to store field uses tables or val-
C. form, sort, table, query ues list to validate the content of a single
D. form, column, row, report value per row
A. OLE Object
31. The Database Management Query lan-
guage is generally designed for the B. Lookup Wizard
A. Specifying the structure of the C. Attachment
database
D. Hyperlink
B. Support end-users who use English
like commands 37. Types of Database System used by the en-
C. Support in the development of the com- tire organization (100s of users) across
plex applications software many departments
D. All of the above A. Centralized Database
32. It allows you to specify exactly how data B. Enterprise Database
should be entered into the database. C. Workgroup Database
A. Lookup wizard
D. none of above
B. Query
C. Input mask 38. The features responsible for controlling
the sequence or order of the records
D. none of above
A. Query
33. Which of the following levels is considered
as the level closed to the end-users? B. Report
A. Internal level C. Sort
B. External level D. Table

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 262

39. A data types which stores data and time B. Keep call records, monthly bills, main-
values from the year 100 through 9999. taining balances
A. Currency C. For storing customer, product and
B. Date/Time sales information

C. OLE Objects D. none of above


D. Yes/No 45. A list of containing every object in your
database

NARAYAN CHANGDER
40. Why would you create a primary key?
A. Menu Bar
A. To make each record in a database
unique B. Ribbon
B. To make each field in a database C. Navigation Pane
unique D. Quick access
C. To make each query in a database
46. Formatted summaries suitable for printing
unique
A. Table
D. none of above
B. Form
41. The key that can be used for data retrieval
is known as C. Report

A. Foreign key D. Field

B. Surrogate key 47. The reports are generally created after


C. Primary key making on the database.

D. Secondary key A. Record


B. Statements
42. Data types to store text or alphanumeric
and used the link or URL C. Tables
A. OLE Object D. Queries
B. Lookup Wizard 48. A person, place, event or item is called as
C. Attachment
D. Hyperlink A. Data
B. Entity
43. . A relational database consists of a collec-
tion of C. Attributes
A. Tables D. Relationships
B. Fields 49. The phases in database design wherein
C. Records one gathers and list all the necessary
fields for database projects.
D. Keys
A. Data control
44. What is the use of DBMS in the telecom-
munication sector? B. Data Definition

A. For reservations and schedule infor- C. Data relationship


mation D. Data refinement

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 263

50. The type of datatype which allows al- B. Currency


phanumeric characters and special symbols C. Short Text
but can store up to 255 characters.

PRACTICE BOOK» NOT FOR SALE


D. Calculated
A. Auto number
B. Text 56. A collection of programs required to store
and retrieve data from a database is called
C. OLE Object
D. Memo A. RDBMS
51. is responsible for the maintenance of B. DBMS
operational control. C. SQL
A. Data Administrator (DA) D. None
B. Database Administrator (DBA)
57. In which dependency, a nonkey column is
C. Database Designers (Logical & Physi- dependent on part of the primary key?
cal)
A. Partial dependency
D. Application Programmers
B. Transitive dependency
52. Which of the following is a software pack- C. Total (or) full dependency
age of Database management System?
D. none of above
A. Visual Fox Pro
58. Where the database does not have any
B. Microsoft SQL-Server
multivalued columns?
C. Oracle
A. First normal form
D. All of the above
B. Second normal form
53. Which of the following is NOT example of C. Third normal form
data?
D. Fourth normal form
A. RM10
59. Data Manipulation Language is used to
B. The
the DBMS.
C. The boy received RM10
A. create
D. Boy
B. define
54. Data Definition Language is used to C. control access
the DBMS. D. manage
A. create
60. The database management system can be
B. define considered as the collection of that
C. control access enables us to create and maintain the
D. manage database.
A. Translators
55. Type of Data types to stores expression
that uses data from one table or more ta- B. Programs
bles C. Keys
A. Numeric D. Language

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 264

61. Which of the following is Database Lan- C. Set


guage? D. Schema
A. Data Definition Language
67. The convenient way to enter or find data
B. Data Manipulation Language in tables.
C. Query Language A. Forms
D. All of the above B. Macros

NARAYAN CHANGDER
62. In a relational model, a row is known as C. Modules
D. Report
A. Domain
68. Which of the following is a Data Model?
B. Degree
A. Entity-Relationship model
C. Tuple
B. Relational data model
D. Attributes
C. Object-Based data model
63. The features of MS Access builds to pro- D. All of the above
vide helps topics and topics on tasks per-
form while working with Access. 69. Which of the following keys is generally
used to represents the relationships be-
A. Index
tween the tables?
B. Office Assistant A. Primary key
C. Query B. Foreign key
D. Report C. Secondary key
64. What are databases mainly used for? D. Non of the above
A. To store archived data 70. Which of the following provides the abil-
B. To store and organise data ity to query information from the database
and insert tuples into, delete tuples from,
C. To analyse data
and modify tuples in the database?
D. none of above
A. DML
65. Proponent of Entry-Relationship (ER) B. DDL
Model
C. Query
A. Ted Codd
D. Relational schema
B. Bill Gates
71. The personal database system assumes
C. Peter Chen
that no two transactions will happen at
D. none of above the same time on one table, which is
known as
66. For each attribute of a relation, there is a
set of permitted values, called the of A. Client Server
that attribute. B. Network
A. Domain C. Transaction
B. Relation D. Optimistic locking

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 265

72. If you were collecting and storing informa- B. It helps increase organisational acces-
tion about your music collection, an album sibility to data
would be considered a/an

PRACTICE BOOK» NOT FOR SALE


C. It helps people to be promoted as man-
A. Relation ager
B. Instance D. It increases efficiency
C. Entity 78. Which is not a function of a DBMS?
D. Attribute A. Provide database creation environ-
73. The end product of data manipulation in ment
DBMS as per the user’s choice is known B. Provide an up-to-date and data mining
as environment
A. Record C. Provides tools to control and control
B. Report access to the database
C. Forms D. Provide file management services
D. None 79. To which of the following the term “DBA”
referred?
74. It contains multiple tabs, each with several
groups of commands. A. Database administrator
A. Menu Bar B. Data bank administrator
B. Ribbon C. Data Administrator
C. Navigation Pane D. None of the above
D. Quick access 80. A set of fields comprises a
75. Using different file organization should A. Database
not require change to conceptual or exter- B. Table
nal schemas. This is referring to
C. Record
A. Logical Data Independence
D. File
B. Physical Data Independence
C. Conceptual Data Independence 81. An ordered set of data constituting a
record is called
D. User Data Independence
A. Attribute
76. Which of the following is not involved in B. Row
DBMS?
C. Tuple
A. End Users
D. Field
B. Data
C. Application Request 82. The following are Characteristics of Data
Dictionary EXCEPT
D. HTML
A. include information on relationship be-
77. Database management so important be- tween files
cause of the following reasons except B. Information about relationship of ta-
A. It allows better updates bles in database

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 266

C. Place where all meta data for 88. A collection of fields and records in a spe-
database is stored cific category
D. Provides direct control access to A. Record
database
B. Table
83. is a database management package C. Field
A. MS Excel D. none of above

NARAYAN CHANGDER
B. MS Word
89. Which of the following is generally used
C. Ms Access for performing tasks like creating the
D. MS Paint structure of the relations, deleting rela-
tion?
84. is an example of hierarchical data A. DML
model
B. Query
A. Doors and windows
C. Relational schema
B. Windows registry
D. DDL
C. RDM server
D. Jellyfish 90. The following are the functions of a DBMS
except
85. It let you access frequently access com- A. Creating database
mand.
B. Processing data
A. Navigation pane
C. Creating and processing forms
B. Quick access toolbar
D. Administrating database
C. Backstage view
D. Ribbon 91. What is database?
A. Collection of organized data that al-
86. is one of the oldest ways to maintain lows access, retrieval of that data.
records in a conventional file oriented data
collection system. B. Collection of organized data that al-
lows access, retrieval, and use of that
A. records data.
B. database C. Collection of organized data that al-
C. files lows retrieval, and use of that data.
D. none D. none of above

87. It is used to customized formats for adding, 92. An arrangement of data in a row and col-
editing, deleting or displaying data. umn
A. Field A. Record
B. Report B. Table
C. Macro C. Field
D. Form D. Form

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 267

93. a group of related data organized in 99. Data type used to store currency value and
columns and rows in a datasheet. numeric data used in mathematic calcula-
tions involving data with one to four deci-

PRACTICE BOOK» NOT FOR SALE


A. Record
mal places
B. Fields
A. Numeric
C. Tables
B. Currency
D. Report
C. Short text
94. The disadvantages of DBMS include
D. Long text
A. Complex for non-technical users
100. A Database Management System is a
B. Store small size data
type of
C. Low cost
A. It is a type of system software
D. none of above
B. It is a kind of application software
95. When a join is based on equality of value, C. It is a kind of general software
it is known as a
D. Both A and B
A. Outer join
B. Natural join 101. The following are Characteristics of Early
days database application EXCEPT.
C. Self Join
A. Contain Table Entity Relatinship
D. Equi join
B. Data build direct on the top of File sys-
96. The number of columns in a table is called tem
C. Multiple formats and duplications are
A. Domain implemented
B. Relation D. none of above
C. Degree
102. What type of datatypes your going to
D. Metadata used if you wanted to store information if
97. is a database that supports data dis- the student is CURRENTLY ENROLLED OR
tributed across several different sites NOT?

A. Centralized database A. Auto number

B. Distributed database B. Date / Time


C. Enterprise database C. Numeric
D. Discipline specific database D. Yes/No

98. Data resulting from questions you asked 103. The set of all possible values that a col-
from one or more tables umn may have is called as
A. Form A. Domain
B. Report B. Relation
C. Queries C. Degree
D. Field D. Metadata

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 268

104. A Database Management System (DBMS) 109. Which is the example of File Based Sys-
is tem?
A. Collection of interrelated data A. Using MySQL to find specific data
B. Collection of programs to access data B. Using MS Access to control users ac-
C. Collection of data describing one par- cess
ticular enterprise C. Using spreadsheet software to man-
D. All of the above age data of employee

NARAYAN CHANGDER
D. Using OpenOffice.org Base to create
105. Which of the following is a top-down new table
approach in which the entity’s higher
level can be divided into two lower sub- 110. Dbms stands for
entities?
A. Database management system
A. Aggregation
B. Database management storage
B. Generalization
C. Data base manipulation system
C. Specialization
D. Database manipulation storage
D. All of the above
111. Why we need database?
106. Course(course id, sec id,
semester)Here the course id, sec A. To store a particular picture
id and semester are and course is a B. To store a particular text
C. To store a particular collection of data
A. Relation, attribute .
B. Attribute, relation D. To store a particular audio
C. Tuples, relation
112. decides how the logical DB design is
D. Tuple, attribute
to be physically realised
107. Which one of these cannot be taken as a A. Data Administrator (DA)
primary key?
B. Database Administrator (DBA)
A. ID
C. Database Designers (Logical & Physi-
B. registration no cal)
C. Department ID D. Application Programmers
D. Street
113. The language in which users express
108. The language for expressing data mining requirements for creating databases is
and update requirements is called
A. Data manipulation language A. Data definition language
B. Data definition language B. Data manipulation language
C. Data update language C. Data Description Language
D. Database language D. Database language

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 269

114. Which of the following defines the term A. Application prgm


‘field’ in relation to databases? B. DDL

PRACTICE BOOK» NOT FOR SALE


A. A field is all of the information about C. Schema
one person or one thing
D. Source code
B. A field is the collection of all the
database records on one topic or subject 120. A column in a table that contains particu-
C. A field is one type or piece of informa- lar information about a record
tion A. Record
D. none of above B. Primary Key

115. exists when different versions of the C. Table


same data appear in different places D. Field
A. Data integrity 121. Which one of the following is NOT an ex-
B. Data anomaly ample of data
C. Data redundancy A. RM10
D. Data inconsistency B. Girl

116. How many functions does a DBMS C. Boy


have? D. The boy received RM10
A. 3 122. Types of Database System where sup-
B. 4 ports data located at single site.
C. 2 A. Centralized Database
D. 5 B. Enterprise Database

117. Types of Database System supports data C. Workgroup Database


across several sites D. none of above
A. Data Warehousing database 123. Which of the following is not fully sup-
B. Distributed Database ported by all commercially available sys-
C. Operational Database tems, but supports if religiously?

D. none of above A. Entity integrity


B. Referential integrity
118. can not be created in Microsoft ac-
cess C. Relational algebra

A. Tables D. Relational calculus

B. Queries 124. Which of the following is NOT Advan-


C. Reports tages of DBMS

D. Image A. Increased data consistency


B. Reduced data redundancy
119. Which one of the following is commonly
used to define the overall design of the C. Improved data security
database D. Increase data isolation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 270

125. The data dictionary is a system structure C. Numeric


that stores D. Short Text
A. Database
131. Using which language can a user request
B. Metadata information from a database?
C. Hardware A. Compiler
D. Software
B. Query

NARAYAN CHANGDER
126. Data types where we can store files like C. Structural
digital photos
D. Relational
A. OLE Object
132. Data Manipulation Language enables
B. Hyperlink
users to
C. Attachment
A. Retrieval of information stored in
D. Lookup Wizard database
127. Types of Database System where sup- B. Insertion of new information into the
ports a small number of users(few than database
50) or specific department within an orga- C. Deletion of information from the
nization database
A. Enterprise Database D. All of the above
B. Centralized Database
133. I can perform an advanced search. I am
C. Workgroup Database very similar to asking a detailed question.
D. none of above A. report
128. The attribute refers to a of a table B. query
A. Record C. table
B. Foreign key D. form
C. Primary key 134. Which of the following gives a logical
D. Field structure of the database graphically?
A. Entity-relationship diagram
129. Which of the following in not a function
of DBA? B. Entity diagram
A. Network Maintenance C. Database diagram
B. Routine Maintenance D. Architectural representation
C. Schema Definition 135. A in a table represents a relationship
D. Authorization for data access among a set of values

130. The type of datatype can store valued A. Field


used in mathematical calculations B. Foreign key
A. Autonumber C. Record
B. OLE Object D. Primary key

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 271

136. Which one of the following commands is 141. Relational calculus is a language
used for removing (or deleting) a relation A. Non-procedural
forms the SQL database?

PRACTICE BOOK» NOT FOR SALE


B. Procedural
A. Delete
C. Both (A) and (B)
B. Drop
D. none of above
C. Remove
142. I give the ability to present information in
D. All of the above
an easy-to-read format. I summarize and
137. builds the application programs that print information from the query search.
provide the required functionality for the A. form
end-users.
B. table
A. Data Administrator (DA) C. query
B. Database Administrator (DBA) D. report
C. Database Designers (Logical & Physi-
cal) 143. The following shows the types of DBMS

D. Application Programmers
A. Hierarchical database
138. Types of Database System designed to B. Object-oriented database
support companies day-to-day operations
C. Relational database
A. Data Warehousing database
D. Rational database
B. Distributed Database
144. It is a collection of data that is related to
C. Operational Database
a particular subject or purpose
D. none of above
A. Field
139. What is the difference between an entity B. Row
and an attribute? C. Column
A. An attribute is a table in a database D. Database
and an entity is a field
B. An attribute is a record in a database 145. Data types to store audio, video or other
and an entity is a table BLOBs files

C. An attribute is a field in a database and A. OLE Object


an entity is a table B. Hyperlink
D. none of above C. Attachment
D. Lookup Wizard
140. Database management system used to
A. create, update and exploit information 146. Which of the following is not a level of
in the database data abstraction?
B. create information in the database A. Physical Level
C. Create and store information in a B. Critical Level
database C. Logical Level
D. information extraction in the database D. View Level

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.8 Database management system 272

147. The format of displaying the information 153. In which one of the following, the mul-
from a particular table is called tiple lower entities are grouped (or com-
A. Report bined) together to form a single higher-
level entity
B. Record
A. Specialization
C. Forms
B. Generalization
D. Database
C. Aggregation
148. The term is used to refer a row

NARAYAN CHANGDER
D. None of the above
A. Record
B. Primary key 154. Which one of the following keyword is
used to find out the number of values in a
C. Foreign key
column?
D. Field
A. Total
149. The database management system is B. Count
A. Software C. Sum
B. Data D. Add
C. Computer control program works
155. Which one of the following commands is
D. Information of the organization to be
used to restore the database to the last
managed
committed state
150. is a unique field by which records are A. Roll back
identified in a table.
B. Save point
A. Name
C. Committ
B. Field
D. Both A and B
C. Primary Key
D. None 156. Logically related data consists of these
EXCEPT
151. The term “TCL” stands for
A. attributes
A. Ternary Control Language
B. relationships
B. Transmission Control Language
C. entities
C. Transaction Central Language
D. variables
D. Transaction Control Language
152. Disadvantages of File systems to store 157. helps you retrieve information from
data is: table as when required.
A. Data redundancy and inconsistency A. Report
B. Difficulty in accessing data B. Database
C. Data isolation C. Record
D. All of the above D. Query

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 273

1.9 SQL

PRACTICE BOOK» NOT FOR SALE


1. Which statement is used to extract data C. Structured Question Language
from a database? D. Structure Quality Language
A. Extract
7. Within a database, tables are connected
B. Get with :
C. Open A. Relationships
D. Select B. Ropes
2. Which of these is an example of an En- C. Slides
tity?
D. Ladders
A. Registration
8. which of the following is not an aggregate
B. John
function in SQL?
C. keys
A. SUM
D. Maths
B. AVG
3. Which of the following is used to denote C. COUNT
the selection operation in relational alge-
D. FIND
bra?
A. Pi (Greek) 9. DBMS can summarise the data stored in
the database and produce an easy to read
B. Sigma (Greek)
:
C. Lambda (Greek)
A. reports
D. Omega (Greek)
B. queries
4. Full form of RDBMS? C. tables
A. Right Database Management System D. criteria
B. Relational Database Management Sys-
tem 10. What field type would be used to store the
following data “0125-5221”
C. Rapid Database Management System
A. Text
D. Route Database Management System
B. Number
5. What does SQL stand for? C. Time/Date
A. SQL D. none of above
B. Structured Query Language
11. What type of data is stored as an INTE-
C. Static Query Language GER?
D. Structure Query Language A. Whole numbers
6. SQL is B. Decimal numbers
A. Structured Query Language C. Strings
B. Simple Query Language D. Yes / No True / False

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 274

12. What is the OCR pseudocode keyword for C. DELETE FROM Persons WHERE First-
outputting to the screen? HINT:Same as Name = ‘Peter’
Python D. none of above
A. print
17. A is a database that subscribes to a
B. output model with information represented by ob-
C. display jects
D. show A. Relational Database

NARAYAN CHANGDER
B. Hierarchical Database
13. In order to delete data from a database,
C. Network Database
which of the following SQL statements
would you use? D. Object Oriented Database
A. COLLAPSE 18. Which of the query below is likely to run
into an error?
B. DELETE
A. SELECT FROM DataFlair;
C. REMOVE
B. SELECT name, emp id FROM
D. UPDATE DataFlair
14. A particular DBMS uses SQL for extracting C. SELECT name FROM DataFlair;
data. The SQL command “WHERE” is usu- D. SELECT * FROM DataFlair;
ally followed by:
19. Triggers are written to be executed in re-
A. a criteria sponse to any of the following events-
B. a table name A. A DML statement(insert or update or
C. a user name delete)
D. a mathematical formula B. A DDL statement
C. A database operation(startup, shut-
15. What is normalisation? down)
A. Making databases larger so that they D. All of the above
are easier to use
20. Which of the following data models de-
B. Analysing how to make databases
fines WHAT the system contains?
more efficient by using separate tables to
reduce redundant data A. Physical

C. Setting the correct data types to all of B. Conceptual


the data in a database C. Logical
D. none of above D. UML

16. With SQL, how can you delete the records 21. In what time will a railway time 60m long
where the “FirstName” is “Peter” in the moving at a rate of 36kmph pass a tele-
Persons Table? graph post on its way?
A. 9 sec
A. DELETE ROW FirstName=’Peter’
FROM Persons B. 8 sec
B. DELETE FirstName=’Peter’ FROM Per- C. 7 sec
sons D. 6 sec

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 275

22. Identify the total number of attributes in 27. A clause in the SELECT command that spec-
a relational data model. ifies the condition the records must sat-
isfy.

PRACTICE BOOK» NOT FOR SALE


A. Tuple
A. Table name
B. Entity
B. WHERE
C. Degree
C. LIKE
D. Cardinality
D. Database name
23. A man walked 2 km west of his house and
28. Which symbol can be used as a wildcard in
then he turned south covering 4 km.Finally,
SQL?
he moved 3 km towards east and then he
again 1 km west.How far is he from his A. ?
initial position? B. &
A. 10 km C. %
B. 9 km D. $
C. 2 km 29. What would this SQL query display? SQL
D. 4 km Forename, Surname FROM Pupils
A. It would only display pupils forename
24. Which of the following query contains er-
and surname from the Pupils table.
ror?
B. It is not a SQL statement.
A. SELECT * FROM Emp WHERE Em-
pid=1001; C. It would display all pupils forenames
from Pupils table.
B. SELECT Empid FROM Emp WHERE Em-
pid=1001; D. It would not display any pupils.

C. SELECT Empid FROM Emp; 30. Which operator is used to select values
within a range?
D. SELECT Empid WHERE empid=1001;
A. RANGE
25. Which SQL function is used to count the B. WITHIN
number of rows in a SQL query?
C. BETWEEN
A. COUNT()
D. None
B. NUMBER()
31. Which of the following system database
C. SUM()
occupies more space and memory?
D. COUNT(*)
A. Model
26. Which type of database management sys- B. Master
tem is Oracle /MySQL? C. Tempdb
A. Object-oriented D. Msdb
B. Hierarchical
32. Which of the following is used to modify
C. Relational the data stored in the database?
D. Network A. SELECT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 276

B. INSERT INTO C. Master records the initialization infor-


C. UPDATE mation for SQL Server

D. LIMIT D. None of the mentioned

33. Some SQL commands are. 38. How many 3 digits numbers can be formed
using the digits 1, 2, 3, 4, 5, 7, 9.
A. select, use, print, for
A. 343
B. select, order, create

NARAYAN CHANGDER
C. if, for, next B. 464

D. none of above C. 565


D. 666
34. Which command will execute correctly?
A. CREATE TABLE emp (ID Number(5), 39. Which of the following are steps in query
Name Varchar2(25)); processing?
B. CREATE TABLE emp (ID Number(5), A. Parsing and translation
Name Varchar(25));
B. Optimization
C. CREATE TABLE emp ID Number(5),
Name Varchar2(25); C. Evaluation

D. CREATE TABLE emp (ID Number(5), D. All of the mentioned


Name Varchar);
40. Degree of a relation refers to the total
35. Find the odd man out.41, 43, 47, 53, 61, number of
71, 83, 91 A. rows
A. 61
B. columns
B. 71
C. tables
C. 73
D. databases
D. 91
41. UPDATE is a command
36. The command to remove rows from a table
‘CUSTOMER’ is A. DML
A. DROP FROM CUSTOMER B. DDL
B. UPDATE FROM CUSTOMER C. DCL
C. REMOVE FROM CUSTOMER D. None of the above
D. DELETE FROM CUSTOMER WHERE
42. Which operator performs pattern match-
37. Point out the wrong statement related to ing?
master database. A. BETWEEN operator
A. They are used to provide details of an
B. LIKE operator
backup plans
C. EXISTS operator
B. Master records the information for
SQL Server temporarily D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 277

43. This symbol is an SQL wildcard that can 48. The FROM SQL clause is used to
substitute for one or more characters A. specify what table we are selecting or
when searching for data in a database.

PRACTICE BOOK» NOT FOR SALE


deleting data FROM
A. $ B. specify range for search condition
B. % C. specify search condition
C. = D. none of above
D. * 49. Which SQL query would display all pupils
details who have the surname Smith?
44. This constraint cannot accept NULL val-
ues. A. SELECT surname FROM Pupils WHERE
Smith
A. CHECK
B. SELECT * FROM Pupils WHERE sur-
B. NOT NULL name = Smith
C. PRIMARY KEY C. SELECT * FROM Pupils WHERE sur-
name = “Smith”
D. UNIQUE
D. SELECT * FROM Pupils
45. What is the meaning of DCL?
50. LENGTH(”password”) will return
A. Data Count Language
A. 8
B. Database Control Language B. 7
C. Data Calculation Language C. 9
D. Data Control Language D. 11

46. Relationship between Primary key (P), Al- 51. Which of following SQL Wildcard repre-
ternate Keys(A), and Candidate keys(C) sents a single character in MS Access?
are: A. *
A. P=A+C B. ?
B. C=P+A C. !
C. A=P-C D.
D. A=P+C 52. Which is the most important system
database?
47. A integrity constraint requires that the
A. Northwind
values appearing in specified attributes of
any tuple in the referencing relation also B. Master
appear in specified attributes of at least C. Tempdb
one tuple in the referenced relation.
D. All of the mentioned
A. Referential
53. How many types of system databases are
B. Referencing present in SQL Server 2016?
C. Primary A. 3
D. None of the above B. 4

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 278

C. 5 D. Can be used with Create, Insert and


D. 6 Delete.

54. Which command will execute properly? 59. Assume that you have the follow-
ing:CREATE FUNCTION totalPaidBy-
A. INSERT INTO emp (101, ‘Melissa’, Cust(custID INT) ENDIf you want to
300); query the function, the command will be:
B. INSERT INTO emp VALUES (101, A. CALL totalPaidByCust(3);
Melissa, 300);

NARAYAN CHANGDER
B. SELECT totalPaidByCust(3);
C. INSERT INTO emp VALUES (101,
‘Melissa’, 300); C. EXECUTE totalPaidByCust(3);
D. None of the answer is correct
D. INSERT INTO emp VALUES (’101’,
Melissa, ‘300’); 60. What is the meaning of LIKE ‘%0%0%’
55. Which of the following are DDL com- A. Feature begins with two 0’s
mands? B. Feature ends with two 0’s
A. Create table, Insert into, Drop table C. Feature has more than two 0’s
B. Alter table, Update, Drop table D. Feature has two 0’s in it, at any posi-
C. Drop table, Alter table, Create table tion
D. None of the above 61. Who did Barry turn against when a meta
used Barry’s emotions against him?
56. To narrow a window function’s application
to a subgroup within a data set, use A. Arrow
A. OVER B. Vibe
B. SUBGROUP C. Reverse Flash
C. PARTITION BY D. none of above
D. SECTION 62. Which of the following is NOT a require-
ment of 1NF?
57. Which SQL statement is used to insert new
data in a database? A. It should only have single (atomic) val-
ued attributes/columns.
A. INSERT NEW
B. a Primary Key
B. ADD RECORD
C. One item of data per column in one row
C. INSERT INTO (i.e. no repeating data)
D. ADD NEW D. Data should be sorted in order
58. hat is the one thing we need to pay atten- 63. Fill in the blank space with the correct
tion to when we need to use constraints? preposition.I heard a glass breaking noise
A. Can be used with both Insert and in the living room and ran to see what hap-
Delete. pened. A pigeon flew thewindow and
B. Can be used with only Insert. broke it.

C. Can only be used with the Create A. for


clause. B. from

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 279

C. by 69. Return only the customers who have ER


D. against anywhere in their last name.

PRACTICE BOOK» NOT FOR SALE


A. last name LIKE “%er%”
64. Which of following SQL Wildcard repre-
B. last name = “%er”
sents zero or more characters in MS Ac-
cess? C. last name = “%er%”
A. D. last name LIKE “%er”

B. ? 70. What will be the output of following


query:Select length(trim(’ exam ‘));
C. %
A. exam
D. *
B. exam
65. How do we select all rows for the “De- C. 6
signer” table?
D. 4
A. SELECT * FROM Designer
71. What is the correct definition of a Record?
B. SELECT [All] FROM Designer
A. Uniquely identifies any record in a ta-
C. SELECT Designer.*
ble
D. SELECT FROM Designer B. It is always a number
66. SQL query and modification commands C. Used to store all of the data about each
make up a(n) . specific item
A. DDL D. Used to store a category (e.g. Names
/ Gender / Mobile Num)
B. DML
C. HTML 72. Which Symbol means “All”
A. *
D. XML
B. &
67. If SQL Server does start but cannot be ac-
C. %
cessed, the problem is likely to relate to
what issue. D. !

A. Network 73. FIND(”[email protected]”, “@”) will re-


B. CPU turn
A. 4
C. DISK
B. 5
D. none of above
C. 1
68. Primary key should be chosen such that it’s D. 0
attribute vales are never
74. SQL query to find all the cities whose hu-
A. Updated
midity is 95.
B. Changed
A. SELECT city WHERE humidity = 95
C. Dependent B. SELECT city FROM weather WHERE hu-
D. None of these midity = 95

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 280

C. SELECT humidity = 89 FROM weather 80. Return all dramas made after 2004.
A. SELECT * FROM movies WHERE genre
D. SELECT city FROM weather = ‘drama’;

75. Which of the following join uses maximum B. SELECT * FROM movies WHERE genre
resources if there are large tables? = ‘drama’ AND year > 2004;
A. Left Join C. SELECT * FROM movies WHERE genre
= “drama’ AND year < 2004;
B. Right Join

NARAYAN CHANGDER
D. SELECT * FROM movies WHERE imdb
C. Cross Join
rating = 7 AND LIMIT = 7
D. Inner Join
81. When defining a table, each field name has
76. RDBMS consist a collection of? both a
A. Tables A. table name and a database
B. Fields
B. command and an argument
C. Records
C. goal and a purpose
D. Keys
D. name and a data type
77. How many times did barry go back in time
to save his mother? 82. Use what to separate multiple table names
in the FROM clause?
A. 1
A. commas
B. 5
B. periods
C. 3
D. 2 C. spaces
D. semicolons
78. Which of the following options is not true
about a WINDOW clause? 83. When examining a row in a table, we refer
A. It avoids repetition when creating mul- to it as a
tiple window functions A. row number
B. It comes before the ORDER BY clause B. result number
C. It can create an alias for shared PAR-
C. record
TITION BY and ORDER BY clauses
D. result
D. It comes before the WHERE clause

79. What is the circumference of a circle with 84. If you don’t specify ASC or DESC after a
a diameter of 16.5 inches? Round to the SQL ORDER BY clause, the following is
nearest tenth. used by default

A. 103.62 A. ASC
B. 33 B. DESC
C. 51.81 C. There is no default value
D. 25.91 D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 281

85. Which fixed server role should be re- 90. With SQL, what wildcard symbol do you
garded as equivalent to sysadmin because use to select all the columns from a table
of its ability to assign server principals to named “Persons”?

PRACTICE BOOK» NOT FOR SALE


server roles? A. SELECT *.Persons
A. bulkadmin
B. SELECT Persons
B. securityadmin
C. SELECT [all] FROM Persons
C. processadmin
D. SELECT * FROM Persons
D. none of above
91. Query language is a language in which a
86. Which of the following command is incor- user?
rect?
A. Requests
A. CREATE TRIGGER SumTotal AFTER
CREATE ON B. Stores

B. CREATE TRIGGER SumTotal AFTER C. Response


DROP ON D. Represents
C. CREATE TRIGGER SumTotal AFTER
92. Which of the following is not a PL/SQL
DELETE ON
unit?
D. CREATE TRIGGER SumTotal AFTER SE-
A. Table
LECT ON
B. Type
87. What is the commands that control a
C. Trigger
database, including administering privi-
leges and committing data D. Package
A. DCL 93. Which query would return only the fields
B. DDL DesignerID and Designer?
C. DML A. SELECT * FROM Designers
D. SQL B. SELECT DesignerID, Name FROM De-
signers
88. Below are the Data Definition Command,
EXCEPT C. SELECT DesignerID AND Designer
FROM Designers
A. CREATE
D. SELECT DesignerID, Designer FROM
B. ALTER
Designers
C. MERGE
94. A student is developing a Face Recognition
D. SELECT
System for car. He needs to store the face
89. Which of the following is not a target for information of the car owner. In such a
SQL Server Audit? case, the student needs a:
A. File A. A data storage
B. Windows Application Log B. Relational Database
C. Ring Buffer C. Spreadsheet
D. none of above D. File

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 282

95. What is SQL Server Extended Events. 101. Now() returns


Choose the correct answer A. current date
A. It is a performance handling system B. current date and time
B. It is a bugs handling system C. current time
C. It is an event-handling system
D. none of above
D. none of above
102. An attribute in a relation is a foreign key

NARAYAN CHANGDER
96. The command is used to completely re- if the key from one relation Is used as
move a table from the database. an attribute in that relation.
A. INSERT A. Candidate
B. ALTER B. Primary
C. DROP C. Alternate
D. CREATE D. None of the above
97. What is the commands that maintain and 103. Which command will delete your table
query a database from the database?
A. DCL A. DROP
B. DDL B. DELETE
C. DML C. TRUNCATE
D. SQL D. MERGE
98. At what degree will the hour hand of a 104. It is a flexible language that is used to
clock will be at one minute? communicate with a relational database
A. 30 deg such as MariaDB
B. 1/2 deg A. Java
C. 3/4 deg B. PhpMyAdmin
D. 360 deg C. SQL
99. Sorting of relations that do not fit in mem- D. MariaDB
ory is called as
105. What is data redundancy?
A. Internal sorting
A. Data that is repeated multiple times.
B. External sorting
B. Data that is safe from SQL attacks.
C. Overflow sorting
C. Data that is weak to SQL attacks.
D. Overload sorting
D. Data that has no use anymore.
100. A DBMS is a
106. What does data validation do?
A. Database management system
A. Checks that an input fits certain param-
B. Database multi system eters such as length.
C. Data set management system B. Checks that inputted data is com-
D. Database merger system pletely correct.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 283

C. Checks that there is no redundant data 112. The c.p of 10 pens is equal to s.p of 12
in a field. pens.Find his gain% or loss%.

PRACTICE BOOK» NOT FOR SALE


D. Checks that the correct SQL Query has A. 33.24% profit
been used. B. 20% profit
107. The SQL command which sets conditions C. 16.67% loss
for the rows or columns to be shown in the D. 10% loss
query output
113. A data is a set of rules that define
A. WHERE
valid data.
B. SELECT
A. constraint
C. FROM B. data dictionary
D. WHEN C. query
108. Fill the series 17, 32, 19, 29, 21, 26, 23, D. all of these
,
114. Which clause should you use to exclude
A. 25, 25 group results in a query using group func-
B. 20, 22 tions?
C. 23, 25 A. WHERE
D. 25, 22 B. HAVING
C. GROUP BY
109. What is default value of any column
when it is missing or not known? D. ORDER BY

A. NULL 115. You must always use when filtering


B. Empty string values.
A. quotes
C. 0
B. astericks
D. Garbage Value
C. exclamation point
110. To return strings that match a wildcard
D. percent signs
value, use which word in your filter?
A. LIKE 116. The command to remove rows from a ta-
ble ‘CUSTOMER’ is:
B. EQUALS
A. REMOVE FROM CUSTOMER
C. BETWEEN
B. DROP FROM CUSTOMER
D. SEARCH
C. DELETE FROM CUSTOMER WHERE
111. Which of the following shows comment
in SQL? D. UPDATE FROM CUSTOMER
A. /* This is a comment. */
117. How many Primary keys can be created
B. # This is a comment. on a table?
C. % This is a comment. % A. Infinity
D. & This is a comment. B. 2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 284

C. 1 123. Which of the following are TCL com-


mands?
D. 24
A. UPDATE and TRUNCATE
118. In order to amend data in a database we B. SELECT and INSERT
would use which SQL statement?
C. GRANT and REVOKE
A. Update
D. ROLLBACK and SAVEPOINT
B. Amend

NARAYAN CHANGDER
124. How many Primary key a table can max
C. Alter have?
D. Modify A. Depends on no of Columns
B. Only 2
119. Command to open an existing database
C. Only 1
A. SHOW DATABASES
D. Depends on DBA
B. USE
125. Which all languages support the integra-
C. SHOW TABLES
tion of SQL with them?
D. none of above A. Java
120. Which type of driver provides JDBC ac- B. C++
cess via one or more ODBC drivers? C. Python
A. Type 1 driver D. All of these
B. Type 2 driver 126. Which of the following language is used
C. Type 3 driver to specify database Schema?
A. DDL
D. Type 4 driver
B. DML
121. SELECT * FROM students; This will show C. DCL
A. 1 record from the “students” table D. None
B. all the records in the “students” table 127. Which of the following type of database
management systems stores objects
C. first 10 records of “students” table rather than data such as integers, strings,
or real numbers?
D. all the boys in the table “students”
A. Relational
122. What permission enables a user to B. Flat-File
change the definition of a stored proce-
C. Hierarchical
dure?
D. Object-Oriented
A. CHANGE
B. CHANGE DEFINITION 128. How many times in a day are the hands
of a clock in a straight line but opposite in
C. ALTER direction?
D. none of above A. 20

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 285

B. 22 134. SQL database follows which of the fol-


C. 24 lowing principles?

PRACTICE BOOK» NOT FOR SALE


D. 48 A. ACID
B. AGILE
129. Does a window function require the use
C. SQL
of Group By?
D. DBMS
A. Yes
B. No 135. AVG, COUNT, MAX, MIN and SUM are
known as what?
C. Depends on the function
A. Aggregate functions
D. Depends on the number of impacted
records B. Wildcard filters
C. Subqueries
130. A key which allows unique or null val-
ues. D. Calculated field
A. Unique 136. SQL stands for
B. Null key A. Structured Query Language
C. Primary key B. Sequenced Query Language
D. Alternate key C. Structured Question Language
131. In SQL, which command(s) is(are) used to D. Structured Query Learning
change a table’s storage characteristics?
137. If your audit has a target of the Windows
A. ALTER TABLE Application Log or the Windows Security
B. MODIFY TABLE Log, you can use a tool that can read Win-
dows Event Logs, such as. Choose the cor-
C. CHANGE TABLE rect answer
D. All of the Mentioned A. Task Manager
132. Which of the following is the correct com- B. Event Viewer
mand to create a view? C. Event Manager
A. CREATE VIEW Inv 1 AS D. Performance monitor
B. SELECT VIEW Inv 1 FROM
138. In an election between two candidates,
C. CREATE TABLE VIEW Inv 1 AS one got 55% of the total valid votes, 20%
D. CREATE VIEW TABLE Inv 1 FROM of the votes were invalid. If the total num-
ber of votes was 7500, the number of
133. The following is not a valid SQL key- valid votes that the other candidate got
word: was?
A. PRINT A. 2700
B. SELECT B. 2900
C. INSERT C. 3000
D. DELETE D. 3100

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 286

139. In what order does SQL process the in- C. Capitalize action
structions? D. None of these
A. FROM-SELECT-WHERE-ORDER BY
145. Which of the following attributes can be
B. WHERE-FROM-SELECT-ORDER BY
considered as a choice for a primary key?
C. SELECT-FROM-WHERE-ORDER BY
A. Name
D. SELECT-FROM-ORDER By-WHERE
B. Street
140. What word is missing from the line be-

NARAYAN CHANGDER
C. RollNo
low? SELECT * CUSTOMER WHERE
Name = “Bob”; D. Subject

A. FROM 146. Which is more secure?


B. WHERE A. Database
C. SELECT B. Spreadsheet
D. ORDER BY C. Word Processor
141. Which query would return the fields D. none of above
Name and Form?
147. Select the term used to identify all rows
A. SELECT Name, Set FROM Pupils after the current row in a partition.
B. SELECT Name, Group FROM Pupils A. FINAL ROW
C. SELECT Name, Form FROM Pupils B. UNBOUNDED FOLLOWING
D. SELECT Name, Gender FROM Pupils
C. END RANGE
142. When you select data from 2 tables, you D. CONTINUE TO END
are creating a
148. Mike made a scale drawing of his room.
A. JOIN
The actual room had a width of 16 feet
B. PRIMARY KEY and a length of 24 feet. His drawing has
C. FOREIGN KEY a length of 3 inches. What is the width,
in in inches, of the scale drawing of the
D. INDEX
room.
143. Which SQL function is used to find the av- A. 8
erage value of any column?
B. 3
A. Mean()
C. 16
B. Avg()
D. 2
C. Average()
D. Sum() 149. Which of the following group functions ig-
nore NULL values?
144. What is missing in this code? SELECT *
A. MAX
FROM WHERE genre = ‘action’ ORDER BY
year ASC; B. COUNT
A. Missing an AND C. SUM
B. Table name D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 287

150. What is a field? 155. Which data type should you use for the
BIRTHDAY column in STUDENTS table?
A. A collection of information

PRACTICE BOOK» NOT FOR SALE


A. CHAR
B. A single item of information
B. VARCHAR2
C. A list of information
C. DATE
D. A group of records
D. NUMBER
151. The SQL statement to retrieve informa-
tion from a table uses.. 156. Which clause allows you to SORT data?
A. ORDER BY
A. CREATE TABLE <table name> (field
name DATATYPE ); B. WHERE
B. SELECT <field name> FROM <ta- C. FROM
ble name>; D. HAVING
C. SELECT <table name> FROM <table
name>; 157. The constraint is used to enforce
domain integrity or validate values for
D. CREATE DATABASE <database columns in a table
name>;
A. Primary Key
152. What does * mean in the following B. Unique
query:SELECT * FROM Customers C. Not Null
A. Nothing D. Check
B. All records
158. Fill in the blank:SELECT SUM(qty)
C. All rows (PARTITION BY EmpID) AS EmpQty
D. All records containing * A. ON

153. What is it called when SQL is used in an B. FOR


attempt to harm a database? C. OVER
A. SQL Injection D. WINDOW
B. SQL Interception 159. Correct syntax query syntax to drop a
C. SQL Attack column from a table is
D. SQL Misuse A. DELETE COLUMN column name;
B. DROP COLUMN column name;
154. When three or more AND and OR condi-
tions are combined, it is easier to use the C. ALTER TABLE table name DROP
SQL keyword(s): COLUMN column name;
D. None is correct.
A. LIKE only.
B. IN only. 160. Table Employee has 10 records. It
has a non-NULL SALARY column which
C. NOT IN only.
is also UNIQUE.The SQL statementSE-
D. Both IN and NOT IN. LECT COUNT(*) FROM Employee WHERE

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 288

SALARY > ANY (SELECT SALARY FROM C. INSTRING()


EMPLOYEE);prints
D. INFSTR()
A. 10
B. 9 166. How many transaction isolation levels
are defined in java.sql.Connection inter-
C. 5 face?
D. 0
A. 4

NARAYAN CHANGDER
161. Which SQL query would display all pupils B. 3
surnames and registration class?
C. 5
A. SELECT * FROM Pupils
D. 2
B. SELECT * FROM Pupils WHERE sur-
name, regiClass 167. Which of the following is an invalid
C. SELECT surname, regiClass datatype?
D. SELECT surname, regiClass FROM A. varchar
Pupils
B. varchar2
162. SQL Query to delete all rows in a table C. int
without deleting the table (structure, at-
tributes, and indexes) D. float
A. DELETE FROM table name; 168. Which is the correct DDL group
B. DELETE TABLE table name;
A. CREATE, DELETE, DROP
C. DROP TABLE table name;
B. ALTER, DROP, INSERT
D. None
C. UPDATE, SELECT, DROP
163. enforces rules in your table.
D. CREATE, DROP, ALTER
A. Constraints
B. Data Types 169. Which of the following is a SQL aggre-
gate function?
C. SQL Statements
A. LEFT
D. Keywords
B. LEN
164. Less than or equal to?
C. AVG
A. >=
D. none of above
B. =>
C. =< 170. Select the term used to identify all rows
prior to the current row in a partition.
D. <=
A. UNBOUNDED BEGINNING
165. The string function that returns the index
of the first occurrence of substring is B. BOUNDED BEGINNING
A. INSERT() C. UNBOUNDED PRECEDING
B. INSTR() D. BOUNDED PRECEDING

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 289

171. Which of the following options is not a 177. DML expands to


window function?
A. Data Management Language

PRACTICE BOOK» NOT FOR SALE


A. ROW NUMBER()
B. Data Manipulation Language
B. SUM()
C. LEAD() C. Data Manipulation Language
D. RUN TOTAL() D. none of above
172. Which statement allows us to add a
178. For string symbol + means
record to a table?
A. Add To A. addition
B. Update To B. swapp
C. Add Into C. concatenation
D. Insert Into
D. multiplication
173. What happens if you forget to join two
tables together using a WHERE clause? 179. sql> insert into dept values(10.’sales’);sql>insert
A. CREATE CARTESIAN PRODUCT into dept values(20.’admin’);sql>drop ta-
ble emp;sql>rollback;what will be the out-
B. GET A SYNTAX ERROR put if “select * from dept” is used.
C. 0 RECORDS RETURNED
A. 10, ‘sales’20, ‘admin’
D. DELETE ALL
B. 10, ‘sales’
174. We can’t use subqueries with which of
the clauses given below? C. 20, ‘admin’
A. SELECT D. ” no rows selected “
B. UPDATE
180. What would the value of the length vari-
C. DELETE
able be after this code is run? :length =
D. None of these len(”Hello”)
175. Which operator is used to perform pat- A. 5
tern matching?
B. 6
A. Between
B. In C. 0

C. Like D. Would you like a toasted teacake?


D. None of the above
181. Which of the following is not a type of
176. MySQL runs on which operating sys- SQL statement?
tems?
A. Data Manipulation Language (DML)
A. Unix and Linux only
B. Data Definition Language (DDL)
B. Linux and Mac OS-X only
C. Unix, Linux, Windows and others C. Data Control Language (DCL)
D. Any operating system at all D. Data Communication Language (DCL)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 290

182. What would this SQL query display? SQL 187. Which command is used for removing a
* FROM Pupils table and all its data from the database:
A. It would display pupils who have a * in A. Create command
their name. B. Drop table command
B. It is not a SQL statement. C. Alter table command
C. It would display all records from the D. All of the mentioned
Pupils table.

NARAYAN CHANGDER
D. It would not display any pupils. 188. Duplicate records can be eliminated using

183. With SQL, how can you insert a new A. Dec


record into the “Persons” table?
B. Distinct
A. INSERT INTO Persons VALUES
C. Duplicate
(’Ahmed’);
D. None of the above
B. INSERT VALUES (’Ahmed’) INTO Per-
sons; 189. A story sells tiny crystals. One of the
C. INSERT (’Ahmed’) INTO Persons; crystals is a rectangular prism. The length
is 26 millimeters, a width of 8.5 millime-
D. INSERT VALUES INTO (’AHMED’);
ters, and a height of 7 milliliters. What is
the volume of the crystal?
184. Use which clause to FILTER data?
A. 1547
A. WHERE
B. 221
B. ORDER BY
C. 182
C. FROM
D. 59.5
D. HAVING
190. is not a category of SQL command.
185. Use what to remove spaces from the be-
ginning and end of the string value? A. TCL

A. TRIM B. SCL

B. CROP C. DCL

C. NOSPACE D. DDL

D. SPACE 191. When would you use an alias in SQL?


A. When you didn’t want the user to see
186. What is an Entity?
the developer’s name
A. Person or place.
B. When you want a more readable col-
B. Association between the instances umn name in the output of your query
C. Named Property or characteristic C. When you want to change a field name.
D. Person, Place, Object, event or con-
cept about which the data is to be main- D. When you want to change the name of
tained a table.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 291

192. Which of the following query if run will C. IS NULL


Truncate the DataFlair table?
D. None of the above

PRACTICE BOOK» NOT FOR SALE


A. TRUNCATE DataFlair;
B. TRUNCATE TABLE DataFlair; 198. Choose the correct query

C. TRUNCATE TABLE; A. SELECT * FROM EMP WHERE


NAME=NULL
D. None of these
B. SELECT * FROM EMP WHERE NAME IS
193. A unique identifying field. NULL;
A. Primary Key C. SELECT FROM EMP WHERE NAME IS
B. Integer NULL;
C. Verification D. SELECT *FROM EMP WHERE NAME IS
D. Boolean ‘NULL’;

194. If you don’t specify ASC or DESC after 199. The distance that an automobile travels
a SQL ORDER BY clause, the following is varies directly as the time it travels. If
used by default the car travels 280 miles in 7 hours, how
far will it travel in 12 hours?
A. ASC
B. DESC A. 480

C. There is no default value B. 1960


D. None of the mentioned C. 84
D. 25
195. Which join would you use to create a
query that returns ALL data from Table B 200. This symbol is placed immediately after
and only those on Table A that match? the SELECT command to display all the
A. Inner Join fields.
B. Left Join A. $
C. Right Join B. %
D. Full Outer Join C. =
196. How many records will the following SQL D. *
statement produce? SELECT Dept ID,
Title IDFROM Department, JobTitle; 201. Which SQL query would display all pupils
A. 5 who are older than 12?

B. 13 A. SELECT * FROM Pupils WHERE age >


12
C. 18
B. SELECT * FROM Pupils WHERE age <
D. 65
12
197. Which operator tests column for the ab- C. SELECT * FROM Pupils WHERE age >
sence of data. “12”
A. Exists D. SELECT * FROM Pupils WHERE age
B. Not >= 12

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 292

202. DBMS languages have different syn- B. Integer


taxes. However, which of the following C. Real
is an example of deleting a database?
D. String
A. drop database database name
B. delete database name 208. which operator does pattern matching in
mysql?
C. delete database database name
A. BETWEEN operator
D. drop database name

NARAYAN CHANGDER
B. EXISTS operator
203. Schools use SIMS database to store infor- C. LIKE operator
mation about students. Which will not be
inside the student details table? D. none

A. name 209. What is the FROM statement used for?


B. gender A. It is used to select a database
C. colour of hair B. It is not a SQL statement
D. date of birth C. It is used to select a website
D. It is used to specify which table to se-
204. In your class 6 students out of 30 stu-
lect data from.
dents are left-handed. What percent of
students are left-handed? 210. What will be the result If you will exe-
A. 18% cute the following command:DELETE FROM
emp;
B. 20%
A. The table will be deleted.
C. 5%
B. All the records will be deleted.
D. 60%
C. The structure of the table will be dis-
205. What will be the outputI:SELECT IN- played.
STR(’KVMANKHURD’, ‘MAN’);
D. The statement will not execute.
A. 2
211. Which of following SQL Wildcard rep-
B. 3
resents zero or more characters in SQL
C. 5 Server?
D. NONE A. %
206. Which of the following is not true about B. *
SQL Subqueries? C. ( )
A. They are nested queries. D.
B. Subqueries are executed first. 212. Which SQL statement can eliminate dupli-
C. Only one subquery can be nested. cate rows?
D. None of these. A. SELECT UNIQUE

207. A data type that can only hold 2 values B. SELECT DIFFERENT
e.g. Yes/No or True/False. C. SELECT INDEX
A. Boolean D. SELECT DISTINCT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 293

213. The SQL command to choose the data to 219. Which statement is used to count number
be displayed in a query of rows in table?

PRACTICE BOOK» NOT FOR SALE


A. SELECT A. SELECT COUNT(*) FROM table
B. SHOW name;
C. FROM B. SELECT COUNT ALL(*) FROM table
name;
D. WHERE
C. SELECT ROWS(*) FROM table
214. What is the select statement used for? name;
A. It is used to select a database D. All the above
B. It is used to select data from a
database 220. Which of the following statements are in-
valid?
C. It is used to select a website
A. Statement 1:A relation can have multi-
D. It is not a SQL statement
ple candidate keys
215. Where does the CREATE Command be- B. Statement 2:A relation can have multi-
long? ple primary keys
A. DML C. Statement 3:A relation can have multi-
B. DDL ple columns with Unique constraint
C. DCL D. none of above
D. none of above
221. The SQL statement “SELECT CHAR
216. The number of rows in a relation LENGTH(’John’);” will return,
A. degree A. 1
B. tuple B. 2
C. cardinality C. 3
D. domain D. 4
217. What kind of language is SQL? 222. The result of a SQL SELECT statement is
A. Functional a(n) .
B. Object oriented A. report
C. Declarative B. form
D. Procedural C. file
218. What is a flat file database? D. table
A. A database that’s squashed like a pan-
223. Which of the following is used to a list of
cake
values?
B. A database with only 1 table
A. IN
C. A database that doesn’t contain much
B. IS
data
D. A database with multiple tables that C. LIKE
are linked together D. BETWEEN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 294

224. What language does the Relational 229. Extract, Transform, Load (ETL) process,
Model use? which can be implemented by the using
which tool. Choose the correct answer
A. Java
A. ETL tool
B. Python
B. TLE tool
C. SQL
C. LTE tool
D. C++
D. none of above

NARAYAN CHANGDER
225. Advantage of 3NF?
230. What does UNION operator do in a SQL
A. It eliminates redundant data which in statement?
turn saves space and reduces manipula-
A. Bring all distinct from the listed tables
tion anomalies.
B. It gives the data status.
B. Bring all data from the listed tables
C. It allows the tables to be queried in C. Bring data which is not common from
SQL. the listed tables
D. It prevents any new updates. D. Bring common data from the listed ta-
bles
226. The correct order of keywords in an UP-
DATE SQL statement is? 231. In a column named “age”, containing val-
A. UPDATE, SET, WHERE ues 4, 5, 6, the SQL statement “SELECT
SUM(age) FROM students;” will return,
B. UPDATE, WHERE, SET
A. 3
C. SET, WHERE, UPDATE
B. 15
D. WHERE, UPDATE, SET
C. 0
227. The Operation allows the combining D. 1
of two relations by merging pairs of tuples.
One form each relation into a single tuple. 232. Which of the following is the most impor-
tant feature of DBMS:
A. Select
A. Command language like SQL
B. Intersection
B. Ability to back up data
C. Union
C. Ease of use
D. Join
D. Ability to automate some tasks
228. What is def in the following statement? 233. In the keyword WHERE of the Select
CREATE TRIGGER abc ( )( ) ON def which operators can be used?
FOR EACH ROW ghi;
A. AND, OR, NOT
A. trigger name
B. Relational operators
B. table name
C. AND, OR, NOT and relational operators
C. trigger statement
D. none of above D. NONE

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 295

234. Which would show all fields from the connection.cursor()cursor.execute(”SELECT


Pupils table? * FROM People”)results = cur-
sor.fetchall()

PRACTICE BOOK» NOT FOR SALE


A. SELECT * FROM Pupils
B. SELECT Name, Form FROM Pupils A. QuerySet
C. SELECT * FROM * B. tuple
D. SELECT * FROM Forms C. list
D. dict
235. Which operator is used to search for a
specified pattern in a column? 240. The operation performs a set union of
A. FROM two “Similary Structured” tables
B. LIKE A. Intersect
C. GET B. Product
D. Such as C. Union
236. Which term is used to find the first value D. Join
in a set of data?
241. What will be the output? SELECT TRUN-
A. BEGIN AMT CATE(36.5643, 2);
B. START VALUE
A. 36.56
C. START AMT
B. 36.57
D. FIRST VALUE
C. 36.5643
237. A relational database accesses informa- D. 36
tion from one or more
A. Spreadsheets 242. Which description is correct for a query?
B. Collections A. Used to print information from the
database
C. Matrices
B. A method of searching the database
D. Tables
for specific information
238. Which of the following is the original pur- C. A place where all records are stored
pose of SQL?
D. All the information about one person
A. To specify the syntax and semantics of or item
SQL data definition language
B. To specify the syntax and semantics of 243. If a user query tries to access the page af-
SQL manipulation language ter the restore starts, they will see error
829, which indicates the page is in which
C. To define the data structures state
D. All of the above.
A. Page restored.
239. What is the type of the results B. Page restoring
variable in the following code snip-
C. Page retrieved.
pet? import sqlite3connection =
sqlite3.connection(”people.db”)cursor = D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 296

244. A relational database consists of a collec- C. ARRANGE BY


tion of D. None of the above
A. tables
250. The UPDATE SQL clause can
B. fields
A. update only one row at a time
C. records
B. update more than one row at a time
D. keys C. delete more than one row at a time
245. In a relational database a relationship be-

NARAYAN CHANGDER
D. delete only one row at a time
tween entities is implemented by storing
the primary key of one entity as a pointer 251. How would you DELETE records from the
or in the table of another entity. Items table with a “Chair” Type?
A. DELETE ‘Chair’ FROM Items
A. primary key
B. DELETE Type FROM Items WHERE
B. foreign key
Type = ‘Chair’
C. unique key
C. DELETE FROM Items WHERE Type =
D. not null key ‘Chair’
246. Most likely at your future job you will D. DELETE ITEMS WHERE Type = ‘Chair’
need to ? 252. Which of the following is/are NOT Azure
A. Extract data from a database Core Storage?
B. Design a database A. Azure Queues
C. Manage a database B. Azure HPC Cache
D. none of above C. Azure Disks
D. Azure Files
247. Which SQL statement is used to delete
data from a database? 253. How is a Primary key attribute shown?
A. REMOVE A. Underlined
B. COLLAPSE B. Ellipses
C. DELETE C. Double lined Ellipses
D. DROP D. a Line

248. To remove a record from a table which 254. A row in a database.


SQL statement would you use? A. Record
A. Remove B. Field
B. Cancel C. Entity
C. Delete D. Table
D. Eradicate 255. What does “SQL” stand for?
249. Which clause is used to sort the result of A. Structured Question Language
SELECT statement? B. Structured Query Language
A. SORT BY C. Simple Query Language
B. ORDER BY D. Simple Question Language

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 297

256. Which of the following is NOT an exam- 261. What is the result of the following
ple of Data Manipulation Language? code:SELECT top 10 * FROM CARS

PRACTICE BOOK» NOT FOR SALE


A. SELECT A. all rows from the CARS table
B. INSERT B. the last 10 rows from the CARS table
C. UPDATE C. error because the code is not suffi-
cient
D. CREATE
D. the first 10 rows from the CARS table
257. Which of the following represents the
data in a tree-like structure in which there 262. It is a DML command that is used to dis-
is a single parent for each record? play record.

A. A Relational Database A. DISPLAY

B. Hierarchical Database B. STRUCTURE

C. Network Database C. WHERE

D. Object Oriented Database D. SELECT

263. Which of the following database is used


258. Which is the statement which is not cor-
by SQL Server Agent?
rect about Foreign Key?
A. Pubs
A. It is a primary key of another table
B. Master
B. The description of the column should
be same C. Tempdb
C. There can be multiple foreign keys in a D. Model
table
264. Consider the below emp table with
D. It supports null values the data.EMPNO ENAME DEPTNO7369
SMITH 207499 ALLEN 307654 MARTIN
259. defines rules regarding the values al- 307839 KING 107900 ALLEN 30SELECT
lowed in columns and is the standard mech- EName FROM Emp WHERE DeptNo =
anism for enforcing database integrity. MAX(DeptNo);
A. Column A. Error
B. Constraint B. 3 rows
C. Index C. 2 rows
D. Trigger D. 1 row

260. Which is an example of Data Manipula- 265. Which SQL keyword is used to sort the
tion Language (DML) command? result-set?
A. CREATE A. ORDER
B. INSERT B. SORT BY
C. ALTER C. ORDER BY
D. DROP D. SORT

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 298

266. As soon as Bob heard his boss coming, he C. filtered by, foreign key
jumped his chair and pretended he was
D. aggregate function, where clause
working
A. inside 272. What is the purpose of SQL?
B. under A. To communicate with a game
C. down B. To communicate with aliens
D. for
C. To communicate with a database

NARAYAN CHANGDER
267. NULL is D. To communicate with a base
A. no value
B. zero 273. Which SQL keyword is used to retrieve a
maximum value?
C. spaces
A. MOST
D. none of above
B. TOP
268. select RIGHT(”Informatics Practices”,
5);will return C. MAX

A. secit D. UPPER
B. scita
274. hich of the following statements about
C. tices the MAX function in SQL are true?
D. none of above A. Can be used on any datatype.
269. You can use SSMS to create jobs or you B. Returns the max value of the attribute.
can execute which system stored proce-
dure. Choose one
C. It is an aggregate function.
A. sp add job
D. All of the above statements are true.
B. sp execute job
C. sp run job 275. Using which word allows you to spec-
D. none of above ify that only one of a series of conditions
needs to be met in a query filter?
270. Match the following SQL term with a A. And
description-SELECT
B. Maybe
A. The fields to display
B. The table used in the query C. If
C. The criteria which must be met D. Or
D. The field and order used to sort the re-
276. delete * from employee;
sults
A. Deletes all tuples.
271. To join a table, connect the of one ta-
ble to the of the other. B. updates the table emp with null.
A. primary key, foreign key C. Destroys the table.
B. group by clause, primary key D. select all the record

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 299

277. What is Pseudo code? C. Third normal form!


A. A simple way of describing a set of in- D. Data!

PRACTICE BOOK» NOT FOR SALE


structions that does not have to use spe-
cific syntax of a programming language 283. It is much more expensive, harder to set
up and requires more reliance on IT to use
B. A programming language a ?
C. A way of coding a program A. Database
D. none of above
B. Spreadsheet
278. Which of following SQL Wildcard repre- C. Word Processor
sents a single character in SQL Server?
D. none of above
A. #
284. What is wrong with the following
B. $
code:SELECT * FROM movies WHERE genre
C. [ ] = comedy AND year < 2016 ORDER BY
D. year DESC;
A. Comedy should have single quotes
279. Which one of the following is an Aggre- around it
gate Functions?
B. AND should be lower case
A. COUNT()
C. movies should be capitalized
B. LEN()
D. No changes should be made
C. CASE()
D. NOW() 285. SQL data definition commands make up
a(n) .
280. removes all rows from a table with-
A. DDL
out logging the individual row deletions.
B. DML
A. DELETE
C. HTML
B. REMOVE
D. XML
C. DROP
D. TRUNCATE 286. The AVG SQL function returns the
A. the sum of values in a column
281. To find the total dollar value of sales, use
which? B. average in the values in agroup.
A. SUM C. maximum value from a column.
B. COUNT D. none of above
C. MAX 287. You can add a row using SQL in a
D. MIN database with which of the following?

282. Which one of these do you want to avoid A. ADD


in good database design? B. CREATE
A. Redundancy! C. INSERT
B. Giant squid! D. MAKE

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 300

288. Which SQL statement is used to update B. 128


data in a database? C. 256
A. SAVE D. none of above
B. MODIFY
294. What does Normalisation allow a
C. UPDATE database designer to do?
D. SAVE AS A. Design their database efficiently, re-
moving the chance of redundancy and in-

NARAYAN CHANGDER
289. standard date format of oracle sql
accuracies.
A. YY-MON-DD
B. Remove additional records from the ta-
B. DD-MON-YY bles.
C. DD-MM-YYYY C. Add as much data as they like.
D. DD/MM/YYYY D. Draw an ERD.
290. To identify potentially corrupt pages, you 295. Match SQL language with SQL com-
can use the following command, Choose mands1)DDL i)Revok, Grant2)DML
one ii)rename a table3)TCL iii)insert, up-
A. DBCC CHECKDB date4)DCL iv)rollback, commit
B. DB0 CHECKDB A. 1-iii, 2-i, 3-ii, 4-iv
C. DB-OWNER CHECKDB B. 1-iii, 2-ii, 3-iv, 4-i
D. none of above C. 1-ii, 2-iii, 3-iv, 4-i

291. level describes what data is stored in D. 1-i, 2-iii, 3-ii, 4-iv
the database and the relationships among 296. Consider the below emp table with
the data. the data.EMPNO ENAME DEPTNO7369
A. Physical SMITH 207499 ALLEN 307654 MARTIN
B. Logical 307839 KING 107900 ALLEN 30What is
the output of the following query? SELECT
C. Conceptual ename FROM emp WHERE ename = (SE-
D. None of the Above LECT MIN(ename) FROM emp);

292. If two dice are thrown together, then the A. ename ALLEN
probability of getting an even number on B. ALLEN
one die and an odd number on other die is C. Error
A. 1/4 D. none of above
B. 1/2
297. Which of the following query finds em-
C. 3/4 ployees with an experience more than 5?
D. 3/5 A. Select * From DataFlair where experi-
293. A single backup can target more than one ence>5;
backup device. Up to how many devices. B. Select * From DataFlair;
Choose the correct answer. C. Select * From DataFlair where experi-
A. 64 ence>=5;

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 301

D. Select * From DataFlair where experi- A. surname = “Khan”


ence<=5; B. WHERE surname = “Khan”

PRACTICE BOOK» NOT FOR SALE


298. What is the correct definition of a Pri- C. AND surname = “Khan”
mary Key? D. WHEN surname = “Khan”
A. Uniquely identifies any record in a ta- 304. With SQL, how can you insert “Olsen” as
ble the “LastName” in the “Persons” table?
B. It is always a number A. INSERT (’Olsen’) INTO Persons (Last-
C. It is always the first number Name)
D. Uniquely identifies any field in a table B. INSERT INTO Persons (’Olsen’) INTO
LastName
299. What is an entity?
C. INSERT INTO Persons (LastName)
A. Characteristics VALUES (’Olsen’)
B. Real world object D. none of above
C. Responsibility 305. Which packages contain the JDBC
D. Relation classes?
A. java.jdbc and javax.jdbc
300. Multiple conditions can be provided
through B. java.jdbc and java.jdbc.sql

A. AND C. java.sql and javax.sql


D. java.rdb and javax.rdb
B. OR
C. BOTH AND AND OR 306. To be in 2NF:
D. None of the above A. Each non-key field relates to the pri-
mary key
301. what is the word used to retrieve data B. There are multiple entries in the same
from tables. field
A. From C. There are no foreign keys
B. * D. All numbers are in decimal form
C. SELECT 307. Which operator allows you to specify
D. none of above multiple values in a WHILE clause?
A. SELECT
302. The class java.sql.Timestamp has its su-
per class as B. FROM
A. java.sql.Time C. IN
B. java.util.Date D. SELECT DISTINCT

C. java.util.Time 308. What is the purpose of *?


D. None of the above A. Selects ALL fields from the table
B. Selects only the first field in the table
303. Complete the following SQL query to find
all records for surname = “Khan”:SELECT C. Selects the last field in the table
* FROM Customers D. Shows only the first row in the table

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 302

309. Which of the following is not a Clause in C. Spreadsheets


SQL?
D. IT Developers
A. Below
B. Limit 315. It is a command from DML that is used to
remove an existing record.
C. Where
A. DROP
D. Group By
B. DELETE
310. What is the commands that define

NARAYAN CHANGDER
a database, including creating, altering, C. ERASE
and dropping tables and establishing con- D. EDIT
straints
A. DCL 316. The MIN() function returns in the
given column.
B. DDL
A. the largest value
C. DML
B. the last value
D. SQL
C. the total sum value
311. Which word is missing from the following
SQL statement? Select * table name D. the smallest value
A. With 317. monthname(2020/04/07) will return
B. Where the value
C. From A. 4
D. And B. 7
312. Find all the cities whose humidity is 89 C. April
A. SELECT city WHERE humidity = 89; D. none of above
B. SELECT city FROM weather WHERE hu-
midity = 89; 318. Which of the following is not a part of
CRUD operations in SQL?
C. SELECT humidity = 89 FROM weather;
A. Creating a table.
D. SELECT city FROM weather B. Deleting records from the table.
C. Creating a copy of a table.
313. Less redundancy & errors occur in a
? D. Updating the data stored in the table.
A. Spreadsheet
319. If you did not include a WHERE clause in
B. Word Processor your UPDATE table command, what will
C. Database happen to the records?
D. Slideshow A. All records will be updated.

314. SQL is language of ? B. Only specific record will be updated.


A. Programmers C. None of the records will be updated.
B. Databases D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 303

320. select INSTR(”stay home, stay safe”, C. > 50


“sta”) will return the position
D. # 50

PRACTICE BOOK» NOT FOR SALE


A. 0
B. 1 326. Full form of SQL

C. 11 A. Structure Query Language


D. none of above B. Structured Query Language

321. The table returned by the sys.fn get C. Structured Querying Language
audit file function returns how D. Structural Query Language
many columns. Choose the correct answer
A. 10 327. What is the full form of SQL?

B. 20 A. Structured Query Language


C. 30 B. Structured Question Language
D. none of above C. Structural Query Language

322. Fill in with the correct past partici- D. Structuring Query Language
ple.Perhaps she would have been by
that dog if its owner hadn’t been faster 328. Which of the following clause allows us
and caught him right on time. to extract data in a range?

A. bit A. Between
B. bite B. Range
C. bitten C. Find In
D. bitted D. Like
323. Which of the following is not a data type 329. The backups on an individual device
in SQL? within a media set are referred to
A. int as:Choose the correct answer
B. Varchar A. a media family
C. Image B. a backup family
D. blob C. a backup set
324. A row in a database table is called a D. none of above
A. Field
330. Present ages of John and Dina are in the
B. Record ratio 5:4 respectively.Three years hence,
C. Column the ratio of their ages will become 11:9 re-
spectively. What is Dina’s age in years?
D. Entity
A. 24
325. Which symbol would you use to repre-
sent more than 50 B. 27
A. = 50 C. 40
B. < 50 D. Cannot be determined

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 304

331. Match the following SQL term with a 336. What will be the output of the
description-FROM query:Select Substring(’mysql applica-
tion’, 3, 3)
A. The criteria which must be met
A. app
B. The fields to display
B. mysql
C. The field and order used to sort the re-
sults C. application

D. The table used in the query D. sql

NARAYAN CHANGDER
337. The average value of the given numeric
332. Which of the following is not a DBMS de-
column is calculated by using function.
spite having database capabilities:
A. GETAVG()
A. Microsoft Excel or similar spread-
sheets B. FINDAVG()

B. Oracle C. AVG()
D. AVGVALUE()
C. MySQL
D. Microsoft Access or similar 338. In a table, a record is
A. a group of data about one thing, one
333. Which database is used as template for person or one event.
all databases?
B. a compilation of songs to play
A. Northwind
C. a plastic sheet with data on it
B. Master
D. none of above
C. Tempdb
339. Which of the following is not a system
D. Model database?
334. By default, SQL Server retains backups A. Northwind
of many previous logs. Choose the correct B. Master
answer.
C. Tempdb
A. 3
D. All of the mentioned
B. 6
340. Which command is used to view the struc-
C. 9 ture of the table?
D. 12 A. SELECT * FROM <tableName>;

335. Which method for ranking records re- B. DESC <tableName>;


peats a ranking when there is a tie and C. CREATE TABLE
may have a result set that is not consecu- D. ALTER TABLE
tive?
341. Using which word allows you to specify
A. RANK()
that more than one condition must be met
B. ROW NUMBER() in a query?
C. DENSE RANK() A. Also
D. NTILE() B. And

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 305

C. Or C. SELECT city, temperature FROM


D. Where weather ORDER BY temperature

PRACTICE BOOK» NOT FOR SALE


D. SELECT city, temperature FROM
342. Insert the missing number.8, 7, 11, 12, weather ORDER BY city
14, 17, 17, 22, ( )
A. 27 347. Boolean Data is?
B. 20 A. True or False
C. 22 B. Numbers
D. 24 C. Letters
D. Special Characters
343. Independent sub query is the one where
A. the inner and the outer query are from 348. Which SQL statement is used to create a
two different tables table in a database?
B. the inner query has no reference to the A. CREATE TABLE
outer query
B. CREATE DATABASE TAB
C. the inner and outer queries are for the
C. CREATE DB
same table but with different condition
D. CREATE DATABASE TABLE
D. none of above

344. SQL has how many main commands for 349. A train 240 metres long passes a pole in
DDL: 24 seconds. How long will it take to pass
a platform 650 m long?
A. 1
A. 65 sec
B. 2
B. 89 sec
C. 3
C. 100 sec
D. 4
D. 150 sec
345. Which of the following can be imple-
mented? 350. Trigger is invoked before/after data row
is:
A. Conjunctive selection using one index
A. deleted
B. Conjunctive selection using composite
index B. updated
C. Conjunctive selection by intersection C. inserted
of identifiers D. all answers are correct
D. All of the mentioned
351. Which is the database created in our pre-
346. SQL query to find the temperature in in- sentation?
creasing order of all cities.
A. Hindi
A. SELECT city FROM weather ORDER BY
B. Movie
temperature
B. SELECT city, temperature FROM C. Shahrukh Khan
weather D. Aamir khan

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 306

352. The primarykey attributes are required C. SELECT ALL FROM employees;
to be and D. none of above
A. not null and repeated values
358. The sum of present ages of 2 persons A
B. null and unique values and B is 60.If the age of A is twice that
C. not null and unique values of B, Find the sum of their ages 5 years
hence.
D. none of above
A. 50

NARAYAN CHANGDER
353. When examining a column in a table, we B. 60
refer to it as a
C. 70
A. field name D. 80
B. folder name
359. What is the correct definition of a Field?
C. column number
A. Uniquely identifies any record in a ta-
D. table name ble
354. What does the len() function do? B. It is always a number

A. Gets the length of a string or list C. Used to store all of the data about each
specific item
B. Gets the character code for a charac-
D. Used to store a category (e.g. Names
ter
/ Gender / Mobile Num)
C. Converts a character into a character
code 360. Which is the subset of SQL commands
used to manipulate Oracle Database struc-
D. Would you like a muffin? tures, including tables?
355. In Relational Database Model, a table is A. Data Definition Language(DDL)
also referred to as a B. Data Manipulation Language(DML)
A. tuple C. Both a and b
B. attribute D. None
C. relation 361. The result of a SQL SELECT statement is
D. degree a
A. file
356. What is the name of the SQL database
the comes distributed with Python? B. report

A. SQLite C. table
D. form
B. PySQL
C. MySQL 362. With SQL, how do you select a column
named “FirstName” from a table named
D. PostgreSQL “Persons”?
357. Which of the following will display all the A. EXTRACT FirstName FROM Persons
records in EMPLOYEES table? B. SELECT Persons.FirstName
A. SELECT salary FROM employees; C. SELECT FirstName FROM Persons
B. SELECT * FROM employees; D. SELECT * FROM Persons

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 307

363. SELECT MAX(price)FROM PRODUCTwill 368. Which of the following is NOT a compo-
return how many rows? nent of a Database?

PRACTICE BOOK» NOT FOR SALE


A. 1 A. Field
B. 0 B. Block
C. 2 C. Table
D. As many rows that are in the table D. Record

364. In relational data model, the total num- 369. Match the following SQL term with a
ber of rows can be identified as . description-ORDER BY
A. Cardinality A. The fields to display
B. Degree B. The field and order used to sort the re-
sults
C. Attribute
C. The table used in the query
D. Entity
D. The criteria that must be met
365. Which word is missing from the follow-
ing SQL statement? Select * from table 370. The SQL WHERE clause:
name where <condition> Having <con-
A. limits the column data that are re-
dition>
turned.
A. With
B. limits the row data are returned.
B. Order by
C. Both A and B are correct.
C. Group by
D. Neither A nor B are correct.
D. IN
371. Which of the following is NOT a type of
366. Which of the following is true about the SQL constraint?
RDBMS?
A. PRIMARY KEY
A. RDBMS stands for the Relational
B. ALTERNATE KEY
Database Management System.
C. FOREIGN KEY
B. RDBMS is mandatory to use to create
a database. D. UNIQUE
C. Both a and b. 372. Which of the below queries results have
D. None of these. only 10 rows being shown in the result
displayed?
367. How do you display the number of
A. SELECT * FROM DataFlair;
rows?
B. SELECT name, emp id FROM
A. ASC
DataFlair Display 10;
B. FILTER
C. Select name, location from DataFlair
C. COUNT LIMIT 10;
D. SELECT D. Select Count(name) FROM DataFlair;

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 308

373. What earth is HR from? 379. Which type of Statement can execute pa-
A. Earth 1 rameterized queries?

B. Earth 38 A. PreparedStatement

C. Earth 3 B. ParameterizedStatement
D. Earth 19 C. ParameterizedStatement and
CallableStatement
374. What type of data is stored as REAL?
D. All kinds of Statements (i.e. which im-

NARAYAN CHANGDER
A. Whole numbers plement a sub interface of Statement)
B. Decimal numbers
380. SQL means
C. Strings
A. Sequential Query Language
D. Yes / No True / False
B. Structured Query Language
375. Database tables store data about real C. Structured Query Language
world things called
D. Structured Query Language
A. Entities
B. Tables 381. Which operator selects values within a
given range?
C. Records
A. AND
D. Fields
B. LIKE
376. A and B can complete a work in 6 days.A C. SELECT
can alone do it in 10 days.Then B can alone
do the work in how many days? D. BETWEEN
A. 13.75 days 382. What does DROP means?
B. 14 days A. rearrange
C. 15 days B. delete
D. 16 days C. sort
377. In the ER model, what denotes a Relation- D. filter
ship between the entities?
383. Learning SQL is like learning ?
A. Double ellipse.
A. mathematics
B. Diamond
B. geography
C. Rectangle.
C. biology
D. Circle
D. a foreign language
378. With SQL, how do you select all the
columns from a table named “Persons”? 384. What does * mean when writing code?
A. SELECT Persons A. Select all columns
B. SELECT [all] FROM Persons B. Select all rows
C. SELECT * FROM Persons C. Select all genres
D. SELECT *.Persons D. Select jaskfjfjfjsfjiosjisjfjsfjsfjkjsk

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 309

385. What represents no value? B. Primary Key


A. NULL C. Foreign Key

PRACTICE BOOK» NOT FOR SALE


B. ” “ D. none of above
C. 0
391. Write the code for the following:Return
D. N/A all movies with the word love.
386. Which of the following is not a DDL com- A. SELECT * FROM movies WHERE name
mand? LIKE %love%;
A. UPDATE B. SELECT * FROM movies WHERE name
LIKE ‘love’;
B. TRUNCATE
C. SELECT * FROM movies WHERE name
C. ALTER
LIKE %love;
D. None of the Mentioned
D. SELECT * FROM movies WHERE name
387. How would we script a SQL query to se- LIKE ‘%love%’;
lect “Description” from the Item table?
392. If 5 tables are joined, what is the mini-
A. SELECT Item.Description mum number of join conditions needed in
B. EXTRACT Description FROM Item order to avoid Cartesian Product?
C. SELECT Item FROM Description A. 3
D. SELECT Description FROM Item B. 4

388. Which of following SQL Wildcard repre- C. 5


sents a single numeric character in MS Ac- D. 6
cess?
393. A single backup is called a backup set, and
A. * is written to a media set, which can con-
B. tain up to how many backup devices
C. # A. 32
D. & B. 64
389. Which of the term is used to describe C. 128
fields in a database? D. none of above
A. Information
394. In the given query which of the keyword
B. Rows has to be inserted? INSERT INTO em-
C. Properties ployee (1002, Joey, 2000);
D. Entity A. Table
B. Values
390. The specification says that the values
of attributes (Ak1, Ak2, . . ., Akn ) for C. Relation
any tuple in the relation must correspond D. Field
to values of the primary key attributes of
some tuple in relation s. 395. select name from students;
A. Super Key A. Will give you all information

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 310

B. Will give you last name information 401. In this type of database model, the
C. Will give you Name information schema, is represented using nodes and re-
lationship types and is not restricted to be-
D. none of above ing a hierarchy or lattice
396. DBMS allows a user to do all of these A. Relational Database
tasks except:
B. Hierarchical Database
A. Speed up the operation of a computer
C. Network Database

NARAYAN CHANGDER
B. Create a blank database table
D. Object Oriented Database
C. Extract a data set from a number of ta-
bles
402. Complete the solution:Select * ‘table
D. Produce reports that combine and name
summarise the data.
A. from,
397. Which is the subset of SQL commands
B. , from
used to manipulate database structures in-
cluding tables C. from ;
A. DML D. ; from
B. DDL
403. The SQL command to choose which tables
C. Both of the above
the data for the query will be taken from
D. None
A. SELECT
398. What type of data is stored as Boolean?
B. WHERE
A. Whole numbers
C. FROM
B. Decimal numbers
D. SHOW
C. Strings
D. Yes / No True / False 404. If you were wanting to filter data, which
clause would you use?
399. Which character returns all the data
found in a table? A. Where
A. % B. Order by
B. # C. From
C. * D. Select
D. /
405. What is the correct order of clauses in a
400. Which of the following query would limit SQL statement?
the output to 5 rows?
A. SELECT, FROM, ORDER BY, WHERE
A. SELECT * FROM DF 5;
B. SELECT * FROM DF LIMIT 5; B. SELECT, FROM, WHERE, ORDER BY

C. SELECT * FROM DF 5 LIMIT; C. SELECT, WHERE, FROM, ORDER BY


D. SELECT LIMIT(5) * FROM DF ; D. WHERE, FROM, SELECT, ORDER BY

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 311

406. SELECT * FROM employee WHERE C. Null value just means that data of that
salary>10000 AND dept id=101;Which attribute is not available.
of the following fields are displayed as

PRACTICE BOOK» NOT FOR SALE


D. None of these.
output?
A. Salary, dept id 412. What does follow after the SQL SELECT
clause?
B. Employee
A. List of columns that will be selected or
C. Salary the * symbol.
D. All the field of employee relation B. The JOIN SQL clause.
407. To be in 3NF: C. The name of the table we are selecting
A. Records do not depend on anything from.
other than the table’s PK D. none of above
B. The PK is not added 413. Which of the following SQL commands
C. The FKs are limited to one only can be used to add data to a database ta-
D. The tables all relate to one another ble?
A. ADD
408. What is the purpose of the UPDATE com-
mand in SQL? B. UPDATE

A. To edit a table name C. APPEND

B. To change the name of a field D. INSERT

C. To change the contents of records in a 414. In a scenario where you need your Azure
table Database for the PostgreSQL server which
D. To change the structure of a table is deployed on PREMISE, to have high per-
formance on multiple regions, what de-
409. What is the most common type of join? ployment mode would you choose?
A. INSIDE JOIN A. Hypervisor
B. JOINED TABLE B. Hyperscale
C. INNER JOIN C. RDS
D. JOINED D. Flexible Server

410. Which is not an aggregate function? 415. The primary key must be
A. SUM() A. Unique
B. POW() B. Not null
C. AVG() C. Both Unique and Not nul
D. COUNT() D. Either Unique or Not null

411. Which of the following is true about NULL 416. Which system view provides catalog
values in SQL? information about existing credentials.
A. A NULL value means zero. Choose the correct answer.

B. A null value can only be used with nu- A. The admin.credentials


meric attributes. B. The sys.credentials

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 312

C. The Gglobal.credentials 422. Pointing to a girl in a photograph, Arun


D. none of above said “Her mother’s brother is the only son
of my mother’s father”.How is the girl’s
417. Which would find pupils with “er” any- mother related to Arun?
where in their name?
A. Mother
A. SELECT * FROM Pupils Where Name =
“%er” B. Sister
B. SELECT * FROM Pupils Where Name = C. Aunt

NARAYAN CHANGDER
“$er$” D. Grandma
C. SELECT * FROM Pupils Where Name =
“%er%” 423. In order to modify data in a database we
D. SELECT * FROM Pupils Where Name = would use which SQL statement?
“er%” A. Update
418. Below are the procedural SQL that can B. Amend
be used to enhance the power of SQL, EX-
CEPT: C. Alter

A. Triggers D. Modify
B. Stored procedures
424. Which of the following operator is used
C. Function to extract pattern matching data from the
D. View database?

419. What word is missing from the line be- A. LIKE


low? SELECT * CUSTOMER; B. SELECT
A. FROM C. FIND
B. WHERE
D. UPDATE
C. SELECT
D. ORDER BY 425. What is the unit digit in the product 365 ∗
659 ∗ 771 ?
420. The SQL statementSELECT ROUND(45.926,
-1) FROM DUAL; A. 1
A. is illegal B. 2
B. prints garbage C. 4
C. prints 045.926 D. 6
D. prints 50
426. Databases are made up of one or more
421. Which of the following is not a database
data type?
A. Tables
A. text
B. number B. Files

C. array C. File types


D. date D. Spreadsheets

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 313

427. The SQL statement that queries or reads C. SELECT Username, Password WHERE
data from a table is . Username = ‘user1’

PRACTICE BOOK» NOT FOR SALE


A. SELECT D. None of the Mentioned
B. READ
433. The total number of tuples in a relation is
C. QUERY referred to as
D. None of the above is correct. A. Cardinality of the relation
428. A primary key of one table is known as B. Degree of the relation
a key in other tables: C. Cartesian product
A. foreign D. None of the above
B. unknown
434. What will be the output? SELECT
C. related ROUND(36.7894, 2)
D. unique
A. 36.78
429. The command to eliminate a table from a B. 38.79
database is:
C. 36.7
A. REMOVE TABLE CUSTOMER;
D. 36
B. DROP TABLE CUSTOMER;
C. DELETE TABLE CUSTOMER; 435. Which of the following is the correct or-
der of keywords for SQL SELECT state-
D. UPDATE TABLE CUSTOMER; ments?
430. Which of the following holds temporary A. SELECT, FROM, WHERE
data? B. FROM, WHERE, SELECT
A. Northwind
C. WHERE, FROM, SELECT
B. Master
D. SELECT, WHERE, FROM
C. Tempdb
436. Which one of the following sorts rows in
D. Msdb
SQL?
431. Which of the following is not a window A. SORT BY
function?
B. ALIGN BY
A. MIN()
C. ORDER BY
B. AVG()
D. GROUP BY
C. DIFF()
D. COUNT() 437. A database
A. Stores data
432. Which of the SQL statements is correct?
B. Stores data in a organised structure
A. SELECT Username AND Password
FROM Users C. Stores a variety of data on a particular
B. SELECT Username, Password FROM subject
Users D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 314

438. If a:b=7:5 and b:c=9:11.Find a:b:c. B. select, where, having, group byselect,
A. 63:14:55 having, where, group by

B. 63:45:55 C. select, having, where, group by

C. 14:14:15 D. select, where, group by, having


D. 7:14:15 444. How do you fix an ambiguous error in
your SQL statement?
439. What is the output of the following code?
A. Use long form of field name

NARAYAN CHANGDER
DECLARE x number:= 4; BEGIN LOOP dbms
output.put line(x); x:= x + 1; exit B. Remove that field name from the query
WHEN x > 5; END LOOP; dbms out-
put.put line(x);END;
C. Require unique fieldnames for all
A. 456
D. No such thing as ambiguous error
B. 45
445. Which is an example of Data Definition
C. 4
Language (DDL) command?
D. None of the above
A. INSERT
440. The command is used to modify B. DELETE
columns in a table
C. CREATE
A. DROP
D. UPDATE
B. INSERT
C. ALTER 446. The SUM() function returns
D. CREATE A. some random values from the given
column
441. Which command is used to select only one
B. the total number of columns in the
copy of each set of duplicate rows.
database
A. Select distinct
C. the total number of tables in the given
B. Select Unique databases
C. Select different D. the total sum of a given numeric col-
D. All of the above umn

442. What is a ‘tuple’? 447. Which of the following is not a com-


ponent of the SQL Server Audit architec-
A. A row or record in a database table
ture?
B. Another name for the key linking differ-
A. Target
ent tables in a database.
B. Target Group
C. An attribute attached to a record.
C. Server Audit
D. Another name for a table in an RDBMS.
D. none of above
443. Which of the following is the correct or-
der of occurrence in a typical SQL state- 448. Which of the following are the five built-
ment? in functions provided by SQL?
A. select, group by, where, having A. COUNT, SUM, AVG, MAX, MIN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 315

B. SUM, AVG, MIN, MAX, MULT 454. A relational algebra operation annotated
C. SUM, AVG, MULT, DIV, MIN with instructions on how to evaluate it is
called

PRACTICE BOOK» NOT FOR SALE


D. SUM, AVG, MIN, MAX, NAME
A. Evaluation algebra
449. Is a database object that lets you ask
the database about the information that B. Evaluation plan
you want to see displayed. C. Evaluation primitive
A. Form
D. Evaluation engine
B. Query
C. Report 455. Which of the following SQL clauses is
used to DELETE tuples from a database ta-
D. Table
ble?
450. Which of the following options is not A. DELETE
a method for numbering or ranking
records? B. REMOVE
A. NUMBER() C. DROP
B. RANK() D. CLEAR
C. ROW NUMBER()
D. DENSE RANK() 456. In a certain code ‘ROAR’ is written as
‘URDU’.How is ‘URDU’ written in that
451. PowerShell scripts are saved with which code?
extension
A. VXDQ
A. .ps1
B. XUGX
B. .sql
C. ROAR
C. .cmd
D. none of above D. VSOV

452. The operation, denoted by-, allows 457. What is the correct answer?
us to find tuples that are in one relation
but are not in another. A. Select * from “Database”

A. Union B. Select * from “Name table”;


B. Set-difference C. SELECT * from “Name table”
C. Difference D. Select * from “name Database”;
D. Intersection
458. The is used for creating and destroy-
453. In how many ways can a group of 5 men ing tables, indexes, and other forms of
and 2 women be made out of a total of 7 structures
men and 3 women?
A. data manipulation language.
A. 63
B. 90 B. data control language.

C. 126 C. transaction control language.


D. 45 D. Data Definition Language.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 316

459. constraint prevents NULL values C. FIRSTNAME


A. UNIQUE D. firstname
B. NOT NULL
465. Pick the date format MySQL uses
C. NULL
A. DD-MM-YYYY
D. FOREIGN KEY
B. YY-MM-DD
460. A table can have
C. YYYY-MM-DD

NARAYAN CHANGDER
A. One primary key and more than one
D. none of above
candidate key
B. One candidate key and one primary key 466. Which of these is not an advantage of us-
ing an electronic database?
C. More than one primary, alternate keys A. Faster to find information
B. Easy to move information-portable
D. One candidate key only.
C. Could be hacked
461. An SQL command used to add record in a D. Can keep a back-up copy
table.
A. Insert 467. A is an organized collection of struc-
tured data.
B. Create
A. information
C. Update
D. Add B. file
C. database
462. After you create the job, SQL Server
stores the job definition in which database, D. DBMS
choose one
468. What is a candidate key in MySQL?
A. the sqldb
A. Used to identify a column
B. the msdb
B. Alias for foreign key
C. the dbo
C. Alias for primary key
D. the master db
D. Used to uniquely identify a row
463. A database entity is also known as:
A. a table 469. You want to run a MySQL database in
an IaaS environment in which you’ll cre-
B. a field
ate new instances as quickly as possible.
C. a row Should you use virtual machines or contain-
D. a report ers?
A. Use containers.
464. Which example of the field name below
is in camel case? B. Use virtual machines.
A. First Name C. Use either.
B. firstName D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 317

470. SQL multiplication operator 475. A column in a database


A. * A. record

PRACTICE BOOK» NOT FOR SALE


B. # B. row
C. () C. field

D. @ D. data

476. A column in a database table is called a


471. Which word allows you to add more than
one filter to a SQL query?
A. Field
A. AND
B. Row
B. BETWEEN
C. Record
C. LIKE
D. Entity
D. EQUALS
477. What is the correct order of clauses?
472. To remove duplicate rows from the re-
A. SELECT, FROM, ORDER BY, WHERE
sults of an SQL SELECT statement, the
qualifier specified must be included. B. SELECT, FROM, WHERE, ORDER BY

A. ONLY C. SELECT, WHERE, FROM, ORDER BY

B. UNIQUE D. WHERE, FROM, SELECT, ORDER BY

C. DISTINCT 478. The language used application programs


to request data from the DBMS is referred
D. SINGLE
to as
473. What is the OCR pseudocode for A. DDL
inputting text from the keyboard? B. DML
HINT:Same as Python
C. Query Language
A. name = input(”Enter name”)
D. All of the mentioned
B. name = enter(”Enter name”)
479. A DBMS system is made up of:
C. keyboard = (”Enter name”)
A. queries, forms, reports
D. ENTER name
B. tables, entities, fields
474. Aditi wants to apply a constraint on a C. rows, columns, criteria
table “student”, where in she wants to
D. data and commands
restrict the marks entered as values be-
tween only 1 and 100. Which of the fol- 480. In terms of a database. What does PK
lowing constraints should she use? stand for?
A. Default A. Preliminary Key
B. Check B. Primary Key
C. Primary Key C. Product Key
D. Unique D. Private Key

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 318

481. What sum of money will produce Rs.70 B. An exact match is not possible in a SE-
as simple interest in 4 years at 3 1/2 per- LECT statement.
cent? C. An exact match is necessary in a CRE-
A. Rs 525 ATE statement.
B. Rs 500 D. An exact match is not possible in a CRE-
C. Rs 550 ATE statement.

D. Rs 550 487. According video made by Dr. Matt Harris,

NARAYAN CHANGDER
which is the better program, spreadsheets
482. Which of the following model describes or databases?
HOW the system will be implemented us-
ing a specific DBMS system? A. spreadsheets

A. Physical B. databases

B. Conceptual C. Depends

C. Logical D. none of above

D. UML 488. What will be the output of this query?


SELECT * FROM employees;
483. What is a special value in SQL that repre-
A. Retrieve all rows in the employee
sents missing or unknown data?
database
A. %
B. Retrieve all rows from the employee ta-
B. ? ble
C. NULL C. Retrieve all columns from the em-
D. * ployee database
D. Retrieve all columns from employee ta-
484. Which keyword allows us to find the
ble
unique values in the database?
A. DIFF 489. Which is the correct query to delete the
rows of employees whose exp is less than
B. UNIQUE
10.
C. FIND
A. DELETE * FROM EMP WHERE EXP<10;
D. DISTINCT

485. What is a command to add data? B. DELETE FROM EMP;

A. Insert to C. DELETE FROM EMP WHERE EXP<10;

B. Update D. DELETE FROM EMP WHERE EXP>10;

C. Insert Into 490. A database table can have no:of For-


D. Insert from eign Keys .
A. 1
486. The wildcard in a WHERE clause is useful
when? B. 2

A. An exact match is necessary in a SE- C. 4


LECT statement. D. any

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.9 SQL 319

491. DDL Stands for A. the sysadmin


A. Data Management Language B. the Localadmin

PRACTICE BOOK» NOT FOR SALE


B. Data Manupulation Language C. the globaladmin
C. Data Development Language D. none of above
D. Data Definition Language
497. The function is used to round a float-
492. X takes twice as much time as Y or thrice ing point number to the given decimal num-
as much time as Z to finish a piece of bers.
work. Working together, they can finish A. ROUND()
the work in 2 days. Y can do the work
B. GETROUND()
alone in?
C. UPPER()
A. 4 days
D. DOROUND()
B. 6 days
C. 8 days 498. Write the code for the following:Search
the unique genres located in movies table.
D. 12 days
A. SELECT DISTINCT genre from movies;
493. Set of values from which an attribute
takes values from.
B. SELECT DISTINCT genres FROM
A. degree movies;
B. cardinality C. SELECT DISTINCT genre FROM
C. domain movies;
D. table D. none of these
494. Which of the following returns the aver- 499. With SQL, how can you return the num-
age value of any numeric column in SQL? ber of records in the “Persons” table?
A. Average function A. SELECT COLUMNS(*) FROM Persons
B. AVG() function B. SELECT COUNT(*) FROM Persons
C. Average Value function C. SELECT NO(*) FROM Persons
D. None of these D. SELECT LENGTH(*) FROM Persons
495. The database stores basic configura- 500. What command to use if I want to
tion information for the server. execute the stored procedure through
A. Model Xampp?
B. Master A. EXECUTE
C. Tempdb B. EXEC
D. Msdb C. CALL

496. A Windows domain account should be D. CALLING


used and configured with the least possi- 501. The SQL-92 wildcards are and .
ble privileges that will still allow opera-
tion. The account must be a member of A. asterisk (*); percent sign (%)
which fixed server role B. percent sign (%); underscore ( )

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 320

C. underscore( ); question mark (? ) C. The AS clause defines a search condi-


D. question mark (? ); asterisk (*) tion
D. All of the mentioned
502. At HEB 3 pounds of hamburger meat is
on sale for $6. If Alicia buys 10 pounds of 505. Which SQL statement is used to return
hamburger, how much will she pay? only different values?
A. $30
A. SELECT DISTINCT
B. $20

NARAYAN CHANGDER
B. SELECT UNIQUE
C. $60
C. SELECT DIFFERENT
D. $10
D. none of above
503. In relational model the row of a tables
known to be? 506. A database is
A. Relation A. A collection of files
B. Entity Field B. A persistent, organised store of data
C. Tuple
C. An unstructured collection of data
D. Attribute
D. A folder containing related files
504. What is the purpose of the SQL AS
clause? 507. SELECT statement is a in SQL
A. The AS SQL clause is used to change A. Data Control Language(DCL)
the name of a column in the result set or
B. Transcation Control language(TCL)
to assign a name to a derived column
C. Data Manipulation language(DML)
B. The AS clause is used with the JOIN
clause only D. Data Definition language(DDL)

1.10 theory of computation


1. The basic limitation of finite automata is C. 6 + 5
that D. 6 + 5 +
A. It can’t remember arbitrary large
amount of information 3. A turing machine operates over:

B. It sometimes recognize grammar that A. finite memory tape


are not regular B. infinite memory tape
C. It sometimes fails to recognize regular C. depends on the algorithm
grammar. D. none of the mentioned
D. All of the mentioned
4. Which of the functions are not performed
2. What is the postfix equivalent of the fol- by the turing machine after reading a sym-
lowing infix expression? 5 + 6 bol?
A. + 5 6 A. writes the symbol
B. 5 6 + B. moves the tape one cell left/right

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 321

C. proceeds with next instruction or halts 10. The language of all words with at least 2
a’s can be described by the regular expres-
sion

PRACTICE BOOK» NOT FOR SALE


D. none of the mentioned
A. (ab)*a and a (ba)*
5. Which of the following CFG’s can’t be sim-
B. (a + b)* ab* a (a + b)*
ulated by an FSM?
C. b* ab* a (a + b)*
A. S → Sa | b
D. all of these
B. S → aSb | ab
C. S → abX, X → cY, Y → d | aX 11. Every grammar in Chomsky Normal Form
D. None of these A. Regular
B. Context Sensitive
6. Let n be the number of states in NFA then
there exists a DFA with minimum number C. Context Free
of states D. All of the Mentioned
A. n2 12. The class of recursively ennumerable lan-
B. nn+1 guage is known as:
C. 2n A. Turing Class
D. 2n+1 B. Recursive Languages
C. Universal Languages
7. A hierarchy chart depicts the structure (of
modules) of a program. The chart is an up- D. RE
side down
13. The Format of Chomsky Normal form
A. Tree structure
A. 1) A → BC
B. Graph structure
B. 2) A → a
C. Shell structure
C. 3) A → A
D. Truss structure D. Both 1) and 2)
8. A language L is said to be Turing decidable 14. “Automata” is derived from the word
if:
A. Greek
A. recursive
B. French
B. TM recognizes L
C. Latin
C. TM accepts L
D. Hebrew
D. None of the mentioned
15. A is an ordered, rooted tree that rep-
9. Number of states require to accept string resents the syntactic structure of a string
ends with 10. according to some context-free grammar.
A. 3 A. Parse Tree
B. 2 B. Logical Tree
C. 1 C. Function Tree
D. can’t be represented. D. File Tree

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 322

16. Consider the grammar:S-> ABCc | AbcBA- D. not equal number of a’s and b’s
> ABBb-> bbAb-> abAa-> aa Which of the
following sentences can be derived by this 21. Which of the following allows stacked val-
grammar ues to be sub-stacks rather than just finite
symbols?
A. abc
A. Push Down Automaton
B. aab
C. abcc B. Turing Machine
C. Nested Stack Automaton

NARAYAN CHANGDER
D. abbb
D. None of the mentioned
17. string is accepted by a PDA when
A. Stack is empty 22. In context to the process of removing use-
less symbols, which of the following is cor-
B. Acceptance state
rect?
C. Both (a) and (b)
A. We remove the Nullable variables
D. None of the mentioned
B. We eliminate the unit productions
18. Following context free grammarS-> aB |
C. We eliminate products which yield no
bA A->b | aS | bAAB-> b | bS | aBB gener-
terminals
ates strings of terminals that have
D. All of the mentioned
A. equal number of a’s and b’s
B. odd number of a’s and odd number b’s 23. Languages of a automata is
A. If it is accepted by automata
C. even number of a’s and even number B. If it halts
of b’s
C. If automata touch final state in its life
D. odd number of a’s and even number of
time
a’s
D. All language are language of automata
19. The context-free languages are closed
for:(i) Intersection (ii) Union(iii) Comple- 24. Any string of terminals that can be gener-
mentation (iv) Kleene Star ated by the following CFG isS→ XYX→
A. (i) and (iv) aX | bX | a Y→ Ya | Yb | a
B. (i) and (iii A. has atleast one ‘b’
C. (ii) and (iv) B. should end in a ‘a’
D. (ii) and (iii) C. has no consecutive a’s or b’s

20. The following CFG S→aB|bA A→a|as|bAA D. has atleast two a’s
B→b|bs|aBBgenerates strings of termi- 25. Concatenation Operation refers to which
nals that have of the following set operations:
A. equal number of a’s and b’s
A. Union
B. odd number of a’s and odd number of
B. Dot
b’s
C. even number of a’s and even number C. Kleene
of b’s D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 323

26. The logic of pumping lemma is a good ex- 32. Pushdown automata can recognize lan-
ample of guage generated by

PRACTICE BOOK» NOT FOR SALE


A. pigeon-hole principle A. Only context free grammar
B. divide-and-conquer technique
B. Only context sensitive grammar
C. recursion
C. Only regular grammar
D. iteration
D. Context free grammar or regular gram-
27. Inorder to simplify a context free gram- mar
mar, we can skip the following operation:
A. Removal of null production 33. Automata theory is the study of
B. Removal of useless symbols A. theorems
C. Removal of unit productions
B. machines
D. None of the mentioned
C. computation
28. The language accepted by a Push down Au-
tomata D. grammars
A. Type0
34. There are tuples in finite state ma-
B. Type1 chine.
C. Type2
A. 4
D. Type3
B. 5
29. Which of the following are related to tree
automaton? C. 6
A. Myphill Nerode Theorem D. 7
B. State machine
35. Which of the following languages have
C. Courcelle’s Theorem
built in regexps support?
D. All of the mentioned
A. Perl
30. A pushdown automata behaves like a Tur-
ing machine when the number of auxiliary B. Java
memory is C. Python
A. 1 or more
D. C++
B. 2 or more
C. 1 36. Pumping lemma is generally used for prov-
D. 0 ing that
A. given grammar is regular
31. If L is DFA-regular, L’ is
A. Non regular B. given grammar is not regular
B. DFA-regular C. whether two given regular expres-
C. Non-finite sions are equivalent or not
D. None of the mentioned D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 324

37. Consider a grammar with the following 42. Which of these functions happens NEXT on
productions S→ aab | bac | aB S → α S | a Turing machine after READING a sym-
b S → α b b | ab Sα → bdb | b The above bol and considering its matching transition
grammar is rule.
A. Context free A. writes the replacement symbol
B. regular B. moves the tape one cell left/right

C. context sensitive C. proceeds with next instruction or halts

NARAYAN CHANGDER
D. LR ( k )
D. clears the current tape cell
38. A can also be described as a sequence 43. Which of the technique can be used to
of pattern that defines a string prove that a language is non regular?
A. regular expression A. Ardens theorem
B. regular Language B. Pumping Lemma
C. regular formula C. Ogden’s Lemma
D. regular grammar D. None of the mentioned

44. The ability for a system of instructions to


39. Precedence of regular expression in de-
simulate a Turing Machine is called
creasing order is
A. Turing Completeness
A. *, ., +
B. Simulation
B. ) ., *, +
C. Turing Halting
C. ., +, *
D. None of the mentioned
D. +, a, *
45. What is the postfix equivalent for the fol-
40. The password to the admins ac- lowing infix expression? (2/4)*(5-6)
count=”administrator”. The total number A. 2 4 5 6 /-*
of states required to make a password-
B. 2 4 / 5 6-*
pass system using DFA would be
C. 2 4 / * 5-6
A. 14 states
D. 2 4 / 5-6 *
B. 13 states
46. Using a structured programming approach,
C. 12 states
each coding block should have
D. A password pass system cannot be A. One entry and one exit point
created using DFA
B. Multiple entry points
41. Turing machine is more powerful than: C. Two entry and one exit point
A. Finite Automata D. no entry or exit points
B. Push Down Automata 47. Finite automata is used in
C. Both A and B A. software designing
D. None of these B. Lexical analyzer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 325

C. Web pages 53. A regular language over an alphabet a is


D. All of the above one that can be obtained from

PRACTICE BOOK» NOT FOR SALE


A. union
48. What is a Turing machine that is able to
simulate all other Turing machines faith- B. concatenation
fully? C. kleene
A. Nested Turing machines D. All of the mentioned
B. Universal Turing machine 54. Which of the following is not a notion of
C. Counter machine Context free grammars?
D. None of the mentioned A. Recursive Inference

49. While applying Pumping lemma over a lan- B. Derivations


guage, we consider a string w that belong C. Sentential forms
to L and fragment it into parts. D. All of the mentioned
A. 2
55. The procedure interface
B. 3
A. 1
C. 4
B. 2
D. 5
C. 3
50. The conversion of NFA to DFA can be done D. 4
in
A. exponential time 56. Consider the grammar S → PQ | SQ | PS P
→ x Q→ y. To get a string of n terminals,
B. linear time the number of productions to be used is
C. logarithmic time A. n2
D. all of the mentioned B. n + 1
51. The CFG s→ as | bs | a | bis equivalent to C. 2n
regular expressionA.(a + b)B.(a + b) (a + D. 2n-1
b)*C.(a + b) (a + b)D. None of these
A. (a + b) 57. Choose the CORRECT definition of a stack
used in RPN evaluation.
B. (a + b) (a + b)*
A. Calculate the expression from right to
C. (a + b) (a + b) left
D. None of these B. Use ‘PUSH’ and ‘PULL’
52. Given Grammar:S→A, A→aA, A→e, C. Uses the principle of LIFO
B→bA Which among the following pro- D. Uses the principle of FIFO
ductions are Useless productions?
A. S→A 58. When designing a structured program
breaking down a problem into major tasks
B. A→aA and then sub-diving the major tasks into
C. A→e sub-tasks is called
D. B→bA A. Top-down design

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 326

B. Bottom-up design 64. The subset construction shows that every


C. Agile design NFA accepts a
A. String
D. Functional design
B. Function
59. Myphill Nerode does the following:
C. Regular language
A. Minimization of DFA
D. Context-free language
B. Tells us exactly when a language is reg-

NARAYAN CHANGDER
ular 65. Given grammar:S→aA A→a A→B B→
A B→bb Which of the following is the
C. Both (a) and (b) production of B after simplification by re-
D. None of the mentioned moval of unit productions?
A. A
60. A FSM (Finite State Machine) with outputs
is called a B. bb
A. Mealy Machine C. aA
B. Finite State Machine with Output D. A| bb
C. Mechanical Machine 66. Which of the following is false for an ab-
D. Making Machine stract machine?
A. Turing machine
61. If all the production rules have single non-
terminal symbol on the left side, the gram- B. theoretical model of computer
mar defined is C. assumes a discrete time paradigm
A. context free grammar D. all of the mentioned
B. context sensitive grammar 67. Regular grammar is
C. unrestricted grammar A. context free grammar
D. phrase grammar B. non context free grammar
62. Which among the following is not a part of C. english grammar
the Context free grammar tuple? D. none of the mentioned
A. End symbol
68. A program can be tested for errors using
B. Start symbol what type of table?
C. Variable A. Trace
D. Production B. Track
C. Trail
63. The language accepted by a Turing machine
is called D. Trawl
A. a) Recursive Ennumerable 69. John is asked to make an automaton which
B. b) Recursive accepts a given string for all the occurrence
of ‘1001’ in it. How many number of
C. Both (a) and (b) transitions would John use such that, the
D. None of the mentioned string processing application works?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 327

A. 9 75. A language is regular if and only if


B. 11 A. accepted by DFA

PRACTICE BOOK» NOT FOR SALE


C. 12 B. accepted by PDA
D. 15 C. accepted by LBA
D. accepted by Turing machine
70. From current state, on reading input sym-
bol, it moves to more than one state 76. NFA, in its name has ‘non-deterministic’
because of:
A. DFA
A. The result is undetermined
B. DFA with epsilon transitions
B. The choice of path is non-deterministic
C. NFA
D. none of above C. The state to be transited next is non-
deterministic
71. Context-free Grammar (CFG) can be recog-
nized by D. All of the mentioned

A. a) 2-way linear bounded automata 77. Finite automata requires minimum


number of stacks.
B. b) push down automata
A. 1
C. both a and b
B. 2
D. Finite state automata
C. 0
72. What is the following expression an exam- D. 3
ple of? 3 4 +
78. How many steps are required to prove
A. Infix expression that a decision problem is NP complete?
B. Postfix expression A. 1
C. Afterfix expression B. 2
D. Between expression C. 3
D. 4
73. The construction time for DFA from an
equivalent NFA (m number of node)is 79. What data structure can be used with post-
A. O(m2) fix expressions?
A. Queue
B. O(2m)
B. Hash Table
C. O(m)
C. Vector
D. O(log m)
D. Stack
74. The following move of a PDA is on the ba- 80. Which of the following problems is unde-
sis of: cidable?
A. Present state A. Membership problem for CFGs
B. Input Symbol B. Ambiguity problem for CFGs
C. Both (a) and (b) C. Finiteness problem for FSAs
D. None of the mentioned D. Equivalence problem for FSAs

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 328

81. Which kind of proof is used to prove the 87. The Value of n if Turing Machine is defined
regularity of a language? using n-tuples
A. Proof by contradiction A. 6
B. Direct proof B. 7
C. Proof by induction
C. 8
D. None of the mentioned
D. 5
82. A turing machine is a

NARAYAN CHANGDER
A. real machine 88. A class of language that is closed under
B. abstract machine A. union and complementation has to be
C. hypothetical machine closed under intersection

D. more than one option is correct B. intersection and complement has to be


closed under union
83. The minimum number of states required to
recognize an octal number divisible by 3 C. union and intersection has to be closed
are/is under complementation

A. 1 D. both (A) and (B)


B. 3
89. All the regular languages can have one or
C. 5 more of the following descriptions:i) DFA
D. 7 ii) NFA iii) e-NFA iv) Regular Expressions
Which of the following are correct?
84. Which among the following is equivalent
to the given regular expression? 01*+1 A. i, ii, iv
A. (01)*+1 B. i, ii, iii
B. 0((1)*+1) C. i, iv
C. (0(1)*)+1 D. i, ii, iii, iv
D. ((0*1)1*)*
90. A context free grammar is
85. What does a hierarchy chart not show?
A. type 0
A. Selection and iteration
B. Names of the modules B. type 1

C. Relationship between modules C. type 2


D. Structure of a program D. type 3

86. If L1, L2 are regular and op(L1, L2) is also 91. What are the three different type of data
regular, then L1 and L2 are said to be you should use for testing?
under an operation op.
A. Normal, boundary, extreme
A. open
B. closed B. Novelle, bound, exponential

C. decidable C. Neat, biased, exempt


D. none of the mentioned D. New, broad, extraordinary

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 329

92. Turing machine can be represented using C. XML document


the following tools:
D. All of the mentioned

PRACTICE BOOK» NOT FOR SALE


A. Transition graph
B. Transition table 98. Context sensitive language can be recog-
nized by a
C. Queue and Input tape
A. Linear bounded automata
D. All of the mentioned
B. Deterministic finite automata
93. If NFA of 6 states excluding the initial
state is converted into DFA, maximum pos- C. Non-deterministic finite automata
sible number of states for the DFA is? D. Finite state machine
A. 128
B. 127 99. Finite state machine can recognize lan-
guage generated by
C. 68
A. Only context free grammar
D. 67
B. Only regular grammar
94. The CFG s→ as | bs | a | bis equivalent to
regular expression C. any unambiguous grammar

A. (a + b) D. Only context sensitive grammar


B. (a + b) (a + b)*
100. The production of the form A→B, where
C. C.(a + b) (a + b) A and B are non terminals is called
D. None of these A. Unit production
95. The closure property of context free gram- B. Null production
mar includes
C. Greibach Normal Forn
A. Kleene
D. Chomsky Normal Form
B. Concatenation
C. Union 101. The variable which produces an epsilon is
D. All of the mentioned called
A. empty variable
96. The context free grammar which gener-
ates a Regular Language is termed as: B. nullable
A. Context Regular Grammar C. terminal
B. Regular Grammar D. all of the mentioned
C. Context Sensitive Grammar
102. Context free grammar is not closed un-
D. None of the mentioned
der
97. If w belongs to L(G), for some CFG, then A. Concatenation
w has a parse tree, which defines the syn-
tactic structure of w. w could be: B. Complementation
A. program C. Kleene Star
B. SQL-query D. Union

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.10 theory of computation 330

103. The sum of minimum and maximum num- 109. Which of the following statements are
ber of final states for a DFA n states is correct for a concept called inherent ambi-
equal to: guity in CFL?
A. n+1 A. Every CFG for L is ambiguous
B. n B. Every CFG for L is unambiguous
C. n-1 C. Every CFG is also regular
D. n+2 D. None of the mentioned

NARAYAN CHANGDER
104. A null production can be referred to as: 110. The stages in software development (for
A. String the AQA A-Level syllabus) are
B. Symbol A. Analysis Design Implementation Test-
ing Evaluation
C. Word
D. all of the mentioned B. Feasibility Design Programming Docu-
mentation Evaluation
105. In Reverse Polish notation, the expres- C. Idea Design Coding Testing Use
sion A*B+C*D is written as
D. Discuss Plan Implement Test Release
A. A*BCD*+
B. AB*CD+* 111. Which of the following does a Turing ma-
chine NOT consist of?
C. AB*CD*+
A. infinite input tape
D. A*B*CD+
B. sensing read/write head
106. (a+b)* is equivalent to
C. states and transition functions
A. b*a*
D. none of the mentioned
B. (a*b*)*
C. (a*b*)* 112. If NFA of 7 states is converted into DFA,
maximum possible number of states for
D. a*b* the DFA is?
107. is represented by double circle. A. 64
A. Initial state B. 132
B. Intermediate State C. 128
C. Final state D. 127
D. Null State
113. What does a structured approach to pro-
108. In computational thinking, representa- gramming improve?
tional abstraction is the process of A. Clarity and maintainability
A. removing unnecessary detail B. The speed and efficiency of the pro-
B. providing additional information gram
C. enhancing and amending detail C. The file size of the program file
D. embellish the current detail D. Functional coding data types

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 331

114. A string is accepted by a PDA when A. Queue


A. Stack is empty B. Linked List

PRACTICE BOOK» NOT FOR SALE


B. Acceptance state C. Hash Table
C. Both (a) and (b) D. Stack
D. None of the mentioned
117. A more efficient method of locating items
115. Language of finite automata is. in a sorted list/array, rather than a lin-
A. Type 0 ear search (though each item) is a binary
B. Type 1 search, which is also called

C. Type 2 A. divide and conquer


D. Type 3 B. chop chop

116. A push down automaton employs C. split and check


data structure. D. search and show

1.11 compiler design


1. Substring that matches the RHS of a pro- 4. output of lex program is
duction and is replaced by LHS is termed A. lex.c
as
B. lex.yy.c
A. Handle
C. lex.l
B. Parse tree D. lex.yy.l
C. Sequence
5. In the rule S → if B then M S N else M S,
D. Pattern N is used to generate a jump after

2. Basic limitations of Finite State Machine A. then-part


B. else-part
A. It cannot remember arbitrarily large
amount of information C. both then-and else-part
B. It cannot remember state transitions D. None of the other options

C. It cannot remember grammar for a 6. x? in a regular expression denotes


language A. only x
D. It cannot remember language gener- B. only epsilon
ated from a grammar C. either x or epsilon
3. Which of the following system software D. None of the above
resides in the main memory always
7. A bottom-up parser generates
A. Text Editor A. Left Most Derivation
B. Assembler B. Right Most Derivation
C. Linker C. Right Most Derivation in reverse
D. Loader D. Left Most Derivation in reverse

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 332

8. In a single pass assembler, most of the for- C. Size or Its running time
ward references can be avoided by putting D. Code Optimization
the restriction
A. On the number of strings/life reacts 14. The identification of common sub-
expression and replacement of run-time
B. Code segment to be defined after data
computations by compile-time computa-
segment
tions is
C. On unconditional rump
A. Local optimization

NARAYAN CHANGDER
D. None of these
B. Loop optimization
9. What is the other name of the parser? C. Constant folding
A. Lexical Analyzer D. Data flow analysis
B. Syntax Analyzer
15. What is the name of the process that de-
C. Semantic Analyzer termining whether a string of tokens can
D. Scanner be generated by a grammar?
10. A compiler is a A. Analyzing
A. Translate B. Translation
B. System Software C. Recognizing
C. Above 2 D. Parsing
D. Interpreter 16. Which of the following is NOT possible to
11. Punctuation, and parenthesis are exampes realize if activation record is static
of? A. Passing parameters
A. Alphabets B. Creating local variables
B. Strings C. Supporting recursion
C. Numbers D. None of the other options
D. Special Symbols
17. Information about source program is
12. In programming language, keywords, con- stored in
stants, identifiers, strings, numbers, oper- A. operating system
ators and punctuations symbols can be con-
sidered as? B. symbol table

A. Lexemes C. interpreter
B. Tokens D. database
C. Symbols 18. The method which merges the bodies of
D. Pattern two loops is
A. Loop rolling
13. The quality of the object program is gener-
ally measured by its B. Loop jamming
A. Cost C. Constant folding
B. Time D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 333

19. Which phenomenon happens when the non- B. Regular


terminal on the left side is repeated as the
C. Ambiguous
first symbol on the right side?

PRACTICE BOOK» NOT FOR SALE


D. All of the above
A. Left-most derivation
B. Left recursion 25. CFG stands for
C. Left factoring A. Control Free Grammar
D. Left parsing B. Context Full Grammar
20. A grammar that produces only one parse C. Context Free Grammar
tree for some sentence is said to be
D. Control Flow Grammar
A. Regular
B. Irregular 26. If two finite state machines are equivalent,
they should have the same number of
C. Ambiguous
D. Unambiguous A. states
B. edges
21. If pointer is supported in the high-level lan-
guage, C. states and edges
A. Must also be supported in the interme- D. none of these
diate language
27. Which one of the following is a top-down
B. May not be supported in the intermedi-
parser?
ate language
C. Depends on language A. Recursive descent parser.

D. None of the other options B. Operator precedence parser.


C. An LR(k) parser.
22. An optimizing compiler
A. is optimized to occupy less space D. An LALR(k) parser

B. is optimized to take less time for exe- 28. is associating the attributes with the
cution grammar symbols.
C. optimizes the code A. rotation
D. all the above
B. translation
23. S → A BA → ε | aAB → ε | bBFIRST(S) C. transformation
contains elements
D. evolving
A. 2
B. 3 29. In which automata, more than 1 transition
is possible?
C. 4
D. 5 A. NFA
B. DFA
24. Which grammar gives multiple parse trees
for the same string? C. PDA
A. Unambiguous D. Both NFA and DFA

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 334

30. Implementation of syntax-directed trans- 36. The output of scanner is


lators describes an mapping.
A. a stream of lexemes
A. input
B. a stream of tokens
B. output
C. an annotated parse tree
C. input-output
D. parse table D. a three address code

NARAYAN CHANGDER
31. Synthesized attributes can be easily simu- 37. between dfa and nfa which has the poten-
lated by a tial to have more states in it
A. Ambiguous grammar A. dfa
B. Unambiguous grammar
B. nfa
C. LL grammar
C. cant say
D. LR grammar
D. both have same
32. Which of the following grammars are not
phases-structured? 38. The graph that shows basic blocks and
A. regular their successor relationship is called
B. Context free grammars A. DAG
C. context sensitive B. Flow graph
D. none of the above C. Control graph
33. is considered as a sequence of charac- D. Hamilton graph
ters in a token
A. Pattern 39. Compiler should report the presence of
in the source program, in translation pro-
B. Token
cess
C. Lexeme
A. object
D. DFA
B. code
34. is a process of finding a parse tree for
a string of tokens. C. error
A. Parsing D. classes
B. Analysing
40. Choose the correct answer
C. Recognizing
A. The analysis part constructs the target
D. Tokenizing
program
35. Top down parser can’t handle B. The synthesis part constructs the tar-
A. Left Recursion (LR) get program
B. Left Factoring (LF) C. The synthesis part constructs the as-
C. Both LR and LF sembly code
D. only LR D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 335

41. In the call by value method, C. Heap


A. changes made in the formal parame- D. both b and c

PRACTICE BOOK» NOT FOR SALE


ters does not affect the actual parameters
47. PRE in optimization stands for
B. changes made in the formal parame- A. Program Relevant Expression
ters affect the actual parameters.
B. Partial Redundancy Elimination
C. changes cannot be made
C. Partial Relocation Expression
D. None of the above
D. Permanent Recovery Expression
42. Any finite set of symbols
A. Alphabets 48. Which of the following parser is a top-
B. Strings down parser?

C. Numbers A. An LALR parser


D. Special Symbols B. An LR parser

43. Which is the permanent database in the C. Operator precedence parser


general model of a Compiler? D. Recursive descent parser
A. Literal table
49. Memory locations in which program ac-
B. Identifier table
cesses are likely to be accessed again
C. Symbol table within a short period of time is called
D. Source code A. Spatial locality
44. Syntax Analyzer takes Groups Tokens of B. Temporal locality
source Program into Grammatical Produc-
C. Referential locality
tion
A. TRUE D. Cache memory

B. FALSE 50. The optimization which avoids test at ev-


C. May be ery iteration is
D. Can’t say A. Loop unrolling
45. Which of these is not a stage in the compi- B. Loop jamming
lation process: C. Constant folding
A. LEXICAL ANALYSIS
D. None of the mentioned
B. CODE OPTIMISATION
C. OBJECT CODE GENERATION 51. For the rule S → L:= E, if L is a single vari-
able, L.place is equal to
D. SOURCE CODE GENERATION
A. Null
46. Which kind of memory can grow and shrink
dynamically and unexpectedly? B. Some value
A. Static C. constant
B. Stack D. None of the other options

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 336

52. Compiler can check 58. What is machine code?


A. Logical error A. Instructions and data in binary
B. Syntax error B. Serial number of the CPU
C. Text error C. Instructions and data in human read-
D. Both logical and syntax error able form

53. Output file of Lex is the input file is D. Instructions and data in assembly
code mnemonics

NARAYAN CHANGDER
Myfile?
A. Myfile.e 59. A program P has M1 and M2, the two
B. Myfile.yy.c source modules contained in two different
files. When is the reference resolved if M1
C. Myfile.lex contains reference to a function defined in
D. Myfile.obj M2?
54. parsing methods cannot handle left re- A. Edit time
cursion B. Load time
A. Bottom-up C. Compile time
B. Top-down D. Link time
C. Both the options
60. How many phases are involved in the anal-
D. None of the mentioned
ysis phase?
55. hold the data that is local to the exe- A. 6
cution of the procedure.
B. 3
A. Global variable
C. 4
B. Temporary variable
D. 5
C. Local variable
D. Static variable 61. Simplify the given grammar:S→aXbX→aXb

56. To evaluate the expression, a stack is
used. A. S→aXb | ab, X→ aXb | ab

A. postfix B. S→X | ab, X→ aXb | ab


B. prefix C. S→aXb | ab, X→ S | ab
C. both D. None of the mentioned
D. polish 62. A is a software utility that translates
57. Parser discards input symbol until a to- code written in higher language into a low
ken is encountered. level language
A. input A. Compiler
B. synchronizing B. Translator
C. group C. Converter
D. none D. Text Editor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 337

63. Peep-hole optimization is a form of 69. Compiler translates the source code to
A. loop optimization A. Executable code

PRACTICE BOOK» NOT FOR SALE


B. local optimization B. Machine code
C. constant folding
C. Binary code
D. data flow analysis
D. Both B and C
64. A compiler for a high-level language that
runs on one machine and produces code for 70. Three properties to be considered before
a different machine is called parsing the input are
A. optimizing compiler A. Removing ambiguity
B. one pass compiler B. Removing left recursion
C. cross compiler
C. Left factoring
D. multi pass compiler
D. All the mentioned
65. Yet Another Compiler’s Compiler is a tool
for 71. Substitution of values for names whose
A. code optimization values are constant, is done in
B. Intermediate code generation A. local optimization
C. Lexical analysis B. loop optimization
D. Syntax analysis C. constant folding
66. For Boolean variable B, B.truelist contains D. none of these
A. List of locations at which B is true
72. Choose the correct option from the given
B. List of locations to jump to if B is true
answers.
C. List of locations at which B is true and
the locations to branch to A. A compiler translates machine lan-
guage to high level language
D. None of the other options
B. A Compiler translates assembly lan-
67. Three address code involves guage to machine language
A. Exactly 3 address C. A compiler translates machine lan-
B. At the most 3 address guage to assembly language
C. No unary operator D. None of these
D. No assignment operator
73. Regular expression for an identifier is
68. What is the problem writing machine given by (L denotes letter, D denotes
code? digit)
A. Quick to learn
A. L(LD)*
B. Easy to debug
B. LD*
C. Easy to read
C. L(L|D)*
D. Hard to remember the binary codes
Hard to remember the binary codes D. (L|D)*

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 338

74. Amount of lookahead is limited in C. one or more occurrences of a and b


A. Sentinel D. letter a followed by zero or more oc-
B. Buffer pair currences of b
C. Lexeme
80. The canonical reduction sequence is ob-
D. token tained by
75. Structure preserving transformations on A. reduction
basic blocks are

NARAYAN CHANGDER
B. handle
A. Common sub-expression elimination
C. production
B. Dead-code elimination
D. handle pruning
C. Renaming of temporary variables
D. All the above 81. For a context-free grammar, left hand side
of production rules should contain
76. It checks whether the parse tree con-
structed follows the rules of language. A. Single nonterminal
A. Lexical Analyzer B. Set of both terminals and nonterminals
B. Syntax Analyzer
C. Semantic Analyzer C. Set of terminals

D. Code Generator D. None of the other options

77. The specific task storage manager per- 82. Regular set for the regular expression b+
forms denotes
A. allocation/ de-allocation of storage to A. zero or more occurrences of b
programs
B. one or more occurrences of b
B. protection of storage area allocated to
a program from illegal access by other C. only one occurrence ofb
programs in the system D. none of the mentioned
C. the status of each program
D. both ( a ) and ( b ) 83. Annotated parse tree is generated by the
A. Parser
78. is a data structure used by the com-
piler to keep track of semantics of the vari- B. Semantic Analyzer
ables. C. Scanner
A. Symbol table
D. Code generator
B. Operator table
C. Literal table 84. The symbol ==> means
D. Operand table A. derives in one step

79. ab* in a regular expression denotes B. derives in zero or more steps


A. zero or more occurrences of a and b C. derives in one or more steps
B. zero or more occurrences of a or b D. does not derive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 339

85. Regular expression for all strings starts 91. Blank spaces and comment lines will be
with ab and ends with bba is. eliminated by the compiler during
A. lexical analysis

PRACTICE BOOK» NOT FOR SALE


A. aba*b*bba
B. ab(ab)*bba B. syntax analysis
C. ab(a+b)*bba C. preprocessing
D. All of the mentioned D. code optimization

86. Lexical analysis is about breaking a se- 92. S → aSa| bSb| a | b; The language gener-
quence of characters into ated by the above grammar is the set of

A. Groups A. All palindromes


B. All odd length palindromes
B. Packets
C. All even length palindromes
C. Lines
D. Strings beginning and ending with the
D. Tokens same symbol
87. Consider the regular expression 0 * (10 *) 93. a regular language can be specified by
which is similar to the same set as
A. regular expression
A. 0 + (0 + 10) *
B. regular grammar
B. (0 +1) * 10 (0 + 1) *
C. both
C. (1 * 0) * 1* D. none
D. None of the above
94. which of the following is a lex analysis
88. Relocatable machine code is produced by tool
the A. lex
A. Compiler B. flex
B. Interpreter C. jflex
C. Loader D. all the above
D. Assembler 95. Which of the following class of statement
89. Which of the following parsers is the most usually produces no executable code when
powerful? compiled?
A. declaration
A. SLR(1)
B. assignment statements
B. CLR(1)
C. input and output statements
C. LALR(1)
D. structural statements
D. Operator Precedence
96. Which of the following is not a regular ex-
90. Inherited attribute is a natural choice in pression?
A. Tracking declaration of a variable A. [(a+b)*-(aa+bb)]*
B. Correct use of L and R values B. [(0+1)-(0b+a1)*(a+b)]*
C. All the above C. (01+11+10)*
D. None of these D. (1+2+0)*(1+2)*

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 340

97. A compiler needs to collect and use infor- B. Those that use dynamic scoping
mation about the names appearing in the
C. Those that support recursion
source program. This information is en-
tered into a data structure called a D. Those that allow dynamic data struc-
ture
A. Symbol table
B. Lexical analysis 103. The parsing table is generally a di-
C. Syntactic analysis mensional array.

NARAYAN CHANGDER
D. Records A. one
B. two
98. Conversion from one type to another is
said to be if it is done automatically C. three
by the compiler. D. four
A. explicit
104. Access link points to the
B. implicit
C. both A. Current activation record

D. none of these B. Parent activation record


C. Child activation record
99. Which component of a language preproces-
sor solves external memory addresses? D. None of the other options
A. Loader 105. A graphical representation for deriva-
B. Interpreter tions that filter out the choice regarding
C. Linker replacement order is called the

D. Assembler A. parse tree


B. graph tree
100. How many sections are present in a LEX
program? C. syntax tree
A. 2 D. symbol tree
B. 3
106. The statement/function used to get input
C. 4 from the user in a LEX program is
D. 6 A. yylex()
101. Resolution of externally defined symbols B. yytext()
is performed by
C. main()
A. Linker
D. yywrap()
B. Loader
C. Compiler 107. Type checking is normally done during?

D. Interpreter A. Lexical Analysis


B. Syntax Analysis
102. The languages that need heap allocation
in the runtime environment are C. Syntax Directed Translation
A. Those that use global variables D. Code generation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 341

108. If there are more than 1 topological sort- C. Intermediate code


ing of a DAG is possible, which of the fol- D. Machine code
lowing is true.

PRACTICE BOOK» NOT FOR SALE


A. Many Hamiltonian paths are possible 114. predictive parser

B. No Hamiltonian path is possible A. needs backtracking

C. Exactly 1 Hamiltonian path is possible B. does not need backtracking

D. Given information is insufficient to C. may not terminate


comment anything D. none

109. How many common phases are there in a 115. In LR parser, LR stands for
compiler? A. Left to Right derivation
A. 1 B. Left to Right with Rightmost derivation
B. 2
C. 6 C. Left to Right with Leftmost derivation
D. 8 D. none of above

110. Which one has the highest precedence in 116. Usually the “Three address code” con-
a regular expression tains address two for the and one for
A. Kleen closure the result.

B. Concatenation A. operand

C. Union B. operator

D. Epsilon C. result
D. statement
111. Widening Conversion, a type conversion
rule, is used to preserve in language. 117. Parser are expected to parse the whole
A. semantic code

B. information A. TRUE

C. type B. FALSE

D. syntax C. MAY BE
D. Cant say
112. Given the following expression gram-
mar:E → E * F | F+E | FF → F-F | idwhich 118. A LEX program is compiler by
of the following is true? A. a LEX compiler only
A. * has higher precedence than + B. a C compiler only
B. -has higher precedence than * C. a LEX compiler and C compiler
C. + and-have same precedence D. none of the mentioned
D. + has higher precedence than *
119. Procedure calls and returns are usually
113. What is the output of lexical analyzer? managed by a run time stack called the
A. A parse tree A. control stack
B. A list of tokens B. return address

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 342

C. access link 125. Which phase is language independent?


D. control link A. Analysis phase
B. Synthesis phase
120. Which of the following can be accessed
C. Both
by transfer vector approach of linking?
D. None of the above
A. external data segments
126. The topological sorting of any DAG can be
B. external sub-routines
done in time.

NARAYAN CHANGDER
C. data located in other procedure A. cubic
D. All the above B. quadratic

121. Which phase is independent of the source C. linear


code? D. logarithmic
A. Analysis phase 127. A Finite Automata recognizes
B. Synthesis phase A. Context Free Language
C. None of the mentioned B. Context Sensitive Language
C. Regular Language
D. none of above
D. Any Language
122. It explains what can be a token, and
128. Which tool is used as scanner generator
these are defined by means of regular ex-
in compiler?
pressions.
A. LEX
A. Lexemes
B. YACC
B. Tokens
C. SDT
C. Symbols D. Finite Automata
D. Pattern
129. A linker reads four modules whose
lengths are 200, 800, 600 and 500 words
123. The compiler can detect what type of er-
respectively. If they are loaded in that or-
rors?
der, what are the relocation constants?
A. neither logical nor grammatical error A. 0, 200, 500, 600
B. logical errors only B. 0, 200, 1000, 1600
C. grammatical errors only C. 200, 500, 600, 800
D. both grammatical and logical errors D. 200, 700, 1300, 2100

124. Derivation produced by top-down parser 130. It is a part of operating system and is re-
is sponsible for loading executable files into
memory and execute them.
A. leftmost
A. Loader
B. rightmost B. Interpreter
C. either left or right C. Cross-compiler
D. none D. Preprocessor

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 343

131. Which action remove handle from stack 137. In this phase, it takes the optimized rep-
and push its corresponding Non terminal? resentation of the intermediate code and
maps it to the target machine language.

PRACTICE BOOK» NOT FOR SALE


A. Shift
B. Reduce A. Lexical Analyzer
C. Accept B. Syntax Analyzer
D. Error C. Semantic Analyzer

132. A parse tree is generated as the output D. Code Generator


of 138. refers to the location to store the
A. Lexical Analysis value for a symbol.
B. Semantic Analysis A. value
C. Syntax Analysis B. place
D. Code Generation C. code
133. Left Factoring is a transformation for fac- D. number
toring out the prefixes.
139. Access time is faster in
A. odd
A. Stack
B. common
B. Heap
C. positive
C. Both
D. negative
D. None of the above
134. Scissoring enables
A. entire data to be displayed 140. in a specification file? stands for
B. full data display on full area of screen A. o r more occurrence
C. a part of data to be displayed B. one or more
D. no data to be displayed C. exactly one

135. Which automata has at most one transi- D. none


tion from each state to any input? 141. The output of intermediate code genera-
A. NFA tor is the
B. DFA A. Target code
C. Both NFA and DFA B. Object code
D. None of the mentioned C. Optimized code
136. The average time required to reach a stor- D. Three address code
age location in memory and obtain its con-
tents is called the 142. By whom is the symbol table created?
A. Access time A. Compiler
B. Seek time B. Interpreter
C. Turnaround time C. Assembler
D. Transfer time D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 344

143. A program that converts the assembly 149. Syntax directed translation subroutines
language to machine-level language. generate code.
A. Assembler A. intermediate
B. Compiler B. source
C. Interpreter C. object
D. LInker D. error
144. P-code is used for

NARAYAN CHANGDER
150. In this phase, token arrangements are
A. Stack-based machine checked against the source code grammar.
B. Accumulator based machine A. Lexical Analyzer
C. Two operand addresses B. Syntax Analyzer
D. None of the other options C. Semantic Analyzer

145. In parser the two LL stand(s) for D. Code Generator


A. Left-to-right scan of input 151. Compilers, assemblers and interpreters
B. left-most derivation are examples of this.
C. both 1 and 2 A. Translator
D. none of the above B. Run time environment
C. Editor
146. Functionalities such as macro processing,
file inclusion and language extension are D. Error diagnostics
done by the
152. The output of the lexical analyzer is
A. Assembler
A. string character
B. Compiler
B. a syntax tree
C. Linker
C. a set of RE
D. Preprocessor
D. a set of tokens
147. [A..Z] in a regular expression denotes
153. An assigned variable which is not used in
A. only A and Z the program is called
B. A, Z, a and z
A. Live code
C. All alphabets in both upper case and
B. Dead code
lower case
C. Constant
D. Only upper case alphabets between A
and Z D. Variable

148. The character sequence forming a token 154. Local and loop optimization in turn pro-
is called as vide motivation for
A. pattern A. data flow analysis
B. symbol B. constant folding
C. lexeme C. peep hole optimization
D. input D. DFA and constant folding

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 345

155. In a compiler, keywords of a language C. new


are recognized during D. inherited

PRACTICE BOOK» NOT FOR SALE


A. Syntax analysis
161. S → a | BB → Bb | EThe non-terminal
B. Code generation is left recursive.
C. Lexical analysis A. A
D. Data flow analysis B. S
C. B
156. An implementation of a language is if
a compiler guarantees that the program it D. E
accepts will run without type errors. 162. For the given grammar G:S→ABaCA→BCB→b|
A. loosely typed ε C→D| ε D→ d
B. strongly typed A. 6
C. weakly typed B. 7
D. none of these C. 5
D. 8
157. Nullable value of leaf nodes and star
node are 163. LR(1) item= +
A. false, false A. LR(0) item + First(S’)
B. false, true B. LR(0) item + Action
C. true, false C. LR(0) item + Lookahead
D. true, true D. LR(0) item + Follow(S’)
164. Which of the following groups is/are to-
158. What is the action of parsing the source
ken together into semantic structures?
program into proper syntactic classes?
A. Syntax analyzer
A. Lexical analysis
B. Lexical analyzer
B. Syntax analysis
C. code generation
C. General syntax analysis
D. semantic Analyzer
D. Interpretation analysis
165. Number of phases in an interpreter are
159. no of sections in a lex program are A. 2
A. 1 B. 4
B. 2 C. 6
C. 3 D. 8
D. 4 166. Mathematical model of a system with dis-
crete input and output is
160. If the attributes of the parent depend on
the attributes of the children, then they A. Regular expression
are called as attributes. B. Finite Automata
A. made C. LEX
B. discovered D. YACC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 346

167. In regular expressions, the operator ‘*’ 173. If P & R are regular and also given that
stands for? if PQ=R, then
A. Concatenation A. Q has to be regular
B. Selection B. Q cannot be regular
C. Addition C. Q need not be regular
D. Q has to be a CFL
D. Iteration
174. When is the type checking usually done?

NARAYAN CHANGDER
168. Choose the examples for terminals
A. During syntax directed translation
A. Operator symbols
B. During lexical analysis
B. Digits 0, 1, 2..9 C. During code optimization
C. punctuation marks D. During syntax analysis
D. all the mentioned 175. What is the other name for predictive
169. The specific task storage manager per- parser?
forms A. LL (1)
A. Allocation/ deallocation of programs B. Non-Recursive Descent Parser
B. Protection of storage area assigned to C. Both
the program D. None of the above
C. Both of the mentioned 176. Each time a procedure is called, space for
D. None of the mentioned its local variable is pushed onto
A. buffer
170. a grammar E→ E+E|E*E|id is
B. registers
A. ambiguous C. stack
B. unambiguous D. memory
C. partially ambiguous 177. Which of the given statement is true?
D. none A. All the Cyclic Directed Graphs have
topological sorting
171. Compiler can check error.
B. All the Acyclic Directed Graphs have
A. Logical topological sorting
B. Syntax C. All Directed Graphs have topological
C. Both A and B sorting
D. None D. All the cyclic directed graphs have non
topological sorting
172. What does a Syntactic Analyser do?
178. Optimization is done to
A. Maintain Symbol Table A. Improve the system performance
B. Collect type of information B. Reduce the program size
C. Create parse tree C. Reduce the compilation time
D. None of the mentioned D. All the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 347

179. The fifth phase of compiler is B. Parser


A. Code generation C. Code generator

PRACTICE BOOK» NOT FOR SALE


B. Code optimization D. Code optimizer
C. Error handling
185. A grammar that is both left and right re-
D. Intermediate code generation
cursive for a non-terminal is
180. Which phase is machine independent? A. Ambiguous
A. Analysis phase B. Unambiguous
B. Synthesis phase
C. Information is not sufficient to decide
C. Both the options whether it is ambiguous or Unambiguous.
D. None of the options
D. None of the above
181. Source program is passed through ,
and to produce relocatable machine
186. Name the cousin(s) of compiler
code
A. Preprocessor and Assembler
A. Compiler, Preprocessor and Loader
B. Preprocessor, Compiler and Assem- B. Loader and Linker
bler C. Interpreter
C. Compiler, Assembler and Loader D. All the above
D. Preprocessor, Compiler and Loader
187. An intermediate code form can be a
182. Which of the following actions an opera-
tor precedence parser may take to recover A. syntax tree
from an error? B. post fix notation
A. Delete symbols from the stack C. three address code
B. Insert symbols onto the stack D. all the above
C. Inserting or deleting symbols from the
input 188. Regular expression for an identifier is
D. All of these A. (letter | digit)*

183. The symbol table implementation is B. (letter)(letter | digit)*


based on the property of locality of refer- C. (letter)* (letter | digit)*
ence is-
D. (letter)+ (letter | digit)*
A. Hash Table
B. Self Organisation 189. A program that converts high-level lan-
guage to assembly language.
C. Linear list
D. None of the above A. Assembler
B. Compiler
184. Syntax analyzer can otherwise be called
as C. Interpreter
A. Scanner D. LInker

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 348

190. Which of the following language is a 196. In a bottom up evaluation of a syntax di-
parser generator? rection definition, inherited attributes can
A. LEX
B. YACC A. Always be evaluated

C. Pascal B. Be evaluated only if the definition is L-


attributed
D. Simula
C. Evaluation only done if the definition

NARAYAN CHANGDER
191. Compiler is a program that takes source has synthesized attributes
program as input and produce as out- D. None of these
put.
A. machine code 197. Which of the following file is an output
of the assembler?
B. object code
A. Program file
C. assembly code
B. Object file
D. none of the above
C. Data File
192. An NFA’s transition function returns D. Task File
A. A Boolean value
198. Directed Acyclic Graph (DAG) representa-
B. A state tion of a basic block allows
C. A set of states A. Automatic detection of local common
D. An edge sub expressions

193. Control link points to the B. Detection of induction variables

A. Current activation record C. Automatic detection of loop variant

B. Parent activation record D. None of these

C. Child activation record 199. The regular expression (0|1)*(0|1) repre-


D. None of the other options sents a language with
A. Odd nonempty strings
194. Type checking is done during
B. Even nonempty strings
A. Syntax Analysis
C. Empty and nonempty binary strings
B. Semantic Analysis
D. Nonempty binary strings
C. Code Optimization
D. Code Generation 200. When a computer is first turned on or
restarted, a specialtype of absolute loader
195. A Context Free Grammar(CFG) contains is executed called
A. Only terminals and non-terminals A. Bootstrap loader
B. Only a set of productions B. Compiler and Go loader
C. Only a start symbol C. Relocating loader
D. All the above D. Boot loader

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 349

201. Intermediate code generation for a com- C. Records


piler is D. Program

PRACTICE BOOK» NOT FOR SALE


A. Must
207. What is the value of the sum of the min-
B. Optional
imum in-degree and maximum out-degree
C. depends on language of an Directed Acyclic Graph?
D. none of the above A. Depends on a Graph
202. is a pile of memory space avail- B. Will always be zero
able to programmers to allocated and de-
C. Will always be greater than zero
allocate.
D. May be zero or greater than zero
A. Heap
B. Static 208. is used to translate assembly lan-
C. Stack guage code into machine code.

D. Cache A. Interpreter
B. Assembler
203. words of a language constitute
C. Compiler
A. set of terminals
B. set of non terminals D. Preprocessor

C. both 209. Grammar of the programming is checked


D. none at phase of compiler.
A. Syntax Analyzer
204. With V (greater than 1) vertices, how
many edges at most can a Directed Acyclic B. Lexical Analyzer
Graph possess? C. Semantic Analyzer
A. (V*(V-1))/2
D. Scanner
B. (V*(V+1))/2
210. Which computer program accepts the
C. (V+1)C2
high-level language and converts it into as-
D. (V-1)C2 sembly language?
205. Identify the number of tokens in the fol- A. Interpreter
lowing C statement printf(”i = %d, & i = B. Linker
%x”, i, & i);
C. Assembler
A. 4
D. Compiler
B. 10
C. 15 211. which of the following is always ambigu-
D. 21 ous
A. one LMD and one RMD
206. is used in the several stages of the
compiler. B. one LMD and more RMD
A. Table C. one RMD and more LMD
B. Symbol table D. none

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 350

212. Rightmost derivation is sometimes called 218. In LEX, rule section starts and ends with
derivations.
A. canonical A. %%
B. RMD
B. {%
C. LMD
C. %}
D. Low
D. ##
213. Which phase of the compiler is also

NARAYAN CHANGDER
known as Scanner? 219. It reads a statement from the input, con-
A. Syntax Analysis verts it to an intermediate code, executes
B. Lexical Analysis it, then takes the next statement in se-
quence.
C. Semantic Analysis
A. Assembler
D. Code generation
B. Compiler
214. LEX compiler generates
A. yy.lex.c C. Interpreter

B. lex.yy.c D. LInker
C. executable code
220. Which of the following function is called
D. object code the canonical collection of LR(0) item.
215. The idea of cache memory is based A. FIRST
A. On the property of locality of reference B. GOTO
C. COMPUTE
B. On the heuristic 90-10 rule
C. On the fact that references generally D. FOLLOW
tend to cluster
221. Any finite sequence of alphabets.
D. On all the above
A. Alphabets
216. A compiler is faster than interpreter
A. True B. Strings

B. False C. Numbers
C. None of these D. Special Symbols
D. none of above
222. Which of the following statement is true
217. In which parsing, the parser constructs for Dead State?
the parse tree from the start symbol and
transforms it into the input symbol. A. It cannot be reached anytime
A. Bottom-up parsing B. There is no necessity of the state
B. Top-down parsing C. If control enters no way to come out
C. None of the above from the state
D. Both a and b D. If control enters FA deads

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 351

223. Type checking can be of two types viz: 229. An example of a high-level programming
and language is:

PRACTICE BOOK» NOT FOR SALE


A. synthesis, inference A. Python
B. synthesis, expression B. Assembly
C. syntactic, semantic C. Machine code
D. expressive, symbolic D. Cloud
224. Spelling mistakes in a program are de- 230. Which of the following component is im-
bugged during portant for semantic analysis?
A. Lexical analysis A. LEX
B. Syntax analysis B. YACC
C. Compilation C. Type checking
D. Run time D. Symbol table
225. kinds of LR parser are 231. Directly executable by the CPU. Written
A. SLR, CLR and LALR in 1’s and 0’s or Hex.
B. CCLR, LR and LLR A. Machine Code
C. SR, SLR and CLR B. High Level Language
D. SR, SLR and LALR C. Assembly Language
226. Dividing a project into segments and D. VB.net
smaller units in order to simplify analysis,
232. Which table is permanent databases that
design and programming efforts is called
has an entry for each terminal symbol?
A. Terminal table
A. Modular approach
B. Top down approach B. Literal table

C. Bottom up approach C. Identiier table

D. Left right approach D. None of these

227. Which derivation is generated by the 233. What is Syntax Analyser also known as
bottom-up parser? A. Hierarchical Analysis
A. Right-most derivation in reverse B. Hierarchical Parsing
B. Left-most derivation in reverse C. None of the mentioned
C. Right-most derivation D. Hierarchical Analysis & Parsing
D. Left-most derivation
234. Which is taken as input for the synthesis
228. How many parts of compiler are there? phase?
A. 1 A. Source code
B. 2 B. Object code
C. 6 C. Intermediate code
D. 7 D. Optimized code

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 352

235. The Kleene Closure of a language L is 241. An intermediate language should be


written as A. Close to target machine
A. L+
B. Machine independent
B. L*
C. All operators of high-level language
C. L supported
D. L- D. All of the other options
236. Three address code invloves

NARAYAN CHANGDER
242. Regular expression (a|b)* denotes
A. exactly 3 address A. One or more occurrences of a or b
B. at the most 3 address
B. One or more occurrences of a and b
C. no unary operators
C. Zero or more occurrences of a or b
D. none of these
D. Zero or more occurrences of a and b
237. Semantic Analyser is used for?
243. Symbol table is a data structure which
A. Generating Object code contains
B. Maintaining symbol table
A. a record for each identifier
C. Generating Object code & Maintaining
B. attributes of each identifier
symbol table
C. both the options
D. None of the mentioned
D. none of the mentioned
238. This phase scans the source code as a
stream of characters and converts it into 244. An identifier is a
meaningful lexemes.
A. keyword
A. Lexical Analyzer
B. operator
B. Syntax Analyzer
C. lexeme
C. Semantic Analyzer
D. token
D. Code Generator
245. lex specifications are demarcated by
239. Parenthesized numbers are used to rep-
resent into the triple structure. A. %
A. pointer B. {%
B. stack C. %}
C. queue D. %%
D. value 246. A computer program that links and
240. If Left Recursion is available, then oc- merges various object files together in or-
curs. der to make an executable file.
A. stack A. Assembler
B. cycle B. Compiler
C. queue C. Interpreter
D. symbols D. LInker

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 353

247. A keeps track of what is currently in 253. An assembler is a program which con-
each register. verts

PRACTICE BOOK» NOT FOR SALE


A. Address descriptor A. Assembly language into source lan-
B. Program counter guage
C. Register descriptor B. Source language into assembly lan-
D. Data descriptor guage
C. Source language into target language
248. A grammar that produces more than one
parse tree for some sentence is called as D. None of the above
A. CFG
254. Hashing meaning
B. Ambiguous
A. Variation of searching techniques
C. Non Ambiguous
D. Left Recursive B. Variation of inserting techniques

249. Words such as if, then, else are examples C. Variation of updating techniques
for D. Variation of Deleting Techniques
A. terminals
255. In the activation record, local variables
B. non-terminals
can be accessed from frame pointer with
C. productions offset value
D. start symbol A. positive
250. What does the second L in LL(1) repre- B. negative
sents?
C. May be positive or negative
A. Scanning Left to Right
D. Cannot be accessed
B. Left Most Derivation
C. Left Hand Side 256. provides easy transformation on ba-
D. Left Most Non-Terminal sic blocks.

251. Rule section in LEX always starts with A. DAG


A. /* B. CFG
B. // C. Data flow analysis
C. ## D. Control flow analysis
D. %%
257. Select a Machine Independent phase of
252. What are the issues in the design of code the compiler
generator?
A. Syntax Analysis
A. Input to the generator
B. Target programs B. Intermediate Code generation

C. Memory management C. Lexical Analysis


D. All the above D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.11 compiler design 354

258. if state In contains A −→ α · and B → 264. In three-address code, arrays are


α .β then it will lead to conflict in LR A. Not supported
parser
B. One dimensional
A. Shift-Shift
B. Shift-Reduce C. More than one dimensional
C. Reduce-Reduce D. Supported via pointers
D. Action-Goto 265. Each entry in the symbol table is a pair of

NARAYAN CHANGDER
259. LR stands for the form and
A. left to right scanning A. Name and information
B. left to right reduction B. Name and function
C. leftmost to rightmost derivation C. Name and data
D. left to right scanning and right most D. Name and procedures
derivation in reverse
266. It is a tool that produces input for compil-
260. A system program that set-up an exe- ers.
cutable program in main memory ready for
execution is A. Loader
A. loader B. Interpreter
B. linker C. Cross-compiler
C. assembler D. Preprocessor
D. None of the above
267. Scissoring enables
261. Replacing expensive operations with sim-
A. A part of data to be displayed
pler ones is called
A. Strength reduction B. Entire data to be displayed
B. Copy propagation C. Full data display on full screen
C. Constant folding D. No data to be displayed
D. Dead code elimination 268. Choose the properties of three address
262. The graph that shows basic blocks and code from the given options
their successor relationship is called A. Has at most 2 operators
A. DAG B. assignment operator is mandatory
B. Flow chart
C. Has maximum of 3 operands
C. Control graph
D. all the mentioned
D. Hamilton graph
269. The memory manager must have
263. Which is the last phase of the compiler?
A. Code optimization A. space efficiency
B. Code generation B. program efficiency
C. Intermediate code generation C. low overhead
D. Syntax analyzer D. all the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 355

1.12 system software

PRACTICE BOOK» NOT FOR SALE


1. User Management 6. A user is the combination of hardware
A. Provides a method to communicate and software that helps people and com-
with the system puters communicate with each other.

B. Provides options to manage your files A. panel


and folders B. system
C. allows the os to manage the hardware C. surface
devices
D. interface
D. Allows each user to have different ac-
counts on the system 7. Metadata is:
2. Designed for BlackBerry devices. A. Additional data stored about a file
A. iPhone OS B. Property of file that can be set
B. BlackBerry Operating System C. Basic information about files, name,
C. Palm OS and Palm webOS size and date modified
D. Symbian OS D. Process of reducing the size of a file
3. Question 10:This piece of software is used 8. Utility programs are usually ? (1-3)
to control hardware devices and allow an
Operating System to make use of the hard- A. Bought on a disk from a store
ware (7-9) B. Only needed if you connect to the In-
A. Device Management ternet
B. Device Driver C. Very Expensive to buy
C. Device System D. Part of the Operating System
D. Hardware Peripheral Device
9. What is a software?
4. These runs single user applications and A. The programs and other operating in-
shares files and folders on a small net- formation used by a computer
work.
B. A tool found on a device
A. Desktop OS
C. A type of app
B. Virtualization
C. Mobile OS D. none of above
D. Network OS 10. A single user/single operating system
allows only one user to run one program
5. This method of backup takes longer to per-
at a time.
form (4-6)
A. Differential A. throttle
B. Fragmented B. function
C. Full C. indexing
D. Incremental D. tasking

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 356

11. Peripheral Management 16. Which one is true about Open source soft-
A. Provides a method to communicate ware from the following?
with the system A. It is very expensive.
B. Manages your programs B. It is made to make profit.
C. allows the os to manage the hardware C. It made for the betterment of other
devices people.
D. Allows users to have different ac-
D. Well tested and reliable and updates

NARAYAN CHANGDER
counts
will be regularly be issued.
12. Which one of these best describes com-
pression? 17. Which of the following is not a feature of
an OS?
A. Making a file bigger.
A. User Interface
B. Keeping files the same size.
B. Systems Design
C. Making a file smaller.
C. User Management
D. none of above
D. Memory Management
13. Which one of these best describes open
source software? 18. Which type of software would a game
A. A type of operating system. be?
B. Free software downloaded from the in- A. Utility software.
ternet.
B. An operating system.
C. Software bought from a shop.
C. Application software.
D. none of above
D. none of above
14. What software would be used to create a
website 19. Question 7:To allow a user to interact with
an Operating System-it must have a ?
A. Image editing software
(1-3)
B. Word processor
A. User Connection
C. Presentation software
B. User Interface
D. Web authoring software
C. Virtual Connection
15. Emulated computer environment that sim-
ulates hardware and can be used for D. Remote Access
running OS’s separate from the physical
20. Evaluate your system and make recom-
(host) computer. Replicates the function-
mendations for fixing any errors found
ality of a physical machine
A. Multi-tasking machine A. Search Tools

B. Physical machine B. Diagnostic Programs


C. Virtual machine C. Disk Management Programs
D. Multi user machine D. Uninstall utilities

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 357

21. A complete operating system that works A. deleted


on a personal computer (such as desktop B. damaged
and notebook computers)This description

PRACTICE BOOK» NOT FOR SALE


refers to C. corrupted

A. Mobile OS D. ruined

B. Desktop OS 27. Optical disks use and to represent


C. Server OS the digits 0 and 1.

D. none of above A. pits and lands


B. flats and dips
22. What lets you do many things, like write
book reports and stories? C. ups and downs

A. Antivirus Software D. ants and decs

B. Email 28. is a type of system software that al-


C. Duct Tape lows a user to perform maintenance-type
tasks
D. Application Programs
A. Operating system
23. The Windows app used for locating files B. System Software
and folders is ..
C. Application software
A. Disk Manager
D. Utility program
B. Finder
C. File Explorer 29. Which is NOT a utility program?

D. Library Explorer A. Word processor


B. Compression software
24. software, such as operating systems
and utility programs, consists of the pro- C. Back-up
grams that control or maintain the opera- D. Disk organisation
tions of a computer and its devices.
30. It is the essential center of a computer
A. System operating system that serves as the core
B. Application that provides basic services for all other
C. Management parts of the OS.
D. Program A. Shell
B. File system
25. A backup program
C. Kernel
A. makes a copy of files you select.
D. none of above
B. returns you to the previous program
C. undoes the last change you made 31. It acts as an intermediary between the
user and the computer.
D. none of the above
A. Operating System
26. If a computer file has been damaged to the B. Information System
point at which its data cannot be recov-
ered, then the file is said to be Lesson C. Disk Management System
8-2 D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 358

32. Which kind of software will offer a free 37. User Interface of MS-DOS is
trial for a short time before you need to A. Command line interface
pay?
B. Menu-driven interface
A. Open source software
C. Graphical user interface (GUI)
B. Freeware
D. none of above
C. Proprietary software
D. Shareware software 38. Which is not a task performed by the op-
erating systems?

NARAYAN CHANGDER
33. This following is an example of a periph- A. Managing RAM
eral (7-9)
B. Sending Error Messages
A. Processor
C. Saving files to the Hard Drive
B. Main Memory (RAM)
D. Sending Emails
C. Hard Disk Drive
D. ROM 39. How many instructions can be carried out
per pulse of the clock?
34. A black box; A. 1
A. is instructions that control processing B. 1000
B. is software not fully understood by C. 100000
most users
D. 10000000
C. are programs or sets of instructions
D. are physical units that make up a sys- 40. Programs and other operating information
tem used by a computer is called
A. Software
35. These are programs typically used to cre-
ate attractive, visually interesting presen- B. Hardware
tations C. Binary Code
A. Illustration programs D. Peripherals
B. Presentation graphics 41. What part of the system software enables
C. Image Editor multi tasking?
D. Adobe Photoshop A. Memory management
36. Define operating system B. File management
A. Program that coordinate all activities C. Processor management
among computer or mobile device hard- D. Peripheral management
ware.
42. These are programs that make copies of
B. Program that control activities of the files to be used in case the originals are
basic input output in the computer devices lost or damaged
A. Backup programs
C. Program that setup all the wire and
power off the computer hardware de- B. Antivirus
vices. C. Utility Software
D. none of above D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 359

43. Which of the following is the function for C. Applications


compression tool?
D. Operating Systems

PRACTICE BOOK» NOT FOR SALE


A. To shrink the size of the file
B. To manage the files in folder 49. What kind of software is copyrighted by
the author?
C. Perform file management related task
A. Shareware
D. none of above B. Proprietary software

44. A user interface C. Open Source


A. Provides a method to communicate D. All of these are copyrighted by the au-
with the system thor
B. Is a graphical layout
50. What is the purpose of peripheral man-
C. Is user management agement (as a part of the Operating Sys-
D. Allows users to have different ac- tem)?
counts A. Provides a method to communicate
45. Allows the user to compress the size of with the system
large files for easier storage. B. Manages your programs
A. Compression Software C. Allows the Operating System to man-
B. Antivirus Software age the hardware devices
C. Computer games D. Allows users to have different ac-
D. Presentation applications counts

46. These operating systems control a single 51. Define multiprocessing.


desktop computer
A. Allows a single user to work on two or
A. Stand-alone operating system more programs at the same time.
B. Network operating system B. Allows only one user to run one pro-
C. File compression program gram at a time.
D. Embedded operating system C. Supports two or more processors run-
ning programs at the same time.
47. The operating system for a computer does
the following: D. Enables two or more users to run pro-
gram simultaneously.
A. manages the disks and files
B. manages the computer’s resources 52. Memory in the CPU used to store used
C. manages the computer’s memory data and data that will be used frequently
is called
D. all of the above
A. Cache Memory
48. The following is not a type of Systems
Software (4-6) B. Random Access Memory
A. Device Drivers C. Read Only Memory
B. Utility Programs D. Virtual Memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 360

53. It is the outermost layer of the operating 58. These are designed to run all of its appli-
system that provides a way for you to cations and services thru a web browser.
communicate with the operating system.
A. Real-time OS
A. Kernel
B. Internet/Web OS
B. Shell
C. Multi-user OS
C. File system
D. Network OS
D. none of above

NARAYAN CHANGDER
59. File Management
54. What is Encryption software used to do?
A. Provides a method to communicate
A. Permanently change data with the system
B. Revert data to something it wasn’t be- B. Provides options to manage your files
fore and folders
C. Change data so it is unreadable by an C. allows the os to manage the hardware
interceptor devices
D. Change data so it is readable by an in- D. Allows users to have different ac-
terceptor counts

55. Simple applications that can be down- 60. is an electronic component that store
loaded cheaply; do not have capabilities of instructions waiting to be executed by the
full version. processor
A. App A. Random fetching memory
B. Application B. Random execute memory
C. Operating System C. Random access memory
D. Software Program D. Random devices

56. This type of visual display lets you use a 61. A web browser is an example of?
mouse to interact with the workspace on
A. Operating system software
the computer screen.Lesson 7-1
B. Application software
A. graphical user interface (GUI)
C. The Internet software
B. desktop
D. A touch screen interface
C. operating system
D. BIOS 62. Which of the following components or pe-
ripherals might be listed in the minimum
57. Memory-management technique that uses requirements for an application?
hard drive space as additional RAM
A. Video system
A. Virtual Machine
B. CD drive
B. Virtualization
C. Network connection
C. Virtual Memory
D. All of these may be part of the mini-
D. Virtualbox mum requirements for some application

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 361

63. This method of backup takes longer to per- 69. Question 3:A Virtual Machine is said to
form (7-9)

PRACTICE BOOK» NOT FOR SALE


A. Incremental A. Allow the user to play games with Vir-
B. Differential tual Reality Glasses
C. Full B. Allow the user to virtually use an Oper-
D. Fragmented ating System
64. All memory is measured in what? C. Allow a MAC to run on Windows
A. Meters (m) D. Hide the complexities of the hardware
B. Volume (v) from the user
C. Giga Bytes (GB)
D. Inches (in) 70. Security levels In which of the security lev-
els of the internet options, The IE browser
65. Used with mobile phones, GPS devices, will prompts you before downloading po-
and other mobile devices tentially unsafe contents (KLO 1.3.3)
A. iPhone OS A. High
B. Embedded Linux
B. Medium-High
C. Symbian OS
C. Medium
D. BlackBerry Operating System
D. Low
66. A proprietary operating system is
A. used by many different computer man-
71. components in a processor are:
ufacturers
B. similar to those of other manufactur- A. Control processing unit and Mathemat-
ers ical Unit
C. unique to a manufacturer B. Logical unit and mathematical unit
D. properly configured to operate
C. Control unit, arithmetic and logical unit
67. Linux based OS developed by Open Hand-
set Alliance (including Google). D. System unit and processing cycle
A. Windows Mobile
B. Windows Embedded 72. A is a flash device with a storage ca-
C. Android pacity similar to a small hard drive. They
are faster than hard drives, they have no
D. none of above moving parts, and they have lower power
68. Amount of time it takes to a storage de- consumption than hard drives.
vice to begin reading data A. Solid State Drive
A. access time
B. Hard Disk Drive
B. write time
C. random time C. Optical Drive
D. wait time D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 362

73. What type of software works with users, 78. Which of the following is NOT The role of
application software, and computer hard- the operating system:
ware to handle the majority of technical A. Providing the user interface
details
B. Managing programs
A. Application
C. Preventing basic security
B. Operating System
D. Managing hardware
C. Linux

NARAYAN CHANGDER
79. To scramble data so that it is unreadable
D. System software is a form of ?
74. Network Data can be protected using A. Compression
during transmission, so that if the data B. Encryption
was accessed by intruder a key will be C. Backing up
required to decipher the message (KLO
1.6.a) D. Defragmentation

A. Encryption 80. When you are implementing a system,


and are considered as factors to con-
B. Adding a security layer/Header
sider when determining system require-
C. data-leakage prevention software ments (KLO 1.2.3) (KLO 1.2.4)
D. hiding information A. Environment / user
B. Environment/ geography
75. With a graphical user interface (GUI), you
can C. Weather/ geography

A. see the graphic of the computer. D. Health/ safety

B. interact with menu and images. 81. Below are 2 advantages and 1 disadvan-
tage for Command Line Interface.Choose
C. play with the games. the disadvantage
D. interfere the graphic. A. Takes up less memory
76. What are the storage locations inside a B. Takes less processing power
CPU called? C. Can be very confusing to a beginner
A. Registers D. none of above
B. RAM slots 82. This is a rectangular frame that lets you
C. Control Memory view programs or documents.Lesson 8-1

D. Open Memory A. screen


B. desktop
77. Open Source Software is ?
C. window
A. NOT safe D. menu
B. Safe
83. Question 2:The following is not a type of
C. KIND OF safe Systems Software (4-6)
D. The safest A. Device Drivers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 363

B. Utility Programs 89. Designed for consumer and industrial de-


C. Applications vices that are not personal computers

PRACTICE BOOK» NOT FOR SALE


D. Operating Systems A. Windows Mobile
84. Question 4:Dividing tasks so that the Op- B. Windows Embedded
erating System appears to multitask is
C. Android
dealtwith under:(4-6)
A. Memory Management D. none of above
B. File Management
90. is a multitasking operating system de-
C. Processor Management veloped in the early 1970s by scientists at
D. Peripheral Management Bell Laboratories.

85. This type of back-up is slowest to restore A. Linux


from?
B. Perl
A. Incremental
C. NetWare
B. Differential
C. Full D. UNIX
D. Fragmented
91. Software that allows or help user to per-
86. Which is not in the category of software form related specific tasks
market?
A. Operating System
A. *OEM Software stands
B. Utility Program
B. *Open-Source Software
C. *Retail Software C. Word Processing
D. Embedded software D. Application Software

87. Which one of the following best describes


92. Which of the following best describes li-
utility software?
censing?
A. A series of gaming apps.
A. Official rules of rights to a program
B. Software that allows you to do specific
tasks e.g. Make slideshows and type let- B. A way to identify a program
ters.
C. Car license plate attachment
C. Software that keeps your computer
system healthy. D. A form of coding
D. none of above
93. It manages all the other programs on a
88. What type of back-up is quicker to restore computer.
from?
A. Application Software
A. Incremental
B. System Software
B. Differential
C. Full C. Operating System
D. Fragmented D. Hardware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 364

94. This is a list of shortcut commands that ap- 99. This was one of the first operating sys-
pears when an area of the screen is right- tems ever written.Lesson 7-2
clicked.Lesson 8-1 A. Linux
A. pull-down menu B. UNIX
B. pop-up menu C. Microsoft Windows
C. command menu D. Macintosh OS
D. startup menu 100. These coordinate computer resources and

NARAYAN CHANGDER
provides an interface between users and
95. When a computer is “swapping”, it is
the computer and run applications
A. moving data from the hard drive to a A. Operating systems
removable drive
B. Utilities
B. moving data from memory to the swap
C. Device Drivers
file on the hard drive
D. Translators
C. moving data between registers in
memory 101. Which of the following is an example of
D. none of the above a peripheral?
A. Processor
96. This is a utility program of Windows Op- B. RAM or Main Memory
erating System that removes unnecessary
files C. Hard disk drive

A. File History D. ROM

B. Disk Cleanup 102. Compared to open source software, retail


software are generally:
C. Optimize Drives
A. Less safe
D. Defragmenter
B. Safer
97. Question 9:Operating Systems will allo- C. The same
cate sections of RAM to the processes as D. none of above
part of:(4-6)
103. These are used to control and coordinate
A. Processor Management
computer that are linked together.
B. File Management
A. Desktop OS
C. Peripheral Management B. Virtualization
D. Memory Management C. Mobile OS
98. Software is; D. Network OS
A. instructions that control processing 104. which one of the following is not a Utility
B. programs or sets of instructions Program? (4-6)
A. Disk Defragmentation Tool
C. the meeting point between parts of a
system B. Disk Formatter
D. the general term of components C. Anti-Virus Software
needed to perform a task D. Web Browser

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 365

105. Which of these constrains we can over- 110. A(n) interface controls how users en-
come by changing the network topology ter data and instructions into a computer
from full mesh to ring topology (KLO and how information is displayed on the

PRACTICE BOOK» NOT FOR SALE


1.2.2) screen.
A. time constrains A. control
B. cost constrains B. utility
C. manpower constrains
C. user
D. location constrains
D. management
106. This is the general term for any program
and procedure running within your com- 111. These represent the minimum hardware
puter system. configuration required in order to success-
fully install and run an application
A. Software
B. Hardware A. Drivers
C. Peopleware B. Software requirement
D. None of the above C. System requirement
107. If a file is broken into pieces and the D. Hardware Specification
pieces are saved in different areas of a
disk, then the file is said to be Lesson 112. which one of the following is not a Utility
8-2 Program?
A. corrupted A. Disk Defragmentation Tool
B. fragmented B. Disk Formatter
C. separated C. Web Browser
D. archived D. Anti-Virus Software
108. Which is a benefit of using a Graphical
113. In Windows, this indicates which applica-
User Interface (GUI)?
tion was used to create a file and the file’s
A. You need to use commands to control format.Lesson 8-2
the computer.
A. file name
B. It has a text based interface.
B. file extension
C. You can use a mouse or finger to click
on brightly coloured icons. C. file type
D. none of above D. file size
109. A computer’s BIOS will
114. Designed for Apple Mobile phones and
A. check for the presence of peripherals mobile devices.
like mouse, sound card, scanner
A. iPhone OS
B. defragments the hard disk
B. BlackBerry Operating System
C. be loaded first when the computer is
powered on C. Palm OS and Palm webOS
D. none of the above D. Symbian OS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 366

115. What does the term” Defragmentation” B. Free software downloaded from the in-
mean? ternet.
A. Putting the fragmented data together C. Software bought from a shop.
B. Makes space on the HDD by getting rid D. none of above
of any unused
121. Question 11:This following is an example
C. Scans your computer for viruses. of a peripheral (7-9)
D. none of above A. Processor

NARAYAN CHANGDER
116. I use what application to go to web- B. Main Memory (RAM)
pages? C. Hard Disk Drive
A. Wifi D. ROM
B. Internet Explorer / Firefox 122. A Virtual Machine is said to
C. Google Chrome/Safari A. Allow the user to play games with Vir-
D. Ethernet Cable tual Reality Glasses
B. Allow the user to virtually use an Oper-
117. This type of back-up is slowest to restore
ating System
from? (7-9)
C. Allow a MAC to run on Windows
A. Full
D. Hides the complexities of the hard-
B. Fragmented ware from the user
C. Incremental
123. Question 1:What type of Software is
D. Differential needed to control the computer’s hard-
118. Key job of the operating system. Al- ware? (1-3)
lows programs to be stored safely and ef- A. Programming Software
ficiently. Restricts each program to access- B. Systems Software
ing and amending its own area of data.
C. Application Software
A. Processor scheduling
D. Bespoke Software
B. Interrupt service routines
124. Delete temporary files.
C. Memory management
A. File Compression Programs
D. Backing store management
B. Backup and recovery utilities
119. What type of software is needed to con- C. Clean Up Utilities
trol the computer’s hardware? (1-3)
D. Security programs
A. Programming Software
125. Why do files have an extension e.g.
B. Systems Software
.jpeg
C. Application Software
A. So they can be downloaded quicker.
D. Bespoke Software
B. So they can be saved correctly.
120. Which one of these best describes propri- C. So the OS know which software to
etary software? open them in.
A. A type of operating system. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 367

126. A hard disk drive contains C. Only needed if you connect to the In-
A. disks ternet

PRACTICE BOOK» NOT FOR SALE


B. platters D. Very Expensive to buy
C. CDs
132. File property is:
D. no moving parts
A. Additional data stored about a file
127. Operating system that are designed
specifically for mobile devices and many B. Property of file that can be set
consumer electronics deviceThis descrip-
C. Basic information about files, name,
tion refers to
size and date modified
A. Mobile OS
D. Process of reducing the size of a file
B. Desktop OS
C. Server OS 133. What is the purpose of an Operating Sys-
D. none of above tem?

128. This programs organizes, analyzes, and A. To keep the computer maintained and
graphs numerical data in working order
A. Presentation B. To control the running of the computer,
B. Word Processors manage apps, users and resources
C. Image Editor C. To prevent the computer from getting
D. Spreadsheet a virus

129. Why will someone encrypt their files? D. none of above

A. To scramble their data so that unautho-


134. What law states that your data can be
rised users can’t access it.
handed over to the police or security ser-
B. To scramble their data so that they get vices to prevent terrorism and crime?
confused.
A. Data Protection Act
C. To clean up the useless data.
D. none of above B. Computer Misuse Act
C. Regulation of Investigatory Powers
130. A(n) operating system enables two
Act (RIPA)
or more users to run programs simultane-
ously. D. Copyright Act
A. multiplied
B. multiuser 135. Question 8:Windows, Icons, menus and
Pointers are all part of this? (1-4)
C. engaged
A. Graphical User Interface
D. rasterized
B. Command Line Interface
131. Utility programs are usually ?
A. Part of the Operating System C. Menu Interface
B. Bought on a disk from a store D. No User Interface

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 368

136. This testing is carried out by the software C. Embedded operating systems
developer’s in-house testing team.It is es- D. None of the above
sential because it often reveals both errors
and omissions in the system requirements 142. Choose the best answer. It is an inter-
definition. face that displays text, and its commands
are usually typed on a command line using
A. Beta testing
a keyboard.
B. Alpha testing
A. Command prompt

NARAYAN CHANGDER
C. Black box testing
B. Graphical User Interface
D. White box testing C. Text-based User Interface
137. A type of software used to create and D. none of above
manipulate documents that contain text
and graphics. 143. A type of operating system which allows
more than one program to run at the same
A. Database time.
B. Spreadsheet A. Multi-tasking operating system
C. Word Processor B. Multi-user operating system
D. Graphics and Multimedia Software C. Real time operating system
138. An example of software would be D. Distributed operating system

A. MS Power Point 144. Is a long sequence of bits used by encryp-


tion algorithms? (U25 KLO 3.1)
B. keyboard
A. Biometric
C. monitor
B. Cryptography key
D. printer
C. Token
139. Data is; D. Encrypted keys
A. individual facts input into a system
145. It is starting of a computer that has been
B. physical units that make up a system turned off
C. programs or sets of instructions A. Warm Boot
D. users of a system B. Soft Boot
140. Designed for Palm devices. C. None of the above
A. iPhone OS D. none of above

B. BlackBerry Operating System 146. A set of programs containing instructions


that work together to coordinate all the
C. Palm OS and Palm webOS
activities among computer hardware re-
D. Symbian OS sources.
141. These are operating systems that are en- A. System Software
tirely stored within a device B. Utility Software
A. Stand-alone operating systems C. Operating System
B. Network operating systems D. Translator

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 369

147. Microsoft excel is an example of Soft- 152. File attribute is:


ware. A. Additional data stored about a file

PRACTICE BOOK» NOT FOR SALE


A. Spreadsheet B. Property of file that can be set
B. Word Processing C. Basic information about files, name,
C. Presentation size and date modified
D. Process of reducing the size of a file
D. Reference
153. Define system software
148. These are programs that perform specific
tasks related to managing computer re- A. Program that control or maintain the
sources operations of the computer and it devices

A. Application Software
B. Program that control the user and
B. Antivirus maintain the devices input and output.
C. Virtualization C. Program that control the ability of the
D. Utility Software user and people that use the computer
and it devices.
149. Unencrypted messages are called which? D. none of above
(1-3)
154. Which one of these best describes a
A. Plaintext Graphical user Interface?
B. Ciphertext A. They are easy to use because they
C. Keytext make use of icons.

D. Originaltext B. They can be complicated for inexperi-


enced users.
150. A utility software is used to C. They use special command to do tasks.
A. Maintain a computer
D. none of above
B. Provides options to manage your files
and folders 155. Spooling helps because
C. Allows the os to manage the hardware A. the computer is released to do other
devices things while still printing
D. Allows each user to have different ac- B. print jobs go more smoothly with less
counts on the system stop and go
C. it is a more secure method of access-
151. The is a small symbol displayed on
ing data
the screen that moves when the user
moves the mouse D. none of the above

A. icon 156. This type of OS can be found on devices


such as printers, ATM’s and Cars. Usually
B. menu
only has one job and is often designed for
C. window specific hardware in mind.
D. pointer A. Real-time operating system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 370

B. Embedded system 162. Which of the following is/are Online


C. Distributed operating system Storage?
D. multi-tasking system A. One Drive
B. Icloud
157. These are programs that organize, ana-
lyze and graph numerical data such as bud- C. Google Drive
gets and financial reports D. All of them
A. Database 163. What is the main benefit of proprietary

NARAYAN CHANGDER
B. Suite software?
C. Utility A. It has been thoroughly tested.
D. Spreadsheet B. It can be changed by anyone.
C. It is expensive.
158. Which of these is a benefit of a command
line interface? D. none of above
A. More control over OS. 164. What are the two main categories of soft-
B. Bright coloured icons. ware?
C. More apps. A. Applications & Systems
D. none of above B. Systems & Utilities
C. Utilities & Applications
159. RAM is what kind of memory?
D. Applications & Operations
A. Permanant
B. Forever 165. Ahmad use this utility program so that
the OS accesses data more quickly and pro-
C. Slow grams run faster.
D. Temporary A. Power source utility
160. Uses data structures consisting of data B. Disk defragmenter utility
fields and methods together with their in- C. Disk cleanup utility
teractions (objects) to design programs
D. Run away and never come again.
A. Procedural programming
166. To scramble data so that it is unreadable
B. Object-oriented programming
is a form of ? (4-6)
C. Declarative programming
A. Encryption
D. Functional programming
B. Compression
161. Which one of these best describes backup C. Defragmentation
utilities?
D. Backing up
A. Taking a copy of all of your files and
settings in case they are lost. 167. Which of these is not applications soft-
ware?
B. Re-organising your files into a sensible
order. A. Spreadsheet
C. Deleting any unnecessary files to B. Database
make space on the hard drive. C. Word Processor
D. none of above D. Anti-Virus

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 371

168. A type of specialized suite that includes 173. What is the purpose of a device driver?
a variety of programs designed to make
A. used to keep your computer files well-
computing easier and safer.

PRACTICE BOOK» NOT FOR SALE


organized
A. System software
B. used to write documents and create
B. Application software spreadsheets
C. Utility
C. make your hardware peripherals avail-
D. None of the above able to your applications
169. These are programs that works with the D. deliver packages to your door
operating system to allow communication
between a device and the rest of a com- 174. Diagnose and repair problems related to
puter system your hard drive
A. Antivirus A. Search Tools
B. Utility software B. Diagnostic Programs
C. Device Driver C. Disk Management Programs
D. None of the above
D. Uninstall utilities
170. Which of the following is NOT an Operat-
ing System 175. Which type of utility program that works
as a tool to reorganise files & unused
A. Android space on computer’s hard disk?
B. Word
A. File manager
C. iOS
B. Defragmenter
D. Windows
C. Disk cleanup
171. A type of software that allows you to cre-
ate, play, and edit photo, audio, and video D. Device driver
files.
176. It is a program that acts an interface
A. Database between the software and the computer
B. Presentation Software hardware.
C. Word Processor A. Cache
D. Graphics and Multimedia Software B. Operating system
172. What is not a purpose of system soft- C. CPU
ware?
D. RAM
A. A set of programs that are written for
a specific purpose 177. Which one is not a developing software
B. control computer hardware category?
C. provide basic functionality to com- A. Programming language
puter B. Translator software
D. act as an interface between user, ap-
C. Linker and Loader
plication software and computer hard-
ware D. System Utilities softwares

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 372

178. Which part of the operating system will A. command-line interface


split the disk in storage sectors and decide B. menu-driven interface
which sectors to write data to?
C. performance-monitor interface
A. Memory management
D. graphical user interface (GUI)
B. File and disk management
184. LANs stands for (KLO 1.6.b)
C. User management
A. Local Application Network
D. User interface

NARAYAN CHANGDER
B. location Area Node
179. Allows the user to compress the size
C. Limited Area Network
of large files for easier storage sending
data. D. Local Area Network
A. Compression Software 185. These are general-purpose programs that
B. Antivirus Software creates text-based documents.
C. Computer games A. Word Processors

D. presentation apllications B. Spreadsheet


C. Presentation
180. The ability to use files on differing oper-
D. Image Editor
ating systems is called Lesson 8-2
A. cross-platform compliance 186. Helps manage the system resources, in-
cluding memory management and schedul-
B. cross-platform coexistence
ing. All Applications use this to send and
C. cross-platform communication receive data to and from devices which lies
D. cross-platform compatibility below the operating system.
A. operating system
181. Fill in the blank. translate the whole
program as an object code at once. B. Kernel
A. Compilers C. Control Unit
B. Interpreters D. Application software

C. Translator 187. This is restarting a running computer


D. none of above without turning off the power.
A. Warm boot
182. These let the user select options for con-
B. Soft boot
trolling and customizing options.Lesson 8-
1 C. None of the above
A. system preferences D. none of above
B. system defaults 188. Compression is:
C. preferential treatment A. Additional data stored about a file
D. system states B. Property of file that can be set
183. With a , users interact with menus C. Basic information about files, name,
and visual images such as icons, buttons, size and date modified
and other objects to issue commands. D. Process of reducing the size of a file

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 373

189. What does the word autonomous mean? 194. Which one is not a computer management
A. to act on their own without human in- software?

PRACTICE BOOK» NOT FOR SALE


put A. Operating system software.
B. to be able to process information B. Device drivers.
quicker than a human
C. System Utilities
C. to be able to drive a car
D. Translator software
D. to create a robot

190. What does the term ICT stand for? 195. In an operating system that provides a
GUI, this is the background on which all
A. Information and Cultural Technology
work is performed.Lesson 8-1
B. Information and Communication Tech-
nology A. screen

C. Identification of Current Transfers B. desktop


D. Information for Compliance Technol- C. window
ogy
D. menu
191. When a computer starts, you may be
asked to provide a username and pass- 196. A(n) operating system is a complete
word as part of the process.Lesson 8- operating system that works on a desktop
1 computer, notebook computer, or mobile
computing device.
A. login
A. multitasking
B. boot
C. BIOS B. media-based

D. interace C. single-user

192. Needle on a magnetical drive that writes D. stand-alone


data to the disc
197. Two examples of software
A. read/write head
A. Mouse and word
B. read/write pit
B. OS and Internet Browser
C. read/write land
D. read/write needle C. Keyboard and Mouse
D. OS and webcam
193. Which of the below is a definition of ‘Ap-
plication’
198. This program contains data needed by a
A. General term for computer programs program to operate an input or output de-
B. Software designed to carry out a use- vice.Lesson 7-2
ful real-world task A. program utility
C. A set of commands that a processor B. driver utility
can recognise and act upon
C. backup utility
D. A combination of hardware and operat-
ing system D. compression utility

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 374

199. Events that occur between the time you 204. The CPU is called the of the com-
turn the computer on and when it becomes puter.
ready to use.
A. arm
A. Boot process B. mother
B. Program check C. brains
C. Start-up D. leg
D. Operating System Set-up

NARAYAN CHANGDER
205. An assembler translates assembly code
200. A Virtual Machine is said to (7-9) language into

A. Allow the user to play games with Vir- A. High Level Language
tual Reality Glasses B. Machine Code
B. Allow the user to virtually use an Oper- C. Processor Code
ating System
D. Mnemonics
C. Allow a MAC to run on Windows
206. Define multitasking.
D. Hide the complexities of the hardware
from the user A. Allows a single user to work on two or
more programs at the same time.
201. Software is used to control hardware de- B. Allows only one user to run one pro-
vices and allow an OS use the hardware gram at a time.
A. Device Management C. Supports two or more processors run-
B. Device Driver ning programs at the same time.
C. Device System D. Enables two or more users to run pro-
gram simultaneously.
D. Hardware Peripheral Device
207. Question 5:Dividing processor time be-
202. Which one of the following is a compres- tween processes so that they appear to
sion software? multitaskis known as:(1-3)
A. OptimFROG A. Time Slicing
B. MacOS B. Fish Slicing
C. Steam C. Time waiting
D. none of above D. Idle Time

203. This method of backup is quicker to per- 208. A is a network node connecting
form once an initial backup file is created two networks that use different protocols.
(7-9) (KLO 1.5)
A. Incremental A. Host
B. Full B. hub
C. Fragmented C. Gateway
D. Differential D. router

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 375

209. Which of the following is not type of Ap- 214. Which of the following is NOT a function
plication Software of Operating System?

PRACTICE BOOK» NOT FOR SALE


A. Spreadsheet A. Booting the computer
B. Word Processing B. Managing resources and jobs
C. Presentation C. Interfacing with users (typically via a
GUI)
D. Database
D. Disk management
210. A(n) operating system supports two
215. Most desktop and laptop computers to-
or more processors running programs at
day use this type of operating sys-
the same time.
tem.Lesson 7-1
A. virtual
A. real-time
B. indexed
B. single-user/single-task
C. multiprocessing C. single-user/multi-task
D. fault-tolerant D. multi-user
211. Reduce the size of files so they take up 216. The ability of an operating system
less storage space on a storage medium to switch between different applications
or can be transmitted faster over the In- stored in memory
ternet
A. Diversion
A. File Compression Programs
B. Multitasking
B. Backup and recovery utilities C. Operation
C. Clean Up Utilities D. Programming
D. Security programs
217. Choose the best answer. The follow-
212. The on-screen tools you use to interact ing are considered as system support pro-
with a computer are called the Lesson grams except for:
7-1 A. Utility programs
A. operating system B. Backup utilities
B. interface C. Data recovery software
C. applications D. Operating system
D. controls 218. I plug my pendrive into the USB port. Au-
tomatically, the window popup with the
213. Software that controls all of the comput- content inside of my pendrive. This pro-
ers hardware is cess called
A. Program Software A. coordinate tasks.
B. Application Software B. driver.
C. Instructional Software C. plug and play.
D. System Software D. configure device.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 376

219. What are the two broad categories of 224. Which of these is an example of a periph-
computer software? eral device?
A. System Software ANDUtility Software. A. Processor
B. Main Memory (RAM)
B. Utility Software ANDApplication Soft- C. Hard Disk Drive
ware.
D. Monitor
C. System Software AND
225. A collection of programs that manage

NARAYAN CHANGDER
D. Application Software ANDCAD, CAM and coordinate the activities taking place
Software. within a computer system
220. Disk Cleanup, Task Manager and File Re- A. Payroll System
covery are considered to be B. Library System
A. root directories C. POS System
B. file management systems D. Operating System
C. Windows utility programs 226. What rearranges parts of the file on the
D. Accessibility Utilities disk drive to move them all to the same
area for quicker access?
221. Which one of these best describes appli- A. Firewall
cation software? B. Disk Defragmentation
A. Antivirus software. C. File Compression
B. Software that allows you to make D. Encryption
slideshows and type letters.
227. Designed for use with smart phones.
C. Software that keeps your computer
system healthy. A. iPhone OS

D. none of above B. BlackBerry Operating System


C. Palm OS and Palm webOS
222. This type of back-up is quicker to restore D. Symbian OS
from?
A. Incremental 228. Which are embedded operating systems
A. Desktop OS
B. Differential
B. Virtualization
C. Full
C. Mobile OS
D. Fragmented
D. Network OS
223. What software would be used to create 229. Process of starting or restarting a com-
an information sheet e.g. a revision mat puter.
A. Image editing software A. Start the computer.
B. Word processor B. Booting.
C. Presentation software C. Cold computer.
D. Web authoring software D. Warm computer.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 377

230. Which method of backup takes longer to 235. What type of back-up is slowest to re-
perform? store from?

PRACTICE BOOK» NOT FOR SALE


A. Incremental A. Fragmented
B. Full B. Incremental
C. Fragmented C. Differential
D. Differential D. Full

231. With a command-line interface, 236. Data Harvesting Scandle who is respon-
sible
A. user can give command by lining up the
instructions. A. Facebook
B. a user can command anyone to help B. Cambridge analytica
them. C. Both
C. user can interfere with any command. D. None

237. What is the function of a firewall?


D. a user uses the keyboard to enter data
and instructions. A. Putting fragmented data back to-
gether.
232. What does an incremental backup en-
B. Stopping unauthorised access in the
tail?
computer system.
A. Makes copies only of the new files
C. Scans the computer for viruses.
B. Saves your backup to secondary stor-
D. none of above
age
C. Makes copies of all files 238. Utility Programs that:Makes a duplicate
copy of selected file or entire hard disk
D. Makes a copy of the entire drive
A. Program Uninstaller
233. Which part of the operating system will
B. Disk Scanning Program
move data from the RAM to the virtual
memory to allow the computer to perform C. Backup Utility
tasks as though the computer had more D. Data Recovery Utility
RAM?
239. What is Mac operating system known
A. Memory management
as?
B. File and disk management
A. iOS
C. User management
B. OS X
D. User interface C. Windows
234. Why might someone encrypt a file? D. Windows 10
A. To make it easier to send via the inter- 240. These programs carry out precise and
net. accurate tasks.It helps manage, maintain
B. To make sure people can access it. and control all computer resources.
C. To stop people from accessing it. A. Operating System
D. none of above B. Application System

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 378

C. Utility System 246. A type of software that allows a single


D. None of the above physical computer to operate as though it
were two(2) or more separate and inde-
241. Make the backup and restoration process pendent computers.
easier A. Virtualization
A. File Compression Programs B. Antivirus
B. Backup and recovery utilities C. Utility

NARAYAN CHANGDER
C. Clean Up Utilities D. None of the above
D. Security programs
247. This interface requires the user to type in
242. The discs that are used to store instruc- codes or words
tion in a magnetic hard drive are called A. Command Line
A. usb B. Graphical
B. ssd C. Menu Driven
C. platter D. none of above
D. actuator
248. “Software which can be used, modifed
243. Which type of operating system is used and improved by anyone and can be re-
to control large equipment and to regulate distributed freely”Above statement refers
factory operations? Lesson 7-1 to:
A. real-time A. Proprietary System
B. single-user/single-task B. Open source system
C. single-user/multitasking C. Freeware System
D. multi-user D. Shareware System

244. Which of the following best describes a 249. Two types of system software are
command line interface? A. application software and utility pro-
A. It is made up of colourful icons to click grams
on. B. Web browsers and application soft-
B. It is operated using special commands. ware
C. operating systems and utility pro-
C. It is operated by touching the screen grams
with your finger. D. operating systems and Web browsers
D. none of above
250. What is the name of the default browser
245. Which one of these is not a feature of and that comes with the Macintosh Operating
Operating system (OS)? System?
A. File management. A. Opera
B. Use of Utility software. B. Safari
C. A very fast clock speed. C. Spotlight
D. none of above D. Firefox

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 379

251. Which of the following is NOT a system B. driver utility


utility? C. back-up utility

PRACTICE BOOK» NOT FOR SALE


A. antivirus program D. compression utility
B. disk checking program
257. Which one of the following best describes
C. word processing program managing User Accounts?
D. disk defragmenting program A. Being able to give users access to cer-
252. These enables users to collaborate on doc- tain parts of a computer system.
uments with other online. B. Being able to add new hardware to a
A. Cloud Storage computer system.
B. Email C. Being able to stop viruses attacking
the computer system.
C. Cloud Computing
D. none of above
D. All of the above
258. What lets the computer’s hardware and
253. Enables users to interact with a computer
software work together?
system through windows, icons, menus
and pointers. A. Operating System
A. application software B. Application Software
B. system software C. Monitor
C. Graphical user interface D. Central Processing Unit
D. Operating system 259. Describe the purpose of system utility
software
254. What is an application?
A. Computer system maintenance
A. The apps you have on you phone
B. To keep personal infomation secure
B. Programs that are designed to per-
form a specific task C. Washing machine
C. A form created by someone made to D. Lets the user interact with the com-
fill out puter
D. none of above 260. Version (flavor) of UNIX available with-
out charge over the Internet
255. Which of the following is NOT a category
of application software A. Windows
A. Integrated software B. MAC OS
B. General Purpose software C. UNIX
C. Entertainment software D. LINUX
D. Special Purpose software 261. This operating system is installed on
256. This type of software copies data from a more than 90 percent of personal comput-
hard drive to another storage device, such ers.Lesson 7-2
as a CD-R drive.Lesson 7-2 A. Linux
A. program utility B. UNIX

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 380

C. Microsoft Windows 267. A rectangular area that can contain a doc-


D. Macintosh OS ument, program, or message.
A. Window
262. Encryption
A. Jumble up a message B. Textbox

B. Saves your file to secondary storage C. Title Bar


C. Translates a file into binary D. None of the above

NARAYAN CHANGDER
D. Reduces the size of a file
268. It is a type of program that protects com-
263. The von Neumann architecture proposes puter systems from viruses and other dam-
the design for a stored program computer aging programs.
where both and are stored in the A. Antivirus
same memory.
B. Utility software
A. instructions & data
B. data & power C. File compression programs

C. questions & answers D. None of the above


D. ant & dec 269. Which utility is used to exit from a non-
264. Full backup.. responsive program?
A. Makes copies only of the new files A. Task Manager
B. Saves your backup to secondary stor- B. Disk Cleanup
age
C. System Refresh
C. Makes copies of all files
D. File Explorer
D. Only allows you to make a double copy
270. Windows is a scaled-down Windows
265. Software applications are most likely to
operating system designed for use on com-
list what kind of operating system require-
munications, entertainment, and comput-
ment?
ing devices with limited functionality.
A. An operating system cost
A. UNIX
B. An operating system speed
B. NetWare
C. A minimum operating system version
D. A maximum operating system version C. Server 2008
D. Embedded CE
266. What do we call groups of online servers
that allow you to easily share and store
271. Which of the following is NOT a common
documents outside of your local com-
type of operating system?
puter?
A. Firefox
A. Desktops
B. Cloud computers B. Mac OS X
C. Mainframes C. Windows
D. Laptops D. Linux

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 381

272. These are programs that reduce the size 277. A set of instructions that tell the com-
of computer files puter what to do.

PRACTICE BOOK» NOT FOR SALE


A. Antivirus A. Program
B. File compression programs B. Path name
C. WYSIWYG
C. Backup programs
D. Multitasking
D. None of the above
278. The instructions that tell the computer
273. Aryan buy a new printer. If the new what to do:
printer attached to a computer, the
A. Hardware
must be installed before the device can be
used. B. Input

A. driver C. Software
D. Ooutput
B. kernel
C. platform 279. A collection of related data
A. Data Type
D. manager
B. Information
274. A is a thick magnetic disk encased in C. Blog
a thicker protective shell. It consists of
several aluminum platters, each of which D. Database
requires a read/write head for each side. 280. Which of the following is an Output de-
A. Hard Disk Drive vice?

B. Solid State Drive A. Printer


B. Mouse
C. Optical drive
C. Microphone
D. Flash drive
D. Keyboard
275. How can we add trusted sites? (KLO 281. Proprietary operating system for comput-
1.3.5) ers made by Apple Corporation.
A. Firewall A. Windows
B. Router settings B. MAC OS
C. Browser C. UNIX
D. we can not D. LINUX
282. A(n) utility allows users to copy se-
276. Question 6:Operating Systems need to
lected files or an entire hard disk to an-
manage System ? (1-3)
other storage medium.
A. Objectives
A. copy
B. Electricity B. restore
C. Restores C. safeguard
D. Resources D. backup

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 382

283. is an assembled group of data. Al- 288. A foreground task has more than a
lows easy and efficient storage, retrieval background task.
and modification of data. (KLO 1.4)
A. buffers
A. Memory
B. microseconds
B. BIOS settings
C. registers
C. Server
D. time slices
D. Database

NARAYAN CHANGDER
289. With the Macintosh Operating System
284. The operating system lets you change where do you go in order to make any
some features of the , such as the look changes to your computer (desktop back-
of the background or the placement of the ground, printer settings, trackpad ges-
icons.Lesson 7-1 tures, etc )?
A. options A. System Preferences
B. programs B. Finder
C. desktop C. Mission Control
D. memory D. Launchpad

285. Choose the best answer. The following 290. holds many components of the sys-
are considered as roles of the operating tem and provides connectors for other pe-
system except for: ripherals.
A. Management of the processor. A. USB
B. Management of the RAM. B. Touch screen
C. Management of input/output. C. Motherboard
D. Management of the motherboard. D. CPU

286. Each platter on a magnetic hard drive is 291. It is an online diary or commentary
broken down into tracks. What part of the
A. Article
track is data stored into?
B. Channel
A. Section
C. Site
B. Sector
D. Blog
C. Track Segment
D. Quadrant 292. Which of these is a main function of an
Operating System (OS)?
287. Smaller files take up less
A. Provides a platform to run apps.
A. Storage place
B. Provides a permanent storage of data.
B. Load more quickly
C. Streaming and downloading C. Provides temporary memory.
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 383

293. A type of suite that is stored at a server C. boot


on the Internet and is available anywhere
D. all of the above
you can access the internet.

PRACTICE BOOK» NOT FOR SALE


A. Database 299. How would I open the Task Manager?
B. Email A. Shift+Alt+Del
C. Cloud
B. Ctrl+Alt+Del
D. None of the above
C. Ctrl+Enter+Del
294. Protect computers and users
D. Ctrl+Alt+Enter
A. File Compression Programs
B. Backup and recovery utilities 300. Designed to search for files on the user’s
hard drive
C. Clean Up Utilities
D. Security programs A. Search Tools
B. Diagnostic Programs
295. What does a full backup entail?
A. Makes copies only of the new files C. Disk Management Programs
B. Saves your backup to secondary stor- D. Uninstall utilities
age
301. The type of software that the users run
C. Makes copies of all files
to do various tasks on a computer is
D. Only allows you to make a double copy
A. System Software
296. A full-featured software that can run
complex software like a word processor B. Application Software
or spreadsheet. C. Utility Software
A. Application D. Operative Software
B. Apps
C. Software Program 302. Windows, icons, menus and pointers are
all part of what?
D. Operating System
A. Graphical user interface
297. When two programs try to occupy the
same space in RAM, one or both may do B. Command line interface
this.Lesson 7-1 C. Menu interface
A. resolve D. Objects interface
B. load
C. run 303. What does the term POST stand for? Les-
son 8-1
D. crash
A. power-on start-up test
298. This term means “to turn a computer
on”.Lesson 8-1 B. power-on system test

A. launch C. power-on software test


B. POST D. power-on self test

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 384

304. A collection of instruction that performs B. MS Publisher


a specific tadka when executed by a com- C. Keyboard
puter
D. none of above
A. Application Software
B. System Software 310. Networks, servers, mainframes, and
supercomputers allow hundreds to thou-
C. Computer Hardware sands of users to connect at the same time,
D. Computer Software and thus are

NARAYAN CHANGDER
305. During the execution phase in the CPU, A. single user
calculations may need to be performed. B. single processing
Which part of the CPU does this?
C. multiuser
A. Arithmetic Logic Unit (ALU)
D. multiprocessing
B. Control Unit (CU)
311. Which method of backup is quicker to per-
C. Accumulator (ACC)
form once an initial backup file is created?
D. Memory Address Register (MAR)
A. Full
306. This type of program can check a disk and B. Differential
fix any problems it finds.Lesson 8-2
C. Fragmented
A. antivirus program
D. Incremental
B. system utility program
312. Halim wants to play interactive 3D
C. disk scanner programm
games using desktop computer. What
D. operating system program adapter that Halim should install?
307. Which is the fastest type of cache mem- A. Sound card
ory? B. Network card
A. Level 1 C. Video card
B. Level 2 D. Joystick card
C. Level 3
313. Function of system software is to serve
D. Level 4 as between user, application software
and computer
308. These allows the devices to communicate
with the operating system of the com- A. interface, hardware
puter B. control, application
A. Operating system C. interface, application
B. Utilities D. control, hardware
C. Device Drivers
314. Three functions of the operating system
D. Translators
A. User Interface, multitasking, commu-
309. An example of the computer’s hardware nicates with hardware via device drivers
would be
A. MS Word B. User Interface, multitasking, saving

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 385

C. fetch, decode and execute instructions 320. Files can be grouped together into
these.Lesson 7-2

PRACTICE BOOK» NOT FOR SALE


D. memory management, fetching in- A. folders
structions, user interface
B. utilities
315. High Level Languages (Python, VB, C#) C. programs
need to be translated into before it can
be executed by the microprocessor. D. operating systems
A. Machine Code 321. “Privately owned and limited to a spe-
B. Mnemonics cific vendor or computer model and need
C. Assemblers yearly licensed”Above statement refers
to:
D. Compliers
A. Proprietary System
316. A type of software that lets you calculate
B. Open source system
and organize numeric information.
A. Database C. Freeware System

B. Spreadsheet D. Shareware System


C. Presentation Software 322. A screen causes a monitor’s screen to
D. Graphics and Multimedia Software display a moving image or blank screen if
no keyboard or mouse activity occurs for
317. This operating system is designed to run a specified period of time.
on computers made by Apple.Lesson 7-2
A. manager
A. Linux
B. saver
B. UNIX
C. Microsoft Windows C. utility

D. Macintosh OS D. protector

318. A single user/ operating system al- 323. This is also known as a photo editor, this
lows a single user to work on two or more specialized graphics program edits or mod-
programs that reside in memory at the ifies digital photographs.
same time. A. Presentation
A. multitasking
B. Spreadsheet
B. interfacing
C. Image Editor
C. command-based
D. Word Processor
D. throttle
324. A type of system software that allows a
319. Select a device which contains an embed-
user to perform maintenance-type tasks.
ded system
A. Toaster A. System software
B. Kettle B. Utility software
C. Microwave Oven C. Operating system
D. Iron D. Desktop stand-alone

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 386

325. It refers to the manipulation of docu- C. Restoration of files


ments and data in files on a computer. D. Resources
A. File Management
331. The predominate personal operating sys-
B. Data Management tem developed by Microsoft Corporation
C. Information Management A. Windows
D. Disk Management B. MAC OS
326. A software repository is ?

NARAYAN CHANGDER
C. UNIX
A. Software already available for pur- D. LINUX
chase
332. An application designed to be down-
B. An online collection of software
loaded to a handheld device.
C. combination of hardware and systems
A. system unit
software that supports the running of ap-
plications B. malware
D. none of above C. mobile app
D. Instagram
327. Utility Programs that:Detect and correct
logical errors on hard disk 333. A signal from a software program, hard-
A. Program Uninstaller ware device or internal clock to the CPU.
B. Disk Scanning Program A. process
C. Disk Defragmenter B. Instruction
D. Data Recovery Utility C. processor scheduling
D. Interrupt
328. Which of the following is NOT a function
of an operating system 334. What is the name given to software that
A. Managing resources can be used by many people for a wide
range of tasks?
B. Providing user interface
A. Custom-written
C. Perform specific operations
B. Integrated
D. Running applcations
C. General-purpose
329. Windows XP, Windows 7, and iOS 12
are examples of: D. Special-purpose

A. Operating systems 335. The software that runs on a computer


B. Application software that is responsible for the management of
the computer. Provides user interface, file
C. Utility software management, memory management, con-
D. General Purpose software trols hardware, etc

330. Operating systems need to manage A. Application software


what? B. Operating system
A. Objectives C. system software
B. Electricity D. control unit

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 387

336. Which of the following is NOT a definition 341. Fill in the blank:Open Software
of System Software? A. Source

PRACTICE BOOK» NOT FOR SALE


A. Enables boot process B. Site
B. Transfers files C. Resource
C. Controls software configuration D. none of above
D. Launches applications 342. Data Encryption is done by some of the
network protocols during data transfer,
337. A acts as a barrier between your com- one of these protocols is (KLO 1.3.1)
puter and the internet. Checks which pro-
A. Diameter Protocols
grams are trying to access your computer
via the internet, or internet via your com- B. AAA framework
puter. C. TCP/IP protocol
A. Anti-Virus D. Transition protocols
B. Switch 343. The physical objects that make up the
C. Firewall computer system:
A. Software
D. Blockwall
B. Storage
338. Which of the following devices helps you C. Input
to connect your network to the internet
D. Hardware
while hiding your local IP (KLO 1.6.c)
A. Bridge 344. Which of the following is an Input de-
vice?
B. Modem
A. Printer
C. Router
B. Monitor
D. Repeater C. Speakers
339. Programs that control or maintain the op- D. Keyboard
erations of the computer and its devices. 345. Remove programs from your hard drive
A. Operating System without leaving bits and pieces behind
B. Utility Software A. Search Tools
C. System Software B. Diagnostic Programs
C. Disk Management Programs
D. Compression Software
D. Uninstall utilities
340. An Operating System is
346. The instructions for the microprocessor
A. Used for creating graphs and docut- have two parts. The two are called
ments and
B. The most common type of system soft- A. opcode and operand
ware B. operator and opcode
C. Only found in desktop computers C. instruction and data
D. All of these D. ant and dec

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 388

347. Which of the following tasks is NOT per- 352. Which of the following is an example of
formed by the operating system? Lesson specialized programs combined in a unified
7-1 package
A. managing computer memory A. Windows 10
B. managing the CPU B. Microsoft Word
C. managing the formatting in a letter C. Internet Explorer
D. managing input devices D. Microsoft Office

NARAYAN CHANGDER
348. These programs convert programming in- 353. Is a standard security technology for es-
structions written by programmers into a tablishing an encrypted link between a
language computers understand and pro- server and a client typically a web server
cess (website) and a browser; or a mail server
and a mail client (e.g., Outlook). (KLO
A. Converter
1.3.4)
B. Linguistic
A. SSL (Secure Sockets Layer)
C. Translator
B. Mac OS
D. None of the above
C. Real Time OS
349. The BIOS (Basic Input Output System) is D. Window XP
stored in
354. An incremental backup..
A. RAM
A. Makes copies only of the new files
B. ROM
B. Saves your backup to secondary stor-
C. Virtual Memory
age
D. Cache
C. Makes copies of all files
350. Define cold boot. D. Makes a copy of the entire drive
A. Turning on a computer that has been
355. Type of scheduling algorithm where the
powered off completely.
queue is sorted by expected execution
B. Using the operating system to restart time. New jobs are added accordingly to
a computer. the queue.
C. Always restart the computer. A. Shortest job first
D. Turning on computer without connect- B. shortest remaining time
ing the plug.
C. First come first served
351. It is the two or three or four letters af- D. Multi-level feedback queues
ter the dot in a filename. It also indicates
what kind of file you are dealing with. 356. An operating system that organizes and
coordinates how multiple user access and
A. File name share resources on a network. This de-
B. File extension scription refers to
C. File size A. Mobile OS
D. File management B. Desktop OS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 389

C. Server OS 362. Which bus sends the request to the RAM


requesting the next instruction to be exe-
D. none of above
cuted?

PRACTICE BOOK» NOT FOR SALE


357. How many different languages of pro- A. Address Bus
gramming are there? (estimate)
B. Data Bus
A. All programming is in one
C. Control Bus
B. 100
D. none of above
C. 500
363. It is an environment in which a piece of
D. 700 software is executed.
358. The purpose of memory is to optimize A. File Management
the use of random access memory (RAM). B. Disk Management
A. performance C. User interface
B. management D. Digital Platform
C. throttling
364. System functionality should be collected
D. integration from all stakeholders, these stockholders
may not include:(KLO 1.2.5)
359. Which one of these best describes a func-
tion of an operating system? A. The Manager of the company

A. It allows the users to run apps. B. The users of the system

B. It connects all of the components with C. The government


cables. D. The sponsor
C. It makes the computer system faster.
365. It is intended to serve real time applica-
D. none of above tion that process data as it comes in.

360. Which type of interface uses ‘WIMP’ A. Network OS

A. Command line B. Real-time OS

B. Graphical C. Multi-user OS

C. Menu D. Internet/Web OS

D. Natural language 366. It is very important to gather preliminary


information about a certain problem from
361. Tool in optical drive that reads informa- the user accurately and in details. This can-
tion not be done through (KLO 1.2.1)
A. needle A. Phone call, meetings
B. laser B. Feedback form
C. tape C. Email and ticketing system
D. sensor D. Remote Access

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 390

367. The instructions in a form that the proces- 373. These are programs typically used to cre-
sor can execute is called ate sophisticated commercial websites.
A. Machine Code A. Game Design Programs
B. Assembly Language B. Presentation Graphics
C. High Level Language C. Illustration Programs
D. Complier D. Web Authoring Programs
368. This type of back-up is quicker to restore

NARAYAN CHANGDER
from? (7-9) 374. The purpose of a disk defragmenter is to

A. Incremental
A. Recover deleted files from the hard
B. Full disk
C. Fragmented
B. To move applications from RAM to the
D. Differential hard disk
369. UNIX is an example of this type of oper- C. To put together sections of files which
ating system.Lesson 7-1 are physically separated on a hard disk
A. real-time D. To remove files which are no longer
B. single-user/single-task needed
C. single-user/multitasking 375. Can computers operate without a operat-
D. multi-user ing system?
370. Name of the software which controls A. Yes
hardware devices? B. No
A. Device management C. Sometimes
B. Device system D. WOAH
C. Peripheral firmware
D. Device driver 376. One of the disadvantages of using mobile
devices is (KLO 1.3.2)
371. What software would be used to create A. always connected
a logo
B. Constant Interruption
A. Image editing software
B. Word processor C. Possibility of Privacy and security Leak

C. Presentation software
D. Both B & C
D. Web authoring software
372. What allows a user to interact with the 377. This is used in creating layout for a mag-
Operating system? azine.

A. User connection A. Word Processor


B. User interface B. Spreadsheet
C. Virtual connection C. Desktop Publishing Program
D. Remote access D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 391

378. Recordable CDs contain a dye covered C. RAM


surface which is translucent to light and D. ROM
can be burnt to stop the reflection. What

PRACTICE BOOK» NOT FOR SALE


‘burns’ the CD? 384. Clock speed is measured in cycles per sec-
A. laser ond. 3GHz means
B. high intensity light A. 3000 cycles (instructions) per second

C. magnetic stamp B. 3 million cycles (instructions) per sec-


ond
D. fire
C. 3 cycles cycles (instructions) per sec-
379. Which Operating System function en- ond
ables allocation of folders? (1-3) D. 3 billion cycles (instructions) per sec-
A. User Interface ond
B. Memory Management 385. A hierarchy;
C. User Management A. is the means of carrying out opera-
D. File Management tions or instructions
B. are users of a system
380. is the process of starting or restart-
ing a computer. C. is software not fully understood by
most users
A. Launching
D. is a diagram where the most important
B. Loading
level of a system is at the top
C. Booting
386. software is privately owned soft-
D. Keying
ware and limited to a specific vendor or
381. Designed for mobile phones computer model.
A. Windows Mobile A. Stand-alone
B. Windows Embedded B. Freeware
C. Android C. Proprietary
D. none of above D. Shareware

382. Which is NOT considered an operating 387. What is the purpose of Utility software?
system? A. To keep the computer maintained and
A. Windows in working order
B. Mac OS B. To control how the computer operates
C. Linux
C. To manage resources available to
D. Microsoft Excel hardware
383. This controls the computer and manages D. none of above
its work.Lesson 8-1
388. is any pocket-sized card that has
A. CPU embedded integrated circuits (U23 KLO
B. OS 4.1.f)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 392

A. Identity card 394. Which one of these is an Open source


B. Smart Token software?

C. Smart card A. MySQL

D. Security badge B. Steam


C. Skype
389. Utility Programs that:Recover corrupted
/ accidentally deleted data D. none of above

NARAYAN CHANGDER
A. Program Uninstaller 395. This is the program that helps to boot
B. Disk Scanning Program up the computer. Usually stored on flash
memory so that it can be updated. Also al-
C. Backup Utility
lows settings such as boot order of disks
D. Data Recovery Utility to be changed and saved by the user

390. Fill in the blank. the whole program A. Loader


one statement at a time. B. BIOS
A. Compilers C. Basic input output system
B. Interpreters D. none of above
C. Translators
396. Data Compression
D. none of above
A. Maintain a computer
391. Which sort of user is suited to using a B. Provides options to manage your files
command-line interface? and folders
A. Software Tester C. Allows the os to manage the hardware
B. Network Technician devices
C. Programmer D. Reduces the size of a file
D. Web Developer
397. Which of these is not one of the three
392. Software written to meet the need spe- main types of software?
cific need of a company is A. Operating Systems
A. special purpose software B. Applications
B. integrated software C. Programming Languages
C. general purpose software D. Media Players
D. custom written software
398. Linux is software, which means its
393. What software would be used to make code is provided for use, modification, and
calculations redistribution.
A. Image editing software A. open source
B. Spreadsheet B. client/server
C. Desktop Publishing (DTP) software C. upgradable
D. Web authoring software D. multitasking

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 393

399. Which is not a type of System software? C. Agile modelling


A. Operating systems D. Extreme programming

PRACTICE BOOK» NOT FOR SALE


B. Utility programs
405. Which of the following is not an example
C. Applications of general-purpose applications
D. none of above
A. Apple Pages
400. The following is NOT a type of Systems B. Google Slides
Software?
C. Microsoft Publisher
A. Device Drivers
D. Microsoft Excel
B. Utility Programs
C. Applications 406. Removable, portable storage device in-
D. Operating Systems serted into a usb port
A. flash drive
401. Utility Programs that:Reorganize all scat-
tered data and restore file in contiguous B. laser drive
location C. optical drive
A. Program Uninstaller D. magnetic drive
B. Disk Defragmenter
C. Backup Utility 407. A file utility is a utility that shrinks
the size of a file(s).
D. Data Recovery Utility
A. unit
402. Which of the following is not mobile op-
B. compression
erating system?
A. Blackberry C. matrix

B. Android D. conversion
C. Windows Phone 408. Google Docs, Microsoft Office 365 and
D. a-phone Zoho Office are examples of

403. Performs tasks at the same time. A. Specialized Suite


A. Simultaneous Processing B. Cloud Suite
B. Multiprocessing C. Utility Suite
C. Parallel processing D. Office Suite
D. none of above
409. Process of splitting memory and/or pro-
404. This model is an iterative approach to grams up into blocks of the same physical
software delivery that builds software in- size.
crementally from the start of the project, A. Segmentation
instead of trying to deliver it all at once
near the end. B. Paging
A. the waterfall lifecycle model C. Virtual memory
B. Spiral model D. Physical memory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.12 system software 394

410. Which is NOT a resource the OS man- 415. Give two examples of utility software
ages?
A. Word and anti-virus
A. Processor B. Compression software and Power-
B. Memory point
C. Input/Output C. Disk defragmenter and file manage-
ment software
D. Topology
D. none of above

NARAYAN CHANGDER
411. A small program that allows a specific pe-
ripheral device to communicate with a com- 416. Splits memory and/or programs into log-
puter system ical blocks containing modules or routines

A. Driver Programs A. Paging

B. Firmware B. Segmentation

C. Operating System C. physical memory

D. none of above D. splitting

417. What is the purpose of a user interface


412. Which one of these is not System Soft-
(as a part of the operating system)
ware?
A. Provides a method to communicate
A. Android
with the system
B. Norton Anti-virus
B. Is a graphical layout
C. Apple macOS
C. Is user management
D. Office 365
D. Allows users to have different ac-
counts
413. Operating system developed in the late
1960s for midrange servers 418. Which is NOT considered application soft-
A. Windows ware?
B. MAC OS A. Word
C. UNIX B. Photoshop
D. LINUX C. Android
D. Audacity
414. Below are 2 advantages and 1 disadvan-
tage for Graphical User Interface.Choose 419. System software is
the disadvantage
A. software that manages the operation
A. The user doesn’t need to memorise the of the computer
commands
B. software that users install to perform
B. Simple to use for beginners tasks
C. Takes up a lot of processing power and C. software that keeps the computer per-
memory forming at it’s best
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 395

420. A computer virus can be C. File Management


A. annoying only D. Database Management

PRACTICE BOOK» NOT FOR SALE


B. damaging to your data
422. Two MAJOR category of software are:
C. copied without your knowledge onto
removable drives used in the infected A. system software and utility programs
computer
B. operating system and system soft-
D. all of the above ware
421. Optimizing the use of main memory C. utility programs and operating system
(RAM)
A. Memory Management D. system software and application soft-
B. System Management ware

1.13 Software Engineering


1. Is the application of a systematic, disci- B. Programs + Documentation + Oper-
plined, quantifiable approach to the de- ating Procedures
velopment, operation and maintenance of C. Programs + Hardware manuals
software
D. Programs
A. software planning
B. software engineer 5. Relational schemas and other metadata
about relations are stored in a structure
C. software process called the
D. software engineering A. Metadata
2. If you were to create client/server appli- B. Catalog
cations, which model would you go for? C. Log
A. WINWIN Spiral Model D. Data Dictionary
B. Spiral Model
6. The model in which the requirements are
C. Concurrent Model implemented by its category is .
D. Incremental Model A. Evolutionary Development Model
3. An intellectual property that applies to lit- B. Waterfall Model
erary works. C. Prototyping
A. Copyright D. Iterative Enhancement Model
B. Patent
7. All the following are key challenges facing
C. Trade Secrets software engineering EXCEPT?
D. Trademark A. Coping with increasing diversity
4. Software is a collection of B. Demands for reduced delivery times

A. Set of instructions + Operating Proce- C. Developing trustworthy software


dures D. People management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 396

8. The is a sequence of steps that enable 13. If project is the enhancement of existing
the designer to describe all aspects of the system, which model is best suited?
software to be built. A. Waterfall model
A. model process B. Prototyping model
B. design & model process C. Iterative enhancement model
C. design process D. Spiral model

D. none of above 14. It is the first model ever formalized and

NARAYAN CHANGDER
it is a sequential design process in which
9. Behavioral Model can be represented in progress is seen as flowing steadily down-
which Diagram wards.
A. Data Flow Diagram A. Spiral Model
B. State transition Diagram B. Evolutionary Development Model
C. Iterative Enhancement Model
C. None of the above
D. Waterfall Model
D. All of the above
15. Which of the following are valid step in
10. Software engineering approach is used to SDLC framework?
achieve: A. Requirement Gathering
A. Better performance of hardware B. System Analysis
B. Error free software C. Software Design
C. Reusable software D. All of the above

D. Quality software product 16. A graphical technique that represent a de-


cision as a connected series of nodes and
11. Which of the following problems occurred branches is a:
due to the ignorance of adequacy of using A. decision tree
only the last two digits of the year?
B. decision table
A. Year 2000 problem C. structure chart
B. 4-2 digit problem D. hierarchical chart
C. System Date problem 17. How many kinds of relationship in UML
D. Y2K Problem A. 1
B. 2
12. An IDE is
C. 3
A. software which helps you write code
D. 4
B. software which helps you to design
cool websites 18. COCOMO stands for

C. software which helps you make A. Constructive cost model


quizzes B. Comprehensive cost model
D. software which translates code to as- C. Constructive cost estimation model
sembly language D. Complete cost estimation model

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 397

19. Which phase of the RUP is used to estab- 24. Your group plans to build a model plant.
lish abusiness case for the system? When should you decide upon the criteria
you will use to test your technological de-

PRACTICE BOOK» NOT FOR SALE


A. Transition
sign?
B. Elaboration
A. After the model is built
C. Construction
B. after the model is tested
D. Inception
C. Before the model is built
20. & diagrams of UML represent In-
teraction modeling. D. none of above

A. Use Case, Sequence 25. White Box techniques are also classified
B. Class, Object as
C. Activity, State Chart A. Design based testing
D. All B. structural testing

21. Which one of the following is one of the C. Error guessing testing
Manifesto of Agile Development D. None of the mentioned
A. Comprehensive documentation
26. Which of these are considered a functional
B. Contract negotiation requirement?
C. Responding to change A. Security
D. None of the above B. Availability
22. Using RMIT Library website, to search C. Inputs
for the topic ‘management’, but excluding
D. Response time
‘project management’, use:
A. management NO “project manage- 27. First level of prototype is evaluated by
ment” .
B. management WITHOUT “project man- A. Developer
agement”
B. Tester
C. management MINUS “project manage-
C. User
ment”
D. System Analyst
D. management NOT “project manage-
ment” 28. On which of the following factors does the
23. Which of the following is not defined in a quality of the software produced depend?
good Software Requirement Specification A. On the infrastructure provided to the
(SRS) document? developers
A. Functional Requirement B. On the technologies used to develop
B. Nonfunctional Requirement the software
C. Goals of implementation C. On the skills and knowledge of the de-
velopers
D. Algorithm for software implementa-
tion D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 398

29. Which of the following is not a diagram 35. Agile Software Development is based on
studied in Requirement Analysis?
A. Use Cases A. Incremental Development
B. Entity Relationship Diagram B. Iterative Development
C. State Transition Diagram C. Linear Development
D. Activity Diagram D. Both Incremental and Iterative Devel-
opment

NARAYAN CHANGDER
30. Which of the following items is not an en-
gineering layer for software
36. The spiral model was originally proposed
A. Process by-
B. Manufacturing A. Barry Boehm
C. Tools B. Pressman
D. Methods C. Royce
31. Build and fix model has D. Pressman
A. 2 phases
37. A set of inputs, execution preconditions
B. 3 phases and expected outcomes is known as a
C. 7 phases A. Test plan
D. 4 phases B. Test case
32. Cost estimation for a project may include C. Test document
A. Software Cost D. Test Suite
B. Hardware Cost
38. A software application which uses non-
C. Personnel Costs numerical algorithm to solve complex prob-
D. All of the above lem.

33. Identify the main aim of Software Engi- A. Application Software


neering B. System Software
A. Economic software C. Embedded Software
B. Reliable software D. AI software
C. Cost effective Software
39. What involves preparing software for ex-
D. Reliable and cost effective software
ternal release and keeping track of the sys-
34. The importance of software design can be tem versions that have been released for
summarized in a single word which is: customer use?

A. Efficiency A. System building


B. Accuracy B. Release management
C. Quality C. change management
D. Complexity D. Version management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 399

40. What is the main objective of Software A. Association


Project Planning? B. Inheritance

PRACTICE BOOK» NOT FOR SALE


A. Estimation of resources C. Aggregation
B. Estimation of cost D. Class
C. Estimation of schedule
46. Which is the first step in the software de-
D. All of the above velopment life cycle?
41. The reason for software bugs and failures A. Analysis
is due to B. Design
A. Software companies C. Problem/Opportunity Identification
B. Software Developers D. Development and Documentation
C. Both Software companies and Devel-
opers 47. How many Scenarios are there in elicita-
tion activities?
D. All of the mentioned
A. One
42. In XP Increments are delivered to cus- B. Two
tomers every weeks.
C. Three
A. One
D. Four
B. Two
C. Three 48. Which of these is not one of the phase
names defined by the Unified Process
D. Four model for software development?
43. Captures the customers business needs A. Inception phase
and specify the blueprints for the system, B. Elaboration phase
so that programmers can implement it.
C. Construction phase
A. engineering
D. Validation phase
B. software engineering
C. software 49. Abbreviate the term CMMI.

D. none of above A. Capability Maturity Model Integration


B. Capability Model Maturity Integration
44. Lower and upper limits are present in
which chart? C. Capability Maturity Model Instructions

A. Run chart
D. Capability Model Maturity Instructions
B. Bar chart
C. Control chart 50. Decomposition technique takes ap-
proach to software project estimation.
D. None of the mentioned
A. Tower hannai
45. It represent relationships between in- B. Split-up
stances of types (a person works for a
company, a company has a number of of- C. Divide and Conquer
fices. D. Merge

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 400

51. Milestones are used to: C. All


A. Know the cost of the project D. None
B. Know the status of the project
57. RAD Software process model stands for
C. Know user expectations
D. Know funding agencies A. Rapid Application Development.
52. Which three framework activities are B. Relative Application Development.

NARAYAN CHANGDER
present in Adaptive Software Develop-
C. Rapid Application Design.
ment(ASD)?
D. Recent Application Development.
A. analysis, design, coding
B. requirements gathering, adaptive cy- 58. What is incorrect about structural design?
cle planning, iterative development
A. Structural design introduced notations
C. speculation, collaboration, learning and heuristics
D. all of the mentioned B. Structural design emphasis on proce-
dural decomposition
53. My new computer has a very proces-
sor. C. The advantage is data flow represen-
tation
A. quick
B. high speed D. It follows Structure chart

C. fast 59. Design phase is followed by .


D. none of above A. Coding
54. model consists of 50 to 300 KLOC B. Testing
A. Organic C. Maintenance
B. Embedded D. None of the above.
C. Semidetached
60. Which of the following is not a software
D. Complex development process model
55. Emily wants to type her class notes. A. Waterfall model
Which application software would be BEST B. Risk Identification model
for her to use?
C. Spiral model
A. Word processing
D. Non of the above
B. Spreadsheet
C. Database 61. White box testing, a software testing
D. Operating system technique is sometimes called?
A. Graph Testing
56. Software developed for a single customer
according to their specification. B. Basic path
A. Generic C. Glass box testing
B. Bespoke D. Dataflow

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 401

62. Which of the following UML diagrams has 67. Following are the phases of Project Man-
a static view? agement Life Cycle. Arrange them in cor-
rect orderDesign, 2. Marketing, 3. Analy-

PRACTICE BOOK» NOT FOR SALE


A. Collaboration
sis and evaluation, 4. Inspection, testing
B. Use case and delivery
C. State chart A. 3-2-1-4
D. Activity B. 1-2-3-4

63. It is an approach that is intended to fa- C. 2-3-1-4


cilitate the development of systems that D. 4-3-2-1
must change rapidly in response to the dy-
namic business environment. 68. Iterative development is NOT a good idea
for?
A. System. Analysis and Design
A. Back end development
B. Object-Oriented Systems Analysis and
Design B. Front end development
C. Systems Development Life Cycle C. Middleware development
D. Systems Design D. Software development

64. What is true about generic software prod- 69. How many diagrams are here in Unified
uct design process? Modelling Language?
A. It begins with SRS A. 1
B. It ends with Product Design Problem B. 2
C. Analysis is done and end product is C. 3
project mission statement
D. 9
D. None of the mentioned
70. A is tested to ensure that information
65. All listed are techniques to elicit require- properly flows into and out of the sys-
ments EXCEPT tem.
A. Interviewing A. boundary conditions
B. Scenarios B. local data structure
C. Questionnaire C. module interface
D. Ethnography D. paths

66. The linear sequential model of software 71. A program which helps locate, identify and
development is also known as the rectify errors in a program
A. Classical life cycle model A. Loader
B. Waterfall model B. Debugger
C. Spiral model C. Linker
D. both a and b D. Trace

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 402

72. what’s the meaning of stakeholders? 77. Prototyping life cycle model is appropriate
when a project suffers from which one of
A. people who are effect or affected pos-
the following risks?
itivley or negatively
A. Schedule slippage
B. people are only customers and buy or
sell items B. Manpower turnover
C. people who are called VCs and moti- C. Incomplete and uncertain require-
vate the companies ments

NARAYAN CHANGDER
D. people are hold every thing on the com- D. Poor quality of outsourced work
pany to make them feel happy
78. Select the developer-specific require-
73. Which document is created by system an- ment?
alyst after the requirements are collected A. Portability
from Various stakeholders?
B. Maintainability
A. Software requirement specification
C. Availability
B. Software requirement validation
D. Both Portability and Maintainability
C. Feasibility study
79. It encompasses a set of umbrella activities
D. Requirement Gathering
that are applicable across the entire soft-
74. In XP Increments are delivered to cus- ware process.
tomers every weeks. A. Process Framework
A. One B. System
B. Two C. Software Process
C. Three D. none of above
D. Four 80. Test suite is
75. During software development, which fac- A. Set of test cases
tor is most crucial? B. Set of inputs
A. People C. Set of outputs
B. Product D. None of the above
C. Process
81. Each iteration in the incremental model
D. Project passes through the

76. is known as the testing behavior of A. communication and modeling phases


the system or software, according to the B. planning and construction phases
software requirement specification.
C. deployment and maintenance phases
A. System testing
D. all phases
B. validation testing
82. If a system is being developed where the
C. integration testing
customers are not sure of what they want,
D. All the requirements are often poorly defined.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 403

Which of the following would be an appro- C. . Operational feasibility


priate process model for this type of devel- D. . None of these
opment?

PRACTICE BOOK» NOT FOR SALE


A. Prototype 88. The project life cycle consists of
B. Waterfall A. Understanding the scope of the project
C. RUP
B. Objectives of the project
D. Incremental
C. Formulation and planning various ac-
83. Which Concept Data-Flow Architecture Fol- tivities
lows D. All of the above
A. Pipe
89. testing plays a important role in delivering
B. Filter
a
C. Both
A. high quality product
D. None
B. Low quality product
84. Which model is popular for students small C. none of the above
projects?
D. none of above
A. Waterfall Model
90. Software is considered to be collection of
B. Spiral Model
C. Quick and Fix model
A. programming code
D. Prototyping Model
B. associated libraries
85. Project risk factor is considered in which C. documentations
model?
D. All of the above
A. Spiral model.
91. What is the correct order of waterfall
B. Waterfall model.
model?
C. Prototyping model
A. analysis, design, testing, construction,
D. None of the above. maintenance
86. An erroneous system state that can lead B. analysis, design, construction, testing,
to system behavior that is unexpected by maintenance
system users is known as? C. design, analysis, construction, mainte-
A. Human error or mistake nance, testing
B. System fault D. design, construction, analysis, mainte-
C. System error nance, testing

D. System failure 92. Components of a decision tree include:

87. A system analyst does not need to con- A. states and Statements
sider ? B. rules and Actions
A. . Technical feasibility C. conditions and Actions
B. . Economics feasibility D. Stubs and Entry

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 404

93. In a classical waterfall model, which phase B. CAME tools


precedes the design phase? C. CAQE tools
A. Coding and unit testing D. CARE tools
B. Maintenance
99. Which level of DFD is also known as Con-
C. Requirements analysis and specifica- text Diagram.
tion A. 0-Level
D. Feasibility study B. 1-Level

NARAYAN CHANGDER
94. Effort is measured in terms of C. 2-Level
A. Person-months D. 3-Level
B. Rupees 100. SRS stands for
C. Persons A. Software Requirements Specification
D. Months B. System Requirements Specification
C. Software Requirements Solution
95. In software engineering, defects that are
discovered are to fix. D. None of these
A. earlier; more expensive 101. What are the types of requirements?
B. later; more expensive A. Availability
C. by customers; more difficult B. Reliability
D. by developers; more difficult C. Usability
D. All of the mentioned
96. What is the purpose of building a proto-
type? 102. Which model shows the flow of object in-
A. to test the product and make sure that teractions?
it is the best solution to the problem A. Sequence model
B. to make sure that the product is in com- B. Subsystem model
pliance with government regulations C. Dynamic model
C. to determine the design constraints D. Both Sequence and Dynamic model
for the product
103. RUP stands for created by a division
D. none of above of
97. A data model contains A. Rational Unified Program, IBM
A. Data Object B. Rational Unified Process, Infosys
B. Attributes C. Rational Unified Process, Microsoft
C. Relationships D. Rational Unified Process, IBM
D. All of the mentioned 104. Project risk factor is considered in?
A. Spiral Model
98. The tools that support different stages of
software development life cycle are called B. Waterfall Model
C. Prototyping Model
A. CASE Tools D. Iterative enhancement Model

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 405

105. Scenario-based modeling produces a C. no outgoing edges


A. Text-oriented representation D. none of the above

PRACTICE BOOK» NOT FOR SALE


B. UML diagrams
111. what we should do if we have a lot of
C. Both A and B test cases?
D. None of the mentioned above A. spread the tests for a lot of Testers
106. Which of the following diagram is time B. terminate a punch of test cases
oriented?
C. Use “Automated testing” to reduce
A. Collaboration the pressure
B. Sequence D. none of above
C. Activity
112. What does “Timeboxed” means in Agile
D. None of the mentioned terms?
107. Which granularity level of testing checks A. Fast
the behavior of module cooperation?
B. Flexible
A. Unit Testing
C. Frequent
B. Integration Testing
D. Fixed
C. Acceptance Testing
D. Regression Testing 113. Refers to creative materials that are not
protected by intellectual property laws
108. Software Design consists of such as copyright, trademark, or patent
A. Software Product Design laws.
B. Software Engineering Design A. Fair Use
C. Software Product & Engineering De- B. Public Domain
sign C. Copyright
D. None of the mentioned
D. I don’t know
109. One weakness of boundary value analy-
114. RAD stands for
sis and equivalence partitioning is
A. They are not effective A. Relative Application Development

B. They do not explore combinations of in- B. Rapid Application Development


put circumstances C. Rapid Application Document
C. They explore combinations of input cir- D. None of the mentioned
cumstances
D. None of the above 115. Who is responsible for prioritizing the
product backlog?
110. The equation V(G)= pi +1 of cyclomatic
A. Product Owner
complexity is applicable only ifevery pred-
icate node has B. Project Manager
A. two outgoing edges C. Lead Developer
B. three or more outgoing edges D. Tester

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 406

116. Why do you think iteration is important 121. What is another name for a rough draft
for design? or skeletal version of a program?
A. To frequently reanalyze the problem A. model
B. To generate and improve solutions B. prototype
only once for better output C. version
C. All of the mentioned D. archetype
D. None of the mentioned 122. If user participation is available which

NARAYAN CHANGDER
model is to be chosen?
117. The modification of the software to
A. Waterfall model
match changes in the ever changing en-
vironment, falls under which category of B. Iterative enhancement model
software maintenance? C. Spiral model
A. Corrective D. RAD model
B. Adaptive 123. In which step of SDLC actual program-
C. Perfective ming of software code is done?
A. Maintenance and Evaluation
D. Preventive
B. Development
118. Equivalence class partitioning is related C. Design
to
D. Analysis
A. Structural testing
124. QFD in requirement engineering stands
B. Blackbox testing for
C. Mutation testing A. Quality function design
D. All of the above B. Quality factor design
C. Quality function development
119. Prototyping in software process may in-
volve D. Quality function deployment

A. throw-away prototyping 125. Model preferred to create client/server


applications is
B. evolutionary
A. WINWIN Spiral Model
C. Both a and b options
B. Spiral Model
D. None of these
C. Concurrent Model
120. In Boehm’s spiral model, each loop in the D. Incremental Model
spiral represents of the software pro-
126. Number of errors found per person hours
cess
expended is an example of a
A. phase
A. measurement
B. design B. measure
C. documentation C. metric
D. none of the above D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 407

127. The work products produced during re- 132. A software program designed or used to
quirement elicitation will vary depending perform task such as processing program
on the code to machine code

PRACTICE BOOK» NOT FOR SALE


A. size of the budget A. application and program
B. size of the product being built B. programming language
C. software process being used C. language processor
D. stakeholders needs D. none of above
128. Software Requirement Specification
133. Who can be the best user proxy?
(SRS) is also known as specification of
A. ScrumMaster
A. White box testing B. Customers
B. Acceptance testing C. Agile coach
C. Integrated testing D. Developer
D. Black box testing
134. What happens in the implementation
129. What are the four dimensions of Depend- phase?
ability? A. The code is tested against the specfi-
A. Usability, Reliability, Security, Flexibil- cation
ity B. Making changes when the sotware has
B. Availability, Reliability, Maintainability, been created
Security
C. Planning the solution, look and feel of
C. Availability, Reliability, Security, the software interface
Safety
D. The deliverables of the implementa-
D. Security, Safety, Testability, Usability tion stage are created e.g. the code
130. of a system is the structure or 135. A is a set of activities which are net-
structures of the system which comprise worked in an order and aimed towards
software elements, the externally visible achieving the goals of a project.
properties of these elements and the rela-
tionship amongst them. A. Project
A. Software construction B. Process
B. Software evolution C. Project management
C. Software reuse D. Project cycle
D. Software Architecture 136. Regression testing is primarily related
131. SDLC stands for to:
A. Software design Life cycle A. Functional testing
B. Software development Life cycle B. Data flow testing
C. System development Life Cycle C. Development testing
D. System design life cycle D. Maintenance testing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 408

137. A view point may differ from person to 142. What is software quality?
person A. Satisfying client needs
A. True B. Proving Best Lunch
B. False C. Conducting Semester Exam
C. Viewpoint D. Reopening university And Colleges
D. None
143. It is a framework that is used to struc-

NARAYAN CHANGDER
138. Software developed to be sold to a range ture, plan, and control the process of de-
of different user veloping an information system.

A. Generic A. Development Methodology

B. Bespoke B. Structural Methodology

C. All C. Design Methodology

D. None D. Improvement Methodology

144. Choose the correct option in terms of Is-


139. Who is PROJECT MANAGER?
sues related to professional responsibility
A. A BCA Student
A. Confidentiality
B. Having MCA degree
B. Intellectual property rights
C. An Entrepreneur C. Both Confidentiality & Intellectual
D. A project manager is a person who has property rights
the overall responsibility for the success- D. Managing Client Relationships
ful planning and execution of a project.
145. is a piece of code programming that
140. Which one of the following is performed does a well-defined job.
during the requirements analysis activ-
ity? A. Computer program

A. Identify requirements B. Computer software


C. Both are right
B. Build a prototype
D. All wrong
C. Identify any ambiguity, inconsistency,
and incompleteness in the gathered re- 146. How many Layers in Layered Architec-
quirements ture
D. Analyze and allocate resources for re- A. 1
quirements specification
B. 2
141. Efficiency in a software product does not C. 3
include
D. 4
A. responsiveness
147. Which of the following is not a charac-
B. licensing
teristic of an Agile software development
C. memory utilization project?
D. processing time A. Shared code ownership

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 409

B. Implement the simplest solution to 153. Select the option that suits the Manifesto
meet today’s problem for Agile Software Development

PRACTICE BOOK» NOT FOR SALE


C. Continual feedback from customer A. Individuals and interactions
D. Postpone integration until all the incre-
B. Working software
mental deliveries are complete
C. Customer collaboration
148. Which of the following is a project
scheduling method that can be applied to D. All of the mentioned
software development?
A. PERT 154. UML stands for
B. CPM A. Uniform Modeling Language
C. CMM B. Unified Modeling Language
D. Both PERT and CPM
C. Unit modeling language
149. A decision tree does not include:
D. Universal modeling language
A. statements
B. condition stubs 155. A person who makes decision and prac-
C. action stubs tices Scrum to the core is performing what
role?
D. rules
A. Pig
150. Which is best life cycle model?
A. Waterfall model B. Chicken
B. spiral model C. Scrum Master
C. prototype model D. Scrum Team
D. All model are good depends on project
size 156. A software that is NOT associated with
the wasting of resource is said to have the
151. In testing the procedural details, all
property of
the logical paths all the internal data struc-
tures are closely examined. A. reliability
A. black box B. efficiency
B. white box
C. dependability
C. green box
D. usability
D. red box
152. Which technique is applied to ensure the 157. Which one of the following is not a Good
continued evolution of legacy systems? software Product’s attribute?
a.b.c.d.
A. Maintainability
A. Forward engineering
B. Portability
B. Reverse Engineering
C. Reengineering C. Dependability
D. both b and c D. Usability

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 410

158. Which of the following property does not C. Management


correspond to a good Software Require- D. Judgement
ments Specification (SRS)?
A. Verifiable 164. On a washing machine, the embedded
system receives INPUT by
B. Ambiguous
A. Someone choosing a wash cycle
C. Complete
B. Filling up the washing machine with
D. Traceable
water

NARAYAN CHANGDER
159. Dependency models the relationship C. Draining the water
A. has-a D. none of above
B. is-a
165. A software requirements specification
C. uses-a (SRS) document should avoid discussing
D. none of above which one of the following?
A. Functional requirements
160. A decision table facilitates conditions to
be related to: B. Non-functional requirements
A. Action C. Design specification
B. Program D. Constraints on the implementation
C. Table 166. is done in the development phase by
D. Stub the debuggers.
A. coding
161. Which of the following is NOT the activi-
ties for project management? B. Testing
A. Estimating development time C. Debbuging
B. Training and handover D. Implementation
C. Ensuring good communication and a 167. What is the simplest model of software
healthy work environment development paradigm?
D. Managing budgets A. Spiral model
162. Which model in system modelling depicts B. Big Bang model
the static nature of the system? C. V-model
A. Behavioral Model D. Waterfall model
B. Context Model
168. What are the main goals of software en-
C. Data Model gineering?
D. Structural Model A. Produce a reliable software
163. Which principle refers to the lifelong B. Produce a cost-effective software
learning of a software engineer? C. Produce reliable and cost-effective
A. Self software
B. Product D. All wrong

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 411

169. Every node is represented by 175. Domain Analysis helps to recognize


A. One row and one column in graph ma- A. analysis patterns and classes at first

PRACTICE BOOK» NOT FOR SALE


trix place
B. Two rows and two columns in graph B. Defines and categorizes the key as-
matrix pects of analysis
C. One row and two columns in graph ma- C. Use on subsequent projects
trix
D. All of the mentioned above
D. None of the above
176. Following is an example of Functional Re-
170. Which four framework activities are quirement
found in the Extreme Programming(XP)?
A. Speed
A. analysis, design, coding, testing
B. Accuracy
B. planning, analysis, design, coding
C. Cash withdrawal in Banking System
C. planning, design, coding, testing
D. Reliability
D. planning, analysis, coding, testing
177. Testing the software is basically
171. What does SDLC stands for?
A. Verification
A. System Design Life Cycle
B. Verification and validation
B. Software Design Life Cycle
C. Validation
C. Software Development Life Cycle
D. None of the above
D. System Development Life cycle
178. Which one is not a size measure for soft-
172. Agile Software Development Process is:
ware
A. Sequential
A. LOC
B. Iterative
B. Function Count
C. Incremental
C. Cyclomatic Complexity
D. Iterative & Incremental both
D. Halstead’s program length
173. Which one of the following is not a step
of requirement engineering process? 179. Its information may characterize the na-
ture of software applications
A. elicitation
A. Complexity
B. design
B. Content
C. analysis
C. Determinacy
D. documentation
D. Both B and C
174. choose the one which is not Strength of
Waterfall model. 180. Defect Removal Efficency
A. Simplicity A. E/E+D
B. rigidity B. p/C
C. flexibility C. C/A
D. easy to manage D. D/A

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 412

181. COCOMO stands for are error-free to meet customer require-


A. constructive cost Model ments.
A. Coding
B. common control Model
B. Testing
C. composition cost Model
C. Design
D. consumed cost Model
D. Implementation
182. Which one is Not a type of software.

NARAYAN CHANGDER
187. Which one of the statements is not cor-
A. Embedded rect during requirements engineering?
B. AI A. Requirements are difficult to uncover
C. System B. Requirements are subject to change
D. Tactical C. Requirements should be consistent
183. An intellectual property that applies to in- D. Requirements are always precisely
ventions. known
A. Copyright 188. Which diagram in UML shows a complete
B. Patent or partial view of the structure of a mod-
eled system at a specific time
C. Trade Secrets
A. Sequence Diagram
D. Trademark
B. Collaboration Diagram
184. While estimating the cost of software, C. Class Diagram
Lines of Code (LOC) and Function Points
(FP) are used to measure which one of the D. Object Diagram
following? 189. Who writes the Software Require-
A. Length of code mentSpecifications Document (SRS)?
B. Functionality of software A. System Developer
C. Size of Software B. System tester
D. None of the above C. System analyst
D. User of the system
185. The spiral model of software develop-
ment 190. Scenario-based models represent
A. Ends with the delivery of the software from the user’s point of view,
product A. Software specifications
B. Is more chaotic than the incremental B. Software requirements
model
C. Software design
C. Includes project risks evaluation dur-
D. None of the mentioned above
ing each iteration
D. All of the above 191. Based on software requirements, busi-
ness process, business rules, software de-
186. A stage in which individual components sign and customer specifications, the soft-
are integrated and ensured that they ware coding begins. This is part of

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 413

A. Analysis 197. A decision table has


B. Testing A. Four portions

PRACTICE BOOK» NOT FOR SALE


C. Development
B. Three portions
D. Implementation
C. Five portions
192. One fault may lead to
D. Two portions
A. One failure
B. No failure 198. Which of these is true?
C. Many failure A. Generic products and customized prod-
D. All of the above ucts are types of software products
193. Which of the following is not one of the B. Generic products are produces by or-
requirement classifications used in Quality ganization and sold to open market
Function Deployment?
C. Customized products are commis-
A. exciting sioned by particular customer
B. mandatory
D. All of the above
C. expected
D. normal 199. Which diagram indicates the behaviour of
the system as a consequence of external
194. Which activity is carried out first. events?
A. verification
A. data flow diagram
B. validation
B. state transition diagram
C. both
D. none C. control specification diagram

195. The control unit, arithmetic logic unit and D. workflow diagram
memory are together called Central Pro-
cessing Unit or CPU. 200. Which of the following is not a Software
Configuration Management Activity?
A. yes
B. no A. Configuration item identification

C. i dont know B. Risk management


D. none of above C. Release management
196. Choose the correct option from given be- D. Branch management
low:
A. Prototyping Model facilitates reusabil- 201. is characterized by number crunching
ity of components algorithms.
B. RAD Model Model facilitates reusabil- A. System Software
ity of components
B. Application Software
C. Both RAD & Prototyping Model facili-
tates reusability of components C. Scientific Software
D. None D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 414

202. Oh dear I pressed the button. C. engineer


A. incorrect D. stakeholder
B. wrong 208. Diagrams which are used to distribute
C. false files, libraries and tables across topology
of hardware are called
D. none of above
A. deployment diagrams
203. Which of the following is included in B. use case diagrams

NARAYAN CHANGDER
SRS?
C. sequence diagrams
A. Cost D. collaboration diagrams
B. Design Constraints
209. The fundamental notions of software en-
C. Staffing gineering does not account for?
D. Delivery Schedule A. Software Security
204. is a Personnel cost attribute B. Software reuse

A. Software reliability C. Software processes


D. Software validation
B. memory constraints
C. use of software tools 210. A company is developing an advance ver-
sion of their current software available in
D. analyst capability the market, what model approach would
205. Lifelong learning of a software engineer they prefer?
comes under which principle A. RAD
A. Product B. Iterative Enhancement
B. Self C. Both RAD & Iterative Enhancement
C. Management D. Spiral

D. Judgement 211. Quality costs may be divided into costs


associated with
206. The advantages of creating a prototype A. prevention
are
B. appraisal
A. It can serve as means of communica-
tion between developers and customers C. failure.
D. All a, b, c
B. It allows developers to experiment
with number of different design options 212. Displays the order in which the lines of
C. Both (a) and (b) a program are executed, and possibly the
values of variables as the program is be-
D. None of the above ing run is an example of which type of IDE
207. What do you call a technical person who tool?
is capable of understanding the basic re- A. Debugger
quirements? B. Trace
A. team leader C. Breakpoint
B. analyst D. Variable Watch

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 415

213. What is NOT an Agile methodology? 219. Software is the set of instructions or pro-
A. Extreme programming (XP) grams that make a computer function. It
cannot be touched or seen.

PRACTICE BOOK» NOT FOR SALE


B. Scrum
A. Yes.
C. Crystal Clear
B. No.
D. PMBOK®3
C. I don’t know.
214. Which of these is not project develop- D. none of above
ment activity?
220. approach is used to identify the prob-
A. Planning
lem and solution after gathering the re-
B. Organizing quirements.
C. Operating A. CLSS
D. Tracking B. FAST
215. Individuals or organizations that wish to C. FEST
develop a product are known as: D. FRST
A. User 221. Which one is not a requirements elicita-
B. Initiator tion technique?
C. Project Manager A. Interviews
D. Client B. The use case approach

216. Spiral Model was developed by C. FAST

A. Bev Littlewood D. Data flow diagram

B. Berry Boehm 222. Which is one of the most important stake-


holder from the following
C. Roger Pressman
A. Availability
D. Victor Basili
B. Reliability
217. Software engineers shall-
C. Usability
A. act consistently with the public inter- D. All of the mentioned
est
B. act in a manner that is in the best in- 223. when the Testing phase starts?
terests of his expertise and favour A. after the design phase
C. ensure that their products only meet B. after the requirementsphase
the SRS C. after the maintenance phase
D. all of the mentioned all of the men- D. after the implemntationphase
tioned
224. What is the first step of requirement elic-
218. Who prioritizes product backlog? itation?
A. Product owner A. Listing out Requirements
B. Scrum team B. Identifying Stakeholder
C. Scrum master C. Requirements Gathering
D. Agent D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 416

225. A data dictionary is created when a C. composed of relationship


created.
D. none of above
A. Instance
B. Segment 231. The number of users of the WebApp may
vary by orders of scale from day to day is
C. Database called as
D. Dictionary A. Concurrency

NARAYAN CHANGDER
226. How is Incremental Model different from B. Unpredictable Load
Spiral Model?
C. Performance
A. Progress can be measured for Incre-
D. Availabilty
mental Model
B. Changing requirements can be accom- 232. manage the system development, as-
modated in Incremental Model sign staff, manage the budget and report-
C. Users can see the system early in In- ing, and ensure that deadlines are met
cremental Model A. Project managers
D. All of the mentioned B. Network engineers
227. WAN means C. Graphic designers
A. Wide Area network D. Systems analysts
B. Wire area network
233. Hardware cannot be touched, only soft-
C. World area network ware can be touched.
D. Non of the above A. Yes.
228. Software Engineers shall B. No.
A. act consistently with public interest C. I don’t know.
B. act in a manner that is in the best in- D. none of above
terests of his expertise and favor
C. ensure that their product only meet 234. Which is NOT a software characteristic?
SRS A. Software does not wear out
D. all of the above B. Software is flexible
229. Which is not a software life cycle model? C. Software is not manufactured
A. Waterfall model D. Software is always correct
B. Spiral model
235. Product Requirement, Efficiency Require-
C. Prototyping model ment, External Requirement Comes under
D. Capability maturity model A. Function Requirement
230. Aggregation represents . B. Non Functional Requirement
A. is a relationship C. Both Functional and Non Functional
B. part of relationship D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 417

236. The system engineering process usually C. Delivery within budget and schedule
begin with D. All of the mentioned

PRACTICE BOOK» NOT FOR SALE


A. Detailed View
242. In which elicitation process the develop-
B. Domain View
ers discuss with the client and end users
C. Element View and know their expectations from the soft-
D. World View ware?
A. Requirement gathering
237. A Not Applicable condition is represented
by an (symbol): B. Organizing requirements
A. dash (-) C. Negotiation & discussion
B. asterisk (*) D. Documentation
C. exclamation point (!) 243. A software application which includes
D. pound sign (#) compilers, editors, file management utili-
ties.
238. These are business systems that are de-
signed to process data in large batches. A. Application Software

A. Batch processing systems B. System Software


B. Entertainment systems C. Embedded Software
C. Stand-alone application D. AI software
D. All 244. Which is a software configuration man-
agement concept that helps us to control
239. The integration phase
change without seriously impeding justifi-
A. Determines what the program will do able change?
B. Determines how the program will work A. Baselines
B. Source code
C. Determines whether or not the pro-
gram works C. Data model

D. Adds new features to the delivered D. None of the mentioned


program 245. Which one among the following is not a
240. What is the duration of Agile-Scrum software service type of project?
meeting? A. S/w maintenance
A. Depends on project Complexity B. S/w customization
B. 1 hour C. Outsourced S/w development
C. Depends on Scrum Master D. S/w product development
D. 15 minutes
246. The implementation phase
241. Quality also can be looked at in terms of A. Determines whether or not the pro-
user satisfaction which includes gram is feasible
A. A compliant product B. Determines which classes are needed
B. Good quality output and what they will do

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 418

C. Determines whether or not the pro- 252. Which of the following does not affect
gram works the software quality and organizational
D. Implements the program code performance?
A. Market
247. .Which of the following is not a UML dia-
gram? B. Product
A. Class diagram C. Technology
B. Object Diagram D. People

NARAYAN CHANGDER
C. Interface diagram
253. Prevention costs include
D. Use case model
A. a)quality planning
248. The use case diagram
B. b)formal technical reviews
A. Specifies the functional decomposition
of a system C. c)test equipment and training

B. Comprises classes and objects D. All a, b, c


C. Specifies who performs which tasks 254. Which of the following is delivered at the
with a system that is going to be devel- end of the Sprint?
oped
A. A document containing test cases for
D. Models the time flow within a system
the current sprint
249. The part of a decision table that speci- B. An architectural design of the solution
fies which actions are to be followed for
a given set of conditions refers to:
C. An increment of Done software
A. action stubs
D. Wireframes designs for User Inter-
B. condition list face
C. rules
D. decision list 255. Cyclomatic complexity is denoted by
A. V(G)=e-n+2P
250. Software is defined as .
B. V(G)= pi +1
A. Instructions
B. Data Structures C. V(G)=Number of regions of the graph

C. Documents
D. All of the above
D. All of the above
256. In cause effect graphing technique, cause
251. The interviews, which are held between
& effect are related to
two persons across the table is
A. Written A. Input and output

B. Non-structured B. Output and input


C. Group C. Destination and source
D. One-to-one D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 419

257. What among the following statement is 262. Aside for the technical skills, which is not
true? include in a software engineer skills

PRACTICE BOOK» NOT FOR SALE


A. Associations may also correspond to A. analytical
the relation between instances of three or
B. motivation
more classes
B. Association lines may be unlabeled or C. development
they may show association name D. communication
C. All of the mentioned
263. The operations and maintenance phase
D. None of the mentioned

258. The ability to encourage the technical peo- A. Determines what the program will do
ple to produce their best ability is known B. Determines how the program will work
as .
A. Organization C. Determines whether or not the pro-
B. Motivation gram works
C. Ideas or innovation D. Adds new features to the delivered
D. None of the above program

259. I can’t use my mobile phone. The bat- 264. & are two kinds of software prod-
tery’s ucts.
A. over A. CAD, CAM
B. flat B. Firmware, Embedded
C. exhausted C. Generic, Customised
D. none of above D. None of the mentioned
260. What are the attributes of Good Soft- 265. Refers to the legal right of the owner of
ware? intellectual property.
A. Software functionality A. Fair Use
B. Software maintainability
B. Public Domain
C. Software development
C. Copyright
D. Both Software functionality and main-
D. I don’t know
tainability

261. Activity diagram, use case diagram, col- 266. Which tools are helpful in all the stages
laboration diagram, and sequence dia- of SDLC, for requirement gathering to test-
gram? ing and documentation?

A. Structural A. Upper case tools


B. Behavioral B. Lower case tools
C. non behavioral C. Integrated case tools
D. Non structural D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 420

267. Structured programming codes includes? A. Constraint, Quality, Cost, Schedule,


A. alteration & iteration Staff
B. Features, Quality, Cost, Schedule,
B. multiple exit from loops
Staff
C. sequencing
C. Features, priority, Cost, Schedule,
D. only 1 and 3 Staff
268. A testing strategy that test the applica- D. Features, Quality, Cost, Schedule, cus-

NARAYAN CHANGDER
tion as a whole. tomer

A. Requirement Gathering 273. Failure costs may be subdivided into


B. Verification testing A. internal failure costs
C. Validation testing B. external failure costs.
D. System testing C. Both a and b
D. None
269. Is the application of science and math to
solve problems. 274. Listening to audio through the speakers
A. mathematician is an example of input.
B. scientist A. No, because you’re not inserting data
into the computer.
C. engineering
B. Yes, because you’re inserting data into
D. peopleware the computer.
270. Which of these is the correct order of the C. I don’t know.
SDLC? D. none of above
A. Specfication requirements, Design,
Implementation, Testing, Evolution 275. DFD stands for

B. Feasibility, Design, Implementation, A. Data Flow design


Testing, Evolution B. Descriptive functional design
C. Creation, Testing, Evolution C. Data flow diagram
D. Specfication requirements, Design, D. None of the above
Implementation, Evolution
276. Which one of the following is not a step
271. Software Debugging is known as of requirement engineering?
A. identifying the task to be computerized A. elicitation
B. design
B. creating program code C. analysis
C. creating the algorithm D. documentation
D. finding and correcting errors in the
277. Which of the following is not needed to
program code
develop a system design from concept to
272. Five dimensions that must be managed on detailed object-oriented design?
a project A. Designing system architecture

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 421

B. Developing design models 283. are legacy systems.


C. Specifying interfaces A. New Systems

PRACTICE BOOK» NOT FOR SALE


D. Developing a debugging system B. Old Systems

278. Which of the following is an example of C. Under-Developed Systems


fact finding Technique D. None of the above mentioned
A. Interviewing 284. Feasibility study should be
B. Questionaries
A. Expensive
C. View Point
B. Costly
D. All of the Above
C. Inexpensive
279. If requirements are easily understand- D. Sometimes a and sometimes c
able and defined then which model is best
suited? 285. The software engineering approach is
used to achieve:
A. Spiral model
A. Better performance of hardware
B. Waterfall model
B. Error free software
C. Prototyping model
C. Reusable software
D. None of the above
D. Quality software product
280. Function point analysis (FPA) method de-
composes the system into functional units. 286. What can make your computer “sick”?
The total number of functional units are: A. Influenza
A. 2 B. Computer Viruses
B. 5 C. Antivirus Software
C. 4 D. Hot Temperatures
D. 1
287. Risk Assessment is part of software en-
281. Every task that is scheduled should be as- gineering
signed to a specific team member is termed A. True
as
B. False
A. Compartmentalization
C. Can’t say
B. Defining milestones
D. Non of the above
C. Defining responsibilities
D. Defining outcomes 288. This type of engineer designs computers
and other products that use software to
282. Function point can be calculated by write programs.
A. UFP * CAF A. Electrical engineer
B. UFP * FAC B. Mechanical engineer
C. UFP * Cost C. Software engineer
D. UFP * Productivity D. Aerospace engineer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 422

289. Which one of the following is a functional B. RAD & Spiral


requirement? C. RAD & Waterfall
A. Maintainability D. RAD & Prototyping
B. Portability
295. Which on of the following is not an agile
C. Robustness method?
D. None of the mentioned A. XP

NARAYAN CHANGDER
290. Cause effect graphing techniques is one B. 4GT
form of C. AUP
A. Maintenance testing D. All of the mentioned
B. Structural testing
296. It is a system development methodology
C. Function testing which is also a waterfall development pro-
D. Regression testing cess that emphasizes an extremely short
development cycle.
291. The best architectures, requirements,
A. Iterative Enhancement Model
anddesigns emerge from self-organizing
teams is the myth B. Spiral Model
A. True C. Rapid Application Development Model
B. False
D. Prototyping Model
C. Cant say
D. none of above 297. It is a quality of a systems analyst that
has the ability to articulate and speak, and
292. is not suitable for accommodating any knack of working in all levels of manage-
change? rial positions of the organizations.
A. RAD Model A. Understanding
B. Waterfall Model B. Teaching and selling ideas
C. Build & Fix Model C. Thorough knowledge of computers
D. Prototyping Model D. Communication skills
293. Someone who wants to know how and 298. RAD model was proposed by
why things work. They also design and A. Lucent Technologies
build things.
B. Motorola
A. scientist
C. IBM
B. ME!
D. Microsoft
C. Engineer
D. none of above 299. Site for Beta testing is
A. Software company
294. Which two of the following models will
not be able to give the desired outcome if B. User’s site
user’s participation is not involved? C. Any where
A. Waterfall & Spiral D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 423

300. If a “student signs up for a class, “ which 305. Product is


type of relationship would you use to A. Deliverable
model the relationship between the two?

PRACTICE BOOK» NOT FOR SALE


B. User Expectations
A. generalization
C. Organization effort in development
B. specialization
D. none of the above
C. aggregation
306. Which of these cycles would be useful for
D. association a small business?
301. Main aim of software engineering is to A. Waterfall
produce B. Incremental
A. software C. Spiral
B. within budget D. V-shaped
C. Programe 307. In the development process, the vari-
D. Software within budget in the given ous phases of development are completed
schedule sequentially, one after the other (e.g.,
gather all the requirements, then design
302. The shortcut of SDLC is? the whole system, then implement the
A. Software Develpoment life cycle whole system, and so on).

B. Software Developer life career A. iterative


B. waterfall
C. Software Determination list cost
C. agile
D. Software Decorate licenses cloud
D. spiral
303. Which documentation works as a key
tool for software designer, developer and 308. What combines procedures and tools to
their test team is to carry out their respec- manage different versions of configuration
tive tasks? objects that are created during the soft-
ware process?
A. Requirement documentation
A. Change control
B. User documentation
B. Version control
C. Software design documentation
C. SCIs
D. Technical documentation
D. None of the mentioned
304. Allows programmer to create a GUI by 309. testing requires the tester to know
dragging and dropping controls onto a and understand how the software works,
form is an example of which type of IDE they are able to “see inside” the pro-
tool? gram.
A. Breakpoint A. black box
B. Trace B. red box
C. GUI Creation C. White box
D. Variable Watch D. All

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 424

310. The aspect of the feasibility study which 315. are the features of software.
determines whether the current work prac- A. Software is developed or engineered
tices and procedures are adequate to sup-
port the new system is termed B. Software doesn’t wear out

A. operational feasibility C. Software can be custom built

B. legal feasibility D. All of the above mentioned

C. technical feasibility 316. Amongst which of the following is re-

NARAYAN CHANGDER
D. economical feasibility sponsible to do the requirements model-
ing?
311. FAST stands for A. Software engineer or an Analyst
A. Functional Application Specification B. System Engineer
Technique
C. Network administration
B. Fast Application Specification Tech-
D. None of the mentioned above
nique
C. Facilitated Application Specification 317. verification is ?
Technique A. Making sure that it is what the user re-
D. None of the mentioned ally wants
B. Checking that we are building the right
312. What is the first activity in Software system
Project Planning?
C. Checking that we are building the sys-
A. Determination of software scope tem right
B. Determination of budget D. Performed by an independent test
C. Find out the team size team
D. None of these 318. Which metric gives the idea about the
contents on a web page?
313. Which of the following is a characteristic
of an Agile leader? A. Word Token
A. Disinterested B. Word Count
B. Task focused C. Word Size
C. Process oriented D. Word Length
D. Supportive 319. which of these abstractions class con-
sist?
314. The purpose and character of the use, in-
cluding whether such use is of a commer- A. Attributes
cial nature or is for nonprofit educational B. operation
purposes.
C. set of objects
A. Fair Use
D. all of the above mentioned
B. Public Domain
320. it shows the breakdown of the software
C. Copyright into components that are implemented by
D. I don’t know a single developer or development team.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 425

A. logical view 326. A notation that allows the modeler to


B. process view specify, visualize and construct the arti-
facts of software systems, as well as busi-

PRACTICE BOOK» NOT FOR SALE


C. development view ness models
D. physical view
A. state diagram
321. Allows a programmer to enter, format B. use case diagram
and edit source code.
C. object diagram
A. Linker
D. sequence diagram
B. Loader
C. GUI Creation 327. The following list are the issues of pro-
D. Editor fessional responsibility EXCEPT:
A. Intellectual property rights
322. Software Consists of
A. set of instructions + operating proce- B. Team working
dures C. Computer misuse
B. programs + documentation + opera- D. Confidentiality
tion procedures
C. programs + hardware manuals 328. Which one from generic process model is
the step for Architectural Design, User In-
D. set of programs
terface Design and Component level De-
323. Which one of the following activities sign
spans all stages of a software develop- A. Modeling
ment life cycle (SDLC)?
B. Planning
A. Coding
B. Testing C. Communication

C. Project Management D. Construction


D. Design 329. Programs that monitor, analyze and con-
324. Which is not included in the Key Process trol real-world events
Element of Software Process A. Embedded
A. actions B. Real-time
B. activities C. Application
C. task
D. All
D. performance
330. Things in UML
325. Who is not a software developer team?
A. Project Leader A. abstractions of the model

B. Risk Analyst B. Relationships


C. System Analyst C. Diagrams
D. Tester D. Note

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 426

331. Which one of the following characteris- 336. External Entities may be a:
tics of software products being developed A. source of input data only
is not a symptom of software crisis?
B. source of input data or destination of
A. Fail to meet user requirements. results
B. Expensive. C. destination of results only
C. Highly interactive. D. repository of data

D. Difficult to alter, debug, and enhance. 337. Which of the following is not an effective

NARAYAN CHANGDER
software project management focus:
332. CMM stands for A. Process
A. Capability Management Module B. Product
B. Conservative Maturity Model C. Popularity
C. Capability Maturity Module D. People

D. Capability Maturity Model 338. Which is one of the most important stake-
holder from the following?
333. Why is UML used? A. Entry level personnel
A. Because it is a graphical language that B. Middle level stakeholder
can be used to model object oriented sys- C. Managers
tems
D. Users of the software
B. Because it provides the software de-
velopment community with a common lan- 339. The process of developing a software
guage product using software engineering princi-
ples and methods is referred to as, .
C. Because it is similar to java
A. Software myths
D. All of the above
B. Scientific Product
334. Testing is the activity of software which C. Software Evolution
can be avoided. D. None of the above
A. False 340. A software provides the framework
B. True from which a comprehensive plan for soft-
ware development can be established.
C. Can’t say
A. people
D. Non of the above
B. product
335. Which of the following is an important C. process
factor that can affect the accuracy and ef- D. none of the mentioned
ficacy of estimates?
341. Size can be measured in
A. Project size
A. SLOC
B. Planning process B. LOC
C. Project complexity C. SSLOC
D. Degree of structural uncertainty D. SALOC

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 427

342. DFD’s come under which phase of the D. System is automatically updated every
Software Analysis and Design? 5 seconds

PRACTICE BOOK» NOT FOR SALE


A. Process 347. Requirement engineering process in-
B. Design cludes which of these steps?
C. Analysis A. Feasibility study
D. Requirements B. Requirement Gathering

343. Which Agile methodology advocates the C. Software Requirement specification &
use of problem domain? Validation

A. Extreme programming (XP) D. All mentioned above

B. Feature-Driven Development (FDD. 348. The Incremental Model is a result of com-


C. Scrum bination of elements of which two mod-
els?
D. Evo
A. Build & FIX Model & Waterfall Model
344. Identify the correct order of the phases B. Linear Model & RAD Model
involved in Software Prototyping.A) De-
veloping the initial PrototypeB) Review of C. Linear Model & Prototyping Model
the PrototypeC) Basic Requirement Identi- D. Waterfall Model & RAD Model
ficationD) Revise and Enhance the Proto-
type 349. A maturity model can be used as a bench-
mark for comparison and as an aid to un-
A. A-B-C-D derstanding
B. C-A-D-B A. TRUE
C. C-A-B-D B. FALSE
D. A-B-D-C C. depends
345. In the Spiral model the radius of the spi- D. can’t say
ral at any point represents
350. Choose an internal software quality from
A. None of these given below:
B. the cost incurred in the project till then A. scalability
B. usability
C. the progress made in the current
phase C. reusability

D. the level of risk D. reliability

346. An example of a functional requirement 351. Your teacher needs to calculate grades for
is your class. What type of application soft-
ware would he/she MOST LIKELY use?
A. Access to the customer order system
A. Spreadsheet
B. System should be available in English
and Spanish B. Word processing

C. System can be accessed through a C. Database


Blackberry device D. Internet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 428

352. Which of the following are the valid rela- A. Yes, because you’re inserting data into
tionships in Use Case Diagrams the computer.
A. Generalization B. No, because you’re not introducing
data into the computer.
B. Include
C. I don’t know.
C. Extend
D. none of above
D. All of the mentioned
358. and are the two issues of Require-

NARAYAN CHANGDER
353. Function count method was developed by ment Analysis.
A. B.Beizer A. Performance, Design
B. B.Boehm B. Stakeholder, Developer
C. M.Halstead C. Functional, Non-Functional
D. Alan Albrecht D. None of the mentioned
354. The deployment diagram 359. Following is/are points of software def-
A. Models the physical components of an inition
architecture A. Instructions
B. Defines the installation procedures for B. Data structures
the software C. Documents
C. Models the business units in which the D. All of the above
software will be deployed
D. Defines the deployment schedule for 360. What is a Software?
an incremental installation A. Software is set of programs
B. Software is documentation and config-
355. Which of the following activities of a
uration of data
Generic Process framework provides a
feedback report? C. Software is set of programs, documen-
tation & configuration of data
A. Communication
D. None of the mentioned
B. Planning
C. Modeling & Construction 361. Which of the following life cycle model
can be chosen if the development team has
D. Deployment less experience on similar projects?
356. An testing focuses on the construction A. Spiral
and design of the software. B. Waterfall
A. unit testing C. RAD
B. integration D. Iterative Enhancement Model
C. validation
362. Which of the following is not considered
D. All as a risk in project management?

357. Typing an essay in Word is an example of A. Specification delays


input. B. Product competition

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 429

C. Testing 368. Select the option that suits the Manifesto


for Agile Software Development
D. Staff turnover
A. Individuals and interactions

PRACTICE BOOK» NOT FOR SALE


363. is the ability of a computer to perform B. Working software
tasks that require human intelligence
C. Customer collaboration
A. skill D. All of the mentioned
B. AI
369. During translation, linkers and loader are
C. Data used to
D. Application A. Bring code from libraries into the code
you are translating
364. Software engineering involves quality B. Put the code on the internet
measures to improve the quality of the
software C. Find errors in the code
D. Translate assembly code into machine
A. False
code
B. True
370. QFD stands for
C. Can’t say A. quality function design
D. Non of the above B. quality function deployment
365. Which of the following does NOT belong C. quality function development
to the qualities of a Systems analyst? D. none of the mentioned
A. Communication skills 371. What are the four framework activities
B. Understanding found in the Extreme Programming (XP)
process model?
C. Teaching and selling ideas
A. analysis, design, coding, testing
D. Thorough knowledge of computers B. planning, analysis, design, coding
366. The size of the graph matrix is C. planning, analysis, coding, testing
D. planning, design, coding, testing
A. Number of paths in the flow graph
B. Number of edges in the flow graph 372. Context diagram explains:
A. The overview of the system
C. Number of nodes in the flow graph
B. The internal view of the system
D. Number of independent paths in the
flow graph C. The entities of the system
D. The flow chart of the system
367. Locating or identifying the bugs is known
as 373. What is an object?
A. An object is an instance of a class
A. Design
B. An object includes encapsulation of
B. Testing data
C. Debugging C. An object is not an instance of a class
D. coding D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 430

374. What are the types of requirement in B. Programs + documentation + operat-


Quality Function Deployment(QFD)? ing procedures
A. Known, Unknown, Undreamed C. Programs + hardware manuals
B. User, Developer D. Set of programs
C. Functional, Non-Functional 380. Software mistakes during coding are
D. Normal, Expected, Exciting known as:
A. failures

NARAYAN CHANGDER
375. In order to represent a complicated pro-
cess you would use? B. defects
A. Class diagram C. bugs
B. Use case diagram D. errors
C. Activity diagram 381. A field of science that focuses on the
D. Venn diagram study of software is called:
A. ISO/IEC 9126
376. Interrupts a program on a specific line of
code, allowing the program is an example B. SWEDISH BOOK
of which type of IDE tool? C. SRS
A. Debugger D. IEEE
B. Trace
382. Which one is not the characteristics of
C. Breakpoint software
D. Variable Watch A. Invisibility
377. Software consists of B. Complexity
A. Set of instructions+Operating Proce- C. Longevity
dure D. Tangibility
B. Programs+Documentation+Operating
383. which diagram is used to show inter-
Procedure
actions between messages are classified
C. Programs+Hardware manuals as?
D. Set of programs A. statechart
378. What is the first step in the softwarede- B. Collaboration
velopment lifecycle? C. objectlifeline
A. System Design D. activity
B. Coding
384. Which one of the following is not a phase
C. System Testing of Prototyping Model?
D. Preliminary Investigation and Analysis A. Quick Design

379. Software consists of . B. Coding

A. Set of instructions + operating proce- C. Prototype Refinement


dures D. Engineer Product

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 431

385. Which of the following does not apply to 390. Statistically, the maximum percentage of
agility to a software process? errors belong to the following phase of
SDLC

PRACTICE BOOK» NOT FOR SALE


A. Uses incremental product delivery
strategy A. Coding
B. Only essential work products are pro- B. Design
duced
C. Requirement Specifications
C. Eliminate the use of project planning
and testing D. Installation and maintenance

D. All of the mentioned 391. Inheritance models the relationship


386. defines the properties of a data ob- A. has-a
ject and take on one of the three different B. is-a
characteristics.
C. uses-a
A. data object
D. none of above
B. attributes
C. relationships 392. The software design paradigm is a part
of software development and it includes
D. data object and attributes
.
387. Software Development Environments are A. Design, Maintenance, Programming
also known as an?
B. Coding, Testing, Integration
A. IDE
C. Requirement gathering, Software de-
B. ERD sign, Programming
C. DFD
D. None of the above
D. API
393. The analysis phase
388. Defects removal efficiency (DRE)depends
on A. Creates a diagram of the planned
classes and their relationships
A. E:errors found before software deliv-
ery B. Creates a requirement specification
B. D:defects found after delivery to user C. Verifies whether or not the the require-
ment specification has been met
C. Both A and B
D. Implements the program code
D. None of the above
389. Interaction Diagram is a combined term 394. Waterfall model a) Incremental devel-
for opment 2) Evolutionary model b) Ex-
plicit recognition of risk3) Spiral develop-
A. Sequence Diagram + Collaboration Di- ment c) Inflexible partitioning of the
agram project into stages
B. Activity Diagram + State Chart Dia-
A. 1-c, 2-a, 3-b
gram
B. 1-a, 2-b, 3-c
C. Deployment Diagram + Collaboration
Diagram C. 1-b, 2-c, 3-a
D. None of the mentioned D. 1-a, 2-c, 3-b

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 432

395. Distribution of costs depends on 401. The of a relationship is 0 if there is no


A. a development model that is used. explicit need for the relationship to occur
or the relationship is optional.
B. the budget
A. Modality
C. Investment
B. Cardinality
D. all
C. Entity
396. and are the two view points dis-
D. Structured Analysis

NARAYAN CHANGDER
cussed in Controlled Requirements Expres-
sion (CORE)., ,
402. Requirements elicitation means
A. Functional, Non-Functional User
A. Gathering of requirements
B. User, Developer
B. Capturing of requirements
C. Known, Unknown
D. All of the mentioned C. Understanding of requirements
D. All of the above
397. SQA Full form
A. Software Quality Assurance 403. Must established a map called a software
B. Software quality Appliance project plan that defines the software en-
gineering work to be done.
C. Software Quality Account
A. planning
D. Software Quality Affect
B. communication
398. IEEE 830-1993 is the recommended IEEE
standard for C. feedback

A. Testing D. analysis
B. Software Design 404. Which of the following is not achieved by
C. Software Requirement Specification an automated estimation tools?
D. Both B and C A. Predicting staffing levels
399. It verifies that system protection mecha- B. Predicting software cost
nism prevent improper access or data al- C. Predicting software schedules
teration.
D. Predicting clients demands
A. recovery testing
B. security testing 405. What best describes the purpose of an
C. performance testing Activity Diagram?

D. None A. To capture a flow of activity and maps.

400. Expand UML


B. To specify the points at which a com-
A. Unified Modeling Language puter system is used.
B. Uni Linear Language C. To specify the behavior of use cases.
C. None D. To capture the dynamic aspect of a sys-
D. none of above tem.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 433

406. Agile Software Development is based on 412. The concurrent development model is
A. Incremental Development A. Defines events that trigger engineer-

PRACTICE BOOK» NOT FOR SALE


B. Iterative Development ing activity state transitions.
C. Linear Development B. Only used for development of parallel
D. Both Incremental and Iterative Devel- or distributed systems.
opment C. Used whenever a large number of
change requests are anticipated.
407. Which quality deals with the maintaining
the quality of the software product? D. All of the above
A. Quality assurance
413. Search tip:to search for both spellings ‘or-
B. Quality control ganisation’ and ‘organization’, use:
C. Quality Efficiency
A. organi$ation
D. None of the above
B. organi? ation
408. If all three feasibility study are positive,
C. organi*ation
A. The problem is worth solving
D. Don’t know
B. Problem is not worth solving
C. Cannot say with given information 414. Which is not a type of requirements un-
D. None of the above der quality function deployment?

409. A library is used to A. Normal requirements

A. Take books out B. Abnormal requirements


B. Access functions which someone has C. Expected requirements
already developed
D. Exciting requirements
C. Write high level code
D. Covert high level code to machine code 415. Is a set of related activities that leads to
the production of the software
410. Who is responsible for sprint meeting?
A. software engineering
A. Product owner
B. software process
B. Scrum team
C. Scrum master C. software analysis
D. End user(s) D. software cycle

411. What do you understand by software? 416. What are the types of software develop-
A. Software is documentation and config- ment requirements?
uration of data
A. Availability
B. Software is set of programs
B. Reliability
C. Software is set of programs, documen-
tation & configuration of data C. Usability
D. None of the mentioned D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 434

417. checks all the requirements like func- C. memory utilization


tional, behavioral and performance re- D. processing time
quirement are validate against the con-
struction software. 423. Which of the following is not the charac-
A. Regression testing teristic of a software?
B. validation testing A. Software does not wear out
C. integration testing B. Software is not manufactured

NARAYAN CHANGDER
D. All C. Software is always correct
D. Software is flexible
418. Testing of software with actual data and
in actual environment is called 424. Classes and interfaces are a part of
A. Alpha testing A. Structural things
B. Regression testing B. Behavioral things
C. None of the above C. Grouping things
D. Beta Testing D. Annotational things
419. An abstract representation of a process. 425. Which one of the items listed below is not
A. Software Engineering one of the software engineering layers?
B. Software Process A. Process
C. Software Specification B. Manufacturing
D. Software Process Model C. Methods
D. Tools
420. A node with indegree =! 0 and out de-
gree=0 is called 426. systems are required to operate as dis-
A. Source node tributed systems across networks that in-
clude different types of computer and mo-
B. Destination node
bile devices refer to
C. Predicate node
A. Heterogeneity
D. None of the above
B. Security and trust
421. A set of activities that ensure that soft- C. Business and social change
ware correctly implements a specific func-
tion. D. All

A. verification 427. Used when a program fails to compile or


B. testing to run. Error messages are displayed to
help the programmer diagnose what has
C. validation gone wrong is an example of which type
D. implementation of IDE tool?

422. Efficiency in a software product does not A. Debugger


include B. Error Diagnostics
A. responsiveness C. Memory Inspector
B. licensing D. Variable Watch

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 435

428. If you were a lead developer of a soft- D. all of the mentioned


ware company and you are asked to sub-
mit a project/product within a stipulated 433. The Software Engineering Institute rec-

PRACTICE BOOK» NOT FOR SALE


time-frame with no cost barriers, which ommends a set of activities that ad-
model would you select? dress quality assurance planning, over-
sight, record keeping, analysis, and report-
A. Waterfall
ing.
B. Spiral
A. SQA
C. RAD
B. SCM
D. Incremental
C. Both a and b
429. How Many Architectural design we have D. None
discussed today
A. 1 434. testing etermines breakpoint of a sys-
tem to establish maximum service level.
B. 2
C. 3 A. performance

D. 4 B. validation
C. Stress testing
430. Identify the disadvantage of Spiral
Model. D. None
A. Doesn’t work well for smaller projects 435. Arrange the tasks involved in require-
ments elicitation in an appropriate man-
B. High amount of risk analysis ner.i. Consolidationii. Prioritizationiii. Re-
C. Strong approval and documentation quirements Gatheringiv. Evaluation
control A. iii, i, ii, iv
D. Additional Functionality can be added B. iii, iv, ii, i
at a later date
C. iii, ii, iv, i
431. Which of the following document contains D. ii, iii, iv, i
the user system requirements?
A. SRD 436. Aggregation models the relationship
B. DDD A. has-a
C. SDD B. is-a
D. SRS C. uses-a

432. Identify the correct statement:“Software D. none of above


engineers shall 437. Which of the following is a building block
A. act in a manner that is in the best in- of UML?
terests of his expertise and favour.”
A. Things
B. act consistently with the public inter-
B. Relationships
est.”
C. ensure that their products only meet C. Diagrams
the D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 436

438. Alpha testing is done by 444. Size and Complexity are a part of
A. Customer A. Product Metrics
B. Tester B. Process Metrics
C. Developer C. Project Metrics

D. All of the above D. None of the above


445. Compilers, software editors come under
439. Maintenance phase is important be-
what kind of software

NARAYAN CHANGDER
cause?
A. System Software
A. focuses about long-term success
B. Application Software
B. takes care of any production issues
C. Scientific Software
C. all choices
D. None of the above
D. none of above
446. “Are we building the product right?
440. A description of each function presented means
in the DFD is contained in a A. validation
A. data flow B. Verification
B. process specification C. both
C. control specification D. none
D. data store 447. Utility program is under
441. A data abstraction is a named collection A. AI
of data that describes a data object B. System software
A. data manipulation C. Embedded
B. data hiding D. All
C. Both A and D 448. Estimation of size for a project is depen-
D. data abstraction dent on
A. Cost
442. SRS document is for:
B. Schedule
A. “What” of a system?
C. Time
B. “How” to design the system? D. None pf these
C. Costing and scheduling of a system
449. A is a logical grouping of database
D. System’s requirement objects, usually to facilitate security, per-
formance, or the availability of database
443. Boundary value analysis belong to? objects such as tables and indexes.
A. White box Testing A. Tablespace
B. Black box Testing B. Segments
C. Black box Testing & White box Testing C. Extents
D. none of above D. Blocks

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 437

450. The component-based development 455. Example of a Non functional Require-


model is ment

PRACTICE BOOK» NOT FOR SALE


A. Only appropriate for computer hard- A. Cash withdrawal in banking System
ware design. B. Deposit money in a Banking System
B. Not able to support the development of C. Speed
reusable components.
D. Loan processing in Banking System
C. Dependent on object technologies for
support. 456. Estimation of software development ef-
fort for organic software is COCOMO is
D. Not cost effective by known quantifi-
able software metrics. A. E = 2.4 (KLOC)1.05 PM
B. E = 3.4 (KLOC)1.06 PM
451. Which one of the following is not an Evo-
C. E = 2.0 (KLOC)1.05 PM
lutionary Process Model?
D. E = 2.4 (KLOC)1.07 PM
A. WINWIN Spiral Model
B. Incremental Model 457. Unit testing is run by
A. App developer
C. Concurrent Development Model
B. software developer
D. All are Evolutionary Software Models
C. software tester
452. What is the main aim of Software engi- D. software developer & tester
neering?
458. Evolutionary software process models
A. Reliable software
A. Are iterative in nature
B. Cost effective software
B. Can easily accommodate product re-
C. Reliable and cost effective software
quirement change
D. None of the above C. Do not generally produce throwaway
systems
453. What is Spike solutions in Extreme Pro-
gramming D. All the above
A. preparing CRC card 459. A software process model represents
B. preparing data flow diagram which one of the following?
A. The way in which software is devel-
C. preparing a prototype
oped
D. None of the above
B. The way in which software processes
454. Programs that are digital and you cannot data
physically touch. They give instruction to C. The way in which software is used
the computer. D. The way in which s/w may fail
A. keyboard
460. The models the collaboration of ob-
B. mother board jects based on a time sequence.
C. hardware A. Sequence Diagram
D. software B. State Machine Diagram

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 438

C. Profile Diagram 466. software mistakes during coding is


D. Object Diagram known as?

461. Taking a picture with the cell phone is an A. Errors


example of output. B. bugs
A. No, because it’s not the result of pro-
C. failures
cessing data.
B. Yes, because it’s the result of process- D. defects

NARAYAN CHANGDER
ing data.
467. In Software Process, are considered
C. I don’t know.
as the stakeholders
D. none of above
A. Customers
462. testing requires the tester to under-
stand what the program is supposed to do, B. End-Users
but not how it works, they are unable to C. Project Managers
“see inside” the program.
D. All of the above
A. validation
B. Black box 468. How many phases are there in Scrum?
C. integration
A. Two
D. None
B. Three
463. Which one is the superlative for:I am /
at programming (good) C. Four
A. I am better at programming D. Scrum is an agile method which means
B. I am the best at programming it does not have phases

C. I am gooder at programming
469. In a DFD external entities are repre-
D. none of above sented by a:
464. A context diagram is used: A. rectangle
A. as the first step in developing a de- B. ellipse
tailed DFD of a system
C. diamond shaped box
B. in systems analysis of very complex
systems D. circle
C. as an aid to system design
D. as an aid to programmers 470. is to use hypermedia to present text,
graphics, audio, and video content to the
465. Software engineers are by their nature end-user.
A. Content Sensitive
A. Aesthetic people
B. Continous Evolution
B. narrow-minded people
C. both A and B C. Data Driven
D. Constructive People. D. Security

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 439

471. Being a software manager, when you C. Simple development learning cycle
will decide the number of people required D. Non of the above
for a software project?

PRACTICE BOOK» NOT FOR SALE


A. Before the scope is determined. 477. Which design identifies the software as a
system withmany components interacting
B. Before an estimate of the development
with each other?
effort is made.
A. Architectural design
C. After an estimate of the development
effort is made. B. High-level design
D. No need to decide C. Detailed design

472. Displays the current value of any variable D. none


is an example of which type of IDE tool? 478. The contains a state transition dia-
A. Debugger gram that is a sequential specification of
B. Trace behavior.
C. Breakpoint A. data flow diagram
D. Variable Watch B. state transition diagram
C. control specification
473. Which model in system modelling depicts
the dynamic behaviour of the system? D. workflow diagram
A. Context Model 479. A testing conducted at the developer’s
B. Behavioral Model site under validation testing.
C. Data Model A. Alpha
D. Object Model B. Gamma
474. The enables the software engineer to C. Lambda
develop models of the information domain D. Unit
and functional domain at the same time
480. An assessment of the practicality of a
A. Data flow diagram
proposed plan or method.
B. State transition diagram
A. project management
C. Control specification
B. software process
D. Activity diagram
C. feasibility study
475. A COCOMO model is D. none of above
A. Common Cost estimation model
481. Which ONE of the following characteris-
B. Constructive cost Estimation model
tics of a software product being developed
C. Complete cost estimation model is not a symptom of the software crisis?
D. Comprehensive Cost estimation model A. Fail to meet user requirements.
476. SDLC means B. Expensive.
A. Software Development life cycle C. Highly interactive.
B. System development life cycle D. Difficult to alter, debug, and enhance.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 440

482. Beta testing is carried out by B. Corrective


A. Users C. adaptive
B. Developers D. perfective
C. Testers 488. A Class consists of which of these ab-
D. All of the above stractions?
A. Set of the objects
483. Internal failure costs include
B. Operations

NARAYAN CHANGDER
A. a)rework
C. Attributes
B. b)repair
D. All of the mentioned
C. c)failure mode analysis
489. From the following which quality deals
D. All a, b, c
with maintaining the quality of the soft-
484. Which of the following statements re- ware product?
garding Build & Fix Model is wrong? A. Quality assurance
A. No room for structured design B. Quality control
B. Code soon becomes unfixable & un- C. Quality efficiency
changeable D. None of the above
C. Maintenance is practically not possi-
ble 490. The software that supports a computer’s
basic functions, such as scheduling tasks,
D. It scales up well to large projects executing applications, and controlling pe-
485. Which step among these follows the ripherals.
wrong sequence in software engineering A. Software Application
design process? B. Utility Software
A. Analyze problem C. Operating System
B. Generate candidate architecture D. I don’t know
C. Finalize design
491. is graphical representation for speci-
D. Select detailed design fying which actions to perform depending
on given conditions.
486. The result of the requirements engineer-
ing task is an analysis model that de- A. Decision Tree
fines which of the followingproblem do- B. Decision table
main(s)? C. Flowchart
A. information D. System Chart
B. functional
492. what’s the job(s) that included on implem-
C. behavioral ntation phase?
D. all of the above A. web Developer
487. Which of the following is not a type of B. mobile developer
maintenance? C. disktop applications developer
A. Translation D. all choices

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 441

493. Changes keywords and annotation to dif- C. Process allows team to streamline
ferent colours is an example of what IDE tasks
tool?

PRACTICE BOOK» NOT FOR SALE


D. Uses incremental product delivery
A. Automatic Formatting strategy
B. Automatic Color Coding 498. Which of the following traits need to ex-
C. Automatic Editing ist among the members of an agile soft-
D. Automatic Linking ware team?
A. Competence
494. Checks for errors, bugs and interoperabil-
ity. The goal is to ensure that defects are B. Decision-making ability
recognized as soon as possible. This is C. Mutual trust and respect
part of D. All of the above
A. Analysis
499. How many stages are in COCOMO II
B. Design
A. 2
C. Testing
B. 3
D. Implementation
C. 4
495. Why is Requirements Elicitation a diffi-
D. 5
cult task?
A. Problem of scope 500. Consists of categories that include logi-
cal reasoning, critical thinking, communica-
B. Problem of understanding
tion, research, data analysis and creativ-
C. Problem of volatility ity.
D. All of the mentioned A. analytical

496. During an Iteration (Sprint) the develop- B. planning


ers should be: C. communication
A. Able to contact the customer to clarify D. feedback
aspects of the work
501. Waterfall model is not suitable for:
B. Completely uninterrupted by the cus-
tomer A. Small projects
C. In twice-daily contact with the cus- B. Complex projects
tomer C. Accommodating changes
D. Able to work without needing to dis- D. Maintenance Projects
turb the customer
502. What describes the data and control to
497. Which of the following is not necessary be processed?
to apply agility to a software process?
A. Planning process
A. Eliminate the use of project planning
and testing B. Software scope

B. Only essential work products are pro- C. External hardware


duced D. Project complexity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 442

503. Identify the simplest model of software 509. COCOMO model is


development paradigm? A. Common Cost estimation model
A. Spiral model B. Constructive Cost estimation model
B. Big Bang model C. Complete cost estimation model
C. V-model D. Comprehensive cost estimation model
D. Waterfall model 510. Four types of change are encountered dur-
ing the support phase. Which one of the

NARAYAN CHANGDER
504. Which is not a functional testing tech- following is not one that falls into such cat-
nique? egory?
A. Decision table A. Translation
B. Regression testing B. Correction
C. Boundary value analysis C. Adaptation
D. None of the above D. Prevention

505. SDLC stands for 511. A node with indegree 0 and out de-
gree=0 is called
A. System Development Life cycle
A. Source node
B. Software Design Life Cycle B. Predicate node
C. Software Development Life Cycle C. Destination node
D. System Design Life Cycle D. None of the above

506. Resources refers to 512. Examples of external failure costs are


A. Manpower A. complaint resolution
B. Machinery B. product return and replacement
C. help line support and warranty work
C. Materials
D. All a, b, c
D. All of the above
513. Which of the following categories is part
507. Relationships in UML of the output of software process?
A. abstractions of the model A. computer programs
B. tie things together B. documents that describe the computer
programs
C. Classifier
C. data
D. Node
D. all of the mentioned
508. Which of the following is not a project
514. What are attributes of good software?
manager’s activity?
A. Software maintainability
A. project control
B. Software functionality
B. project management
C. Software development
C. project planning D. Software maintainability & functional-
D. project design ity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 443

515. A process that involves continuously im- A. i, ii, iv, iii


proving and detailing a plan as more detail B. i, ii, iii, iv
become available is termed as

PRACTICE BOOK» NOT FOR SALE


C. ii, iv, i, iii
A. project analysis
D. None of the above
B. project enhancing
C. progressive deliberation 521. In collaborative requirements gathering
the facilitator
D. progressive elaboration
A. arranges the meeting place
516. These are application systems that run on B. can not be a customer
a local computer, such as a PC.
C. controls the meeting
A. Interactive transaction-based applica-
tions D. must be an outsider

B. Entertainment systems 522. According to agility principle Business


C. Stand-alone applications People and developers must work

D. all A. independently
B. together
517. Quality Management in software engi-
neering is also known as C. both A and B

A. SQA D. None

B. SQM 523. Due to the complexity of modern systems


C. SQI and computer products, there is a need for

D. SQA and SQM A. structured software development pro-


cesses
518. Which is not a product metric? B. structured object-oriented programs
A. Size C. structured charts
B. Reliability D. structured software teams
C. Productivity
524. which one of the following is a require-
D. Functionality ment that fits in a developer’s module?
519. Printing a document is an example of out- A. Availability
put. B. Testability
A. Yes, because it is the result of process- C. Usability
ing data.
D. Flexibility
B. No, because it’s not the result of pro-
cessing data. 525. Which one is the comparative for:Mexico
C. I don’t know. City / London (big)
D. none of above A. Mexico City is the biggest than London.

520. Starting from least to most important, B. Mexico City is more big than London.
choose the order of stakeholder.i. Man-
agersii. Entry level Personneliii. Usersiv. C. Mexico City is bigger than London.
Middle level stakeholder D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 444

526. The X19 notebook computer features a C. Profile


very design. D. Activity
A. compact
532. For a function of n variables, boundary
B. little value analysis yields:
C. small A. 4n+3 test cases
D. none of above
B. 4n+1 test cases

NARAYAN CHANGDER
527. Which two models doesn’t allow defining C. n+4 test cases
requirements early in the cycle?
D. None of the above
A. Waterfall & RAD
533. Which of the following is not an exam-
B. Prototyping & Spiral
ple of infrastructure components that may
C. Prototyping & RAD need to be integrated into the software ar-
D. Waterfall & Spiral chitecture?
A. Communications components
528. Which one is not a step of requirement
engineering? B. Database components
A. Requirements elicitation C. Interface components
B. Requirements analysis D. Memory management components
C. Requirements design 534. In the requirement analysis which model
D. Requirements documentation depicts the information domain for the
problem?
529. Compilers, Editors software is included in
A. Data models
which type of software?
B. Class-Oriented models
A. System software
C. Scenario-based models
B. Application software
D. Flow-oriented models
C. Scientific software
D. All wrong 535. RAD software process model stands
for?
530. A relational database system needs to
A. Rapid Application Development
maintain data about the relations, such as
the schema of the relations. This is called B. Relative Application Development
A. Metadata C. Rapid Application Design
B. Catalog D. Recent Application Development
C. Log 536. Which of the following is not generic
D. Dictionary product?

531. An/A diagram is a graph of instances, A. Adobe photoshop


including objects and data values. B. CAD software
A. Class C. Microsoft Teams
B. Object D. TIMeS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 445

537. A step in waterfall model that involves a 542. The Linear Sequential or Classic Life Cycle
meeting with the customer to understand is also called.
the requirements.

PRACTICE BOOK» NOT FOR SALE


A. Waterfall Model
A. Requirement Gathering B. Incremental Model
B. SRS C. Spiral model
C. Implementation D. Prototyping Model
D. Customer review 543. Compilers, Editors software come under
which type of software?
538. is the application systems that run
one a local computer. it does not need to A. System software
be connected to a network. B. Application software
A. Stand-alone applications C. Scientific software
B. Embedded control systems D. None of the above
C. Batch processing systems 544. Which one is NOT a phase of the systems
D. Simulation system development life cycle?
A. System Design
539. A characteristic of a software system
that can lead to a system error is known B. Analysis
as? C. Decision Analysis
A. Human error or mistake D. Testing
B. System fault 545. Software designed to help to analyze,
C. System error configure, optimize or maintain a com-
puter.
D. System failure
A. utility software
540. Verification is B. hardware
A. Checking the product with respect to C. software
customer’s expectation
D. peripheral devices
B. Checking the product with respect to
specifications 546. Which of the following is not one of the
context-free questions that would be used
C. Checking the product with respect to
during project inception?
the constraints of the project
A. What will be the economic benefit from
D. All of the above
a good solution?
541. What makes requirements elicitation dif- B. Who is behind the request for work?
ficult? C. Who will pay for the work?
A. Bounding scope D. Who will use the solution?
B. Understanding user need
547. Compiler software comes under which
C. Requirements volatily type of software
D. All of the above A. System Software

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 446

B. Application software C. 2, 4, 5, 1, 3, 6
C. Scientific software D. 4, 2, 5, 1, 6, 3
D. None
553. A system analyst is on location with the
548. Occurs when outputs of a system are specialist or the users of the system to
routed back as inputs as part of a chain elicit requirements. This Requirement Elic-
of cause-and-effect that forms a circuit or itation technique is:
loop. A. use of questionnaires

NARAYAN CHANGDER
A. planning B. field observation
B. analytical C. interviewing
C. feedback D. brainstorming
D. communication
554. “Are we building the right product? ”
549. Which is not one of the types of proto- means
type of Prototyping Model? A. requirement analysis
A. Horizontal Prototype B. verification
B. Vertical Prototype C. Validation
C. Diagonal Prototype D. all
D. Domain Prototype
555. Which of these does not account for soft-
550. Unit testing is carried out during which ware failure?
phase of the waterfall model? A. Increasing Demand
A. Implementation phase B. Low expectation
B. Testing phase C. Increasing Supply
C. Maintenance phase D. Less reliable and expensive
D. Design phase
556. Which of these software engineering ac-
551. Which of these is not a similarity be- tivities are not a part of software pro-
tween the v-shaped model and the water- cesses?
fall model?
A. Software development
A. It is easy to understand
B. Software dependence
B. Have requirements
C. Software validation
C. Little flexibility
D. Software specifications
D. Testing is applied throughout
557. Which one is the most important feature
552. Arrange the following steps to form a ba- of spiral model?
sic/general Engineering Process Model.i.
A. Quality management
Test ii. Designiii. Installiv. Specificationv.
Manufacturevi. Maintain B. Risk management
A. 2, 4, 5, 1, 6, 3 C. Performance management
B. 4, 2, 5, 1, 3, 6 D. Efficiency management

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 447

558. In TSP, the sequence of tasks i.e scripts C. Feasibility Study


enables the team to establish a solid basis D. I don’t know
for starting a project in framework activ-

PRACTICE BOOK» NOT FOR SALE


ity 563. What are the characteristics of soft-
A. launch ware?
B. high-level design A. Software is developed or engineered;
it is not manufactured in the classical
C. implementation sense.
D. postmortem B. Software doesn’t “ wear out “.
559. Consider the following Statement:“The C. Software can be custom built or cus-
output of a program shall be given tom build.
within 10 secs of event X 10% of the D. All mentioned above
time.”What characteristic of SRS is being
depicted here? 564. In function point analysis, the number of
A. Consistent complexity adjustment factors is
B. Verifiable A. 10
C. Non-verifiable B. 12
D. Correct C. 14
D. 20
560. testing focus on the smallest unit of
software design, i.e module or software 565. What are the signs that a software
component. project is in trouble?
A. Unit testing A. The product scope is poorly defined.
B. verificaiton testing B. Deadlines are unrealistic.
C. validation testing C. Changes are managed poorly.
D. integration testing D. All of the above.
561. In CMM, the life cycle activities of re- 566. Which of the following process is con-
quirements analysis, design, code, and cerned with analyzing the costs and ben-
test are described in efits of proposed changes?
A. Software Product Engineering A. Change management
B. Software Quality Assurance B. Version management
C. Software Subcontract Management C. System building
D. Software Quality Management D. Release management
562. Is the application of processes, meth- 567. Build & Fix Model is suitable for program-
ods, skills, knowledge and experience to ming exercises of LOC (Line of Code).
achieve specific project objectives accord-
ing to the project acceptance criteria within A. 100-200
agreed parameters. B. 200-400
A. System Process C. 400-1000
B. Project Management D. above 1000

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 448

568. During validation 573. What is the purpose of Use Case dia-
gram?
A. Process is checked
A. Functional decomposition
B. Product is checked
B. Identification of functional require-
C. Developer’s performance is evaluated ments
C. To define sequences of actions
D. The customer checks the product
D. To identify nultiplicities

NARAYAN CHANGDER
569. The Unified Modeling Language (UML) 574. The operation phase of the waterfall
has become an effective standard for soft- model is a synonym for which one of the
ware modelling.How many different nota- following phases?
tions does it have?
A. Coding and unit testing phase
A. Three B. Integration and system testing phase
B. Four C. Maintenance phase
C. Six D. Design phase
D. Nine 575. The use case is a template driven descrip-
tion of an interaction between
570. Among following which is NOT an objec-
tive of validation? A. An actor and the software
B. Design and testing
A. Ensure requirements meet business
needs C. Coding and debugging
B. Promote agile method D. Preliminary investigation and analysis

C. Ensure requirements meet require- 576. COCOMO was developed initially by


ments quality criteria A. B.W.Bohem
D. To document stated requirements B. Gregg Rothermal
C. B.Beizer
571. Line of code(LOC) of the product comes
under which type of measures? D. E. F. Codd

A. Direct measures 577. How many maturity levels in CMM are


available?
B. Coding
A. 6
C. Indirect measures
B. 5
D. None of the above
C. 4
572. In COCOMO model, if project size is typi- D. 3
cally 2-50 KLOC, then which mode is to be
578. Which model is most popular for stu-
selected?
dent’s small projects?
A. Organic A. Waterfall model
B. Semidetached B. Spiral model
C. Embedded C. Quick and fix model
D. Productive D. Prototyping model

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 449

579. CASE Tool is C. 14


A. Computer Aided Software Engineering D. 12

PRACTICE BOOK» NOT FOR SALE


585. Structured Analysis can also be called as
B. Component Aided Software Engineer-
ing A. Process Modelling
C. Constructive Aided Software Engineer- B. Data Flow Modelling
ing C. Both a and b
D. Computer Analysis Software Engineer- D. None of the Above
ing
586. Which is NOT a requirements analysis
580. Functional testing is known as: strategy?
A. Structural testing
A. Understanding of the as-is system
B. Behavior testing
B. Identifying improvements
C. Regression testing
C. Understanding of screen design, lay-
D. None of the above out and navigation
581. Which one of the following is not a soft- D. Developing requirements for the to-be
ware process quality? system
A. Productivity 587. In whcich relationship of uml we are hav-
B. Portability ing multiplicity
C. Timeliness A. Association
D. Visibility B. Dependecy
582. Interfaces model the relationship C. Generalization
A. has-a D. relization
B. is-a 588. “Consider a system where, a heat sensor
C. uses-a detects an intrusion and alerts the security
company.” What kind of a requirement
D. none of above
the system is providing?
583. By levelling a DFD we mean: A. Functional
A. splitting it into different levels B. Non-Functional
B. make its structure uniform C. Known Requirement
C. expanding a process into one with D. None of the above
more sub-processes giving more detail
D. summarizing a DFD to specify only the 589. Is the set of activities and associated re-
essentials sults that produce a software product.
A. Software Evolution
584. In function point analysis, number of
Complexity adjustment factor are B. Software Development
A. 10 C. Software Process
B. 20 D. I don’t know

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 450

590. The requirement engineering process in- B. No.


cludes which of the following steps? C. I don’t know.
A. Feasibility study D. none of above
B. Requirement Gathering
596. Which of the following is not a maturity
C. Software Requirement specification & level in CMM?
Validation
A. Design
D. All of these

NARAYAN CHANGDER
B. Repeatable
591. User requirements are expressed as C. Managed
in Extreme Programming.
D. Optimizing
A. implementation tasks
597. The design phase
B. functionalities
A. Determines whether or not the pro-
C. scenarios
gram is feasible
D. none of the mentioned
B. Determines which classes are needed
592. A node with indegree=0 and out degree and what they will do
0 is called C. Determines whether or not the pro-
A. Source node gram works
B. Destination node D. Implements the program code
C. Transfer node 598. Internet Explorer and Google Chrome are
D. None of the above examples of
A. Utilities
593. User requirements are expressed as in
Extreme Programming B. Operating System
A. implementation tasks C. Web Browsing Software
B. functionalities D. Applications Software
C. scenarios 599. Decision-Table is a way
D. none of the mentioned A. Of representing multiple conditions
594. odd one in Building Blocks of UML B. Of representing the information flow
A. Things C. To get an accurate picture of the sys-
tem
B. Relationships
D. All of these
C. Diagrams
D. Rules 600. Which requirements are related to sys-
tem attributes such as reliability and re-
595. Is this a valid example of the sponse time.
Input-Process-Output Model? In- A. Non-functional requirements
put:Text and numbers typed on key-
board.Process:Calculations performed in B. Functional Requirements
a spreadsheet.Output:Bank record. C. Domain Requirements
A. Yes. D. Software Requirements

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 451

601. The battery isn’t completely flat, but its 606. What is the process of analyzing, docu-
very menting, tracking, prioritizing and agree-
ing on the requirement and controlling the

PRACTICE BOOK» NOT FOR SALE


A. down
communication to relevant stakeholders?
B. short
A. Requirement Management
C. low
D. none of above B. Requirement Elicitation
C. Requirement Analysis
602. A program which loads previously com-
piled code into memory is an example of D. Requirement verification
which type of IDE tool?
A. Linker 607. Which is not a characteristic of a good
SRS?
B. Loader
A. Correct
C. Editor
D. Variable Watch B. Complete
C. Consistent
603. AN ACT PRESCRIBING THE INTELLEC-
TUAL PROPERTY CODE AND ESTABLISH- D. Brief
ING THE INTELLECTUAL PROPERTYOFFICE,
PROVIDING FOR ITS POWERS AND FUNC- 608. For a function of two variables, how
TIONS, AND FOR OTHER PURPOSES. many cases will be generated by robust-
A. Republic Act No. 8393. ness testing?
B. Republic Act No. 8292. A. 9
C. Republic Act No. 8193. B. 13
D. Republic Act No. 8293. C. 25
604. Engineers developing software should D. 42
not
A. be dependent on their colleagues 609. White box resting also known as
B. maintain integrity and independence in A. glass box testing
their professional judgment
B. globe box testing
C. not knowingly accept work that is out-
side your competence C. Rod box testing
D. not use your technical skills to misuse D. none of above
other people’s computers
610. Which of the following is / are the differ-
605. is also known as behavioural testing ent types of resources?
focuses on requirements of software
A. Employees
A. Blue box testing
B. red box testing B. Reusable Software

C. Black box testing C. Office Equipments


D. none of above D. All of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 452

611. Solve the Decision Table Example:Select 616. Software engineering involves
the largest of three distinct numbers A, B, A. Using engineering tools and tech-
CFind out how many conditions and actions niques in software development
in given data?
B. Using scientific way to software devel-
A. Condition=3 and Action=3 opment
B. Condition=6 and Action=3 C. Both A and B
C. Condition=4 and Action=4 D. Non of the above

NARAYAN CHANGDER
D. Condition=3 and Action=6 617. Selection of a model is based on
A. Requirements
612. In which process the developers discuss
B. Development team & Users
with the client and end users and know
their expectations from the software? C. Project type and associated risk
A. Requirement gathering D. All of the mentioned

B. Organizing requirements 618. I don’t think this printer is with my


computer.
C. Negotiation & discussion
A. compatible
D. Documentation
B. connectable
613. Which one of the following is not an ap- C. suitable
plication of embedded software product? D. none of above
A. keypad control of a security system 619. is systematic approach to test a sys-
B. pattern recognition game playing tem

C. digital function of dashboard display in A. Test plan


a car B. Software application
D. none of the mentioned C. Either A or B
D. none of above
614. Status quo means
620. Engineers make things work. They apply
A. Identifies the specific problem to be theories, methodology, and tools where
solved these are appropriate. it refers to
B. Key Process areas A. Engineering discipline
C. Represents the current state of affairs B. All aspect of the software solution
C. systematic review
D. Solution D. all

615. RAD Model has 621. If requirements are frequently changing,


which model is to be selected?
A. 2 phases
A. Waterfall model
B. 3 phase B. Prototyping model
C. 5 phases C. RAD model
D. 6 phases D. Iterative enhancement model

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 453

622. How many number of maturity levels in C. A decision table is directly understood
CMM are available? by the computer

PRACTICE BOOK» NOT FOR SALE


A. 6 D. All of the above
B. 5
627. Prototyping aims at
C. 4
A. End User understanding and approval
D. 3
B. Program Logic
623. A describes a system’s functional re-
quirements in terms of use cases. It is a C. Planning
model of the system’s intended functional- D. None of these
ity and its environment.
A. Use Case Diagram 628. What is Cyclomatic complexity?
B. State Transition Diagram A. Black box testing
C. Object Diagram B. White box testing
D. Functionality Diagram C. Yellow box testing
624. Which is NOT a purpose of the require- D. Green box testing
ments definition?
A. To give a very high-level explanation of 629. What is the advantage of the recursive
the business requirements approach than an iterative approach
B. A more precise list of requirements A. Consumes less memory
that can be used as inputs to the rest of B. Less code and easy to implement
analysis
C. Consumes more memory
C. Create functional requirements
D. Create cost/benefit analysis D. More code has to be written

625. Is part of the initial design stage of any 630. The course generated code and you must
project/plan. It is conducted in order test an uncover error in that code.
to objectively uncover the strengths and
A. construction
weaknesses. In addition, a of a proposed
project or an existing business. B. modeling
A. System Process C. communication
B. Project Management D. feedback
C. Feasibility Study
631. Software project management consists of
D. I don’t know
the following activities
626. Which, of the following is not true about A. Project planning
the description of a decision table?
B. Scope management
A. A decision table is easy to modify
C. Project estimation
B. A decision table is easy to understand
D. All the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 454

632. It is a systems methodology where a pro- 637. When evaluating information, use the
totype is built, tested and then reworked CRAAP principle, which stands for:
as necessary until an acceptable outcome A. Cost, Relevant, Authority, Accuracy,
is achieved from which the complete sys- Purpose
tem or product can be developed.
B. Currency, Role, Authority, Accuracy,
A. Waterfall Model Purpose
B. Prototyping Model C. Cost, Relevant, Authority, Accuracy,

NARAYAN CHANGDER
C. Spiral Model Perspective
D. Evolutionary Development Model D. Currency, Relevant, Authority, Accu-
racy, Purpose
633. What does the study of an existing sys-
tem referto? 638. Incremental model needs
A. Details of ER diagram A. bigger development team
B. Feasibility Study B. requirements is not the prime concern

C. System Analysis
C. Well understood requirements
D. System Planning
D. none of above
634. Which one of the following is not an
639. Which design model elements are used to
Umbrella Activity that complements the
depict a model of information represented
five process framework activities and help
from the user view?
team manage and control progress, qual-
ity, change, and risk. A. Architectural design elements
A. Reusability management B. Component-level design elements
B. Risk management C. Data design elements
C. Measurement D. . Interface design elements
D. User Reviews 640. Which one is the comparative for:is Intel
is / (fast) than AMD for gaming?
635. Class responsibility collaborator (CRC)
modeling describes, A. is Intel is faster than AMD for gaming?

A. Identification and organization of the


classes those are relevant to system B. is Intel is more fast than AMD for gam-
ing?
B. Product requirements
C. is Intel is the fastest than AMD for
C. Both A and B gaming?
D. None of the mentioned above D. none of above
636. Acceptance testing is also known as 641. Requirements elicitation is nothing but
A. Grey box testing A. Requirements gathering
B. White box testing B. requirements analysis
C. Alpha Testing C. requirements specification
D. Beta testing D. requirements validation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 455

642. The user system requirements are the C. maintenance phase


parts of which document? D. analysis phase

PRACTICE BOOK» NOT FOR SALE


A. SDD
648. In the Analysis phase, the development
B. SRS of the occurs, which is a clear state-
C. DDD ment of the goals and objectives of the
D. DFD project.
A. documentation
643. What are the system requirement of the
B. flowchart
documents..?
C. program specification
A. SRS
D. design
B. SDD
C. SRD 649. Projects management is divided in
process groups.
D. DDD
A. 5
644. The programs and routines for a com-
B. 7
puter or the program material for an elec-
tronic device which make it run. C. 9
A. software D. 11
B. hardware 650. Identify type of software engineering
C. peopleware diversity for mobile application to opti-
mize energy saving at home using mobile
D. power supply phone.
645. Windows Media Player is an example of A. Data collection system
software. B. Embedded control system
A. Spreadsheet C. Batch processing system
B. Reference D. Modeling and simulation system
C. Presentation
651. After the finalization of SRS, we may like
D. Multimedia to estimate
646. Is a customer involved test development A. Size
and validation in XP? B. Cost
A. Yes C. Development time
B. No D. All of these
C. It may vary from Customer to Cus-
652. A program which helps locate, identify
tomer
and rectify errors in a program is an ex-
D. None of the mentioned ample of which type of IDE tool?
647. the design phase depends on a previous A. Debugger
phase, what’s this phase? B. Trace
A. Testingphase C. Breakpoint
B. requiremnetsphase D. Variable Watch

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 456

653. a. Which of the following would not be A. Object Oriented Design (by Booch)
an appropriate class name? B. Use Cases (by Jacobson)
A. student C. Fusion (by Coleman)
B. Tony D. Object Modeling Technique (by Rum-
C. teacher baugh)
D. staff 659. is the process of translating a task
into a series of commands that a computer

NARAYAN CHANGDER
654. Which SDLC activity does the user initi-
will use to perform that task.
ates the request for a desired software
product? A. Project design
A. Requirement gathering B. Installation
B. Implementation C. Systems analysis
C. Disposition D. Programming
D. Communication 660. What is the recommended distribution of
effort for a project?
655. For a function of n variables robustness
testing of boundary value analysis yields: A. 40-20-40
B. 50-20-30
A. 4n+1
C. 30-40-30
B. 4n+3
D. 50-30-20
C. 6n+1
D. None of the above 661. Which of the following is not a point of
concern for Software engineering?
656. A program which allows previously com-
A. Quality of Software
piled code, from software libraries, to be
linked together is an example of which IDE B. Time taken to complete the software
tool. C. User Interface of the software
A. Linker D. Customer satisfaction
B. Loader 662. A project usually has a timeline chart
C. GUI Creation which was developed by
D. Editor A. Henry Gantt
B. Barry Boehm
657. A structured set of activities required to
develop a software system. C. Ivar Jacabson
A. Software Engineering D. None of the mentioned
B. Software Process 663. Class diagram, component diagram, ob-
C. Software Specification ject diagram, and deployment diagram are
D. Software Process Model A. structural
B. behavioral
658. What kind of approach was introduced
for elicitation and modelling to give a func- C. Non structural
tional view of the system? D. Non behavioral

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 457

664. The longer a fault exists in software 670. The Nonfunctional components consist of
A. the more tedious its removal becomes

PRACTICE BOOK» NOT FOR SALE


A. Re usability
B. the more costly it is to detect and cor- B. Adaptability
rect C. Reliability
C. the less likely it is to be properly cor- D. All of the mentioned
rected
D. All of the mentioned 671. Abbreviate the term SRS.
A. Software Requirement Specification
665. SRD stands for .
B. Software Refining Solution
A. Software Requirements Definition
C. Software Resource Source
B. Structured Requirements Definition
D. None of the above
C. Software Requirements Diagram
D. Structured Requirements Diagram 672. In three or four years, my new computer
will probably be
666. Software designed to facilitate a conver- A. old fashioned
sation between a computer and human
end-user? B. behind the times

A. Voice response C. obsolete

B. Walkie Talkie D. none of above

C. Chatbot 673. During project inception the intent of the


D. Messaging of the tasks are to determine
A. basic problem understanding
667. Purpose of process is to deliver software
B. nature of the solution needed
A. in time
C. people who want a solution
B. with acceptable quality
D. All of the above
C. that is cost efficient
D. both in time & with acceptable quality 674. Which of the following is/are White box
technique?
668. The SRS document is also known as A. Statement Testing
specification.
B. Decision Testing
A. Black-box
C. Condition Coverage
B. White-box
D. All of the mentioned
C. Grey-box
D. Blue-box 675. PSP activity isolates requirements and
size and resource estimates are the part
669. Operational feasibility is for of?
A. Organisational level A. planning
B. Unit level B. high-level design
C. Horizontal level of the company C. high-level design review
D. None of the above D. development

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 458

676. The Vocabulary of UML encompases C. Software Developemnt


kinds ofbuilding Blocks
D. none of above
A. 1
B. 2 682. Which phase of waterfall model takes
more time?
C. 3
A. Requirement gathering
D. 4
B. Construction
677. A description of each function presented

NARAYAN CHANGDER
in the DFD is contained in C. Design

A. Data Flow D. Deployment


B. Process Specification 683. Which one of the following models is not
C. Control Specification suitable for accommodating any change?
D. Data Store A. Waterfall Model
678. The spiral model has two dimensions B. RUP Model
namely and C. Prototyping Model
A. diagonal, angular D. Evolutionary Development Model
B. radial, perpendicular
C. radial, angular 684. “A heat sensor detects an intrusion and
alerts the security company.” What kind
D. diagonal, perpendicular of a requirement the system is providing?
679. Which things are dynamic parts of UML A. Functional
models?
B. Non-Functional
A. Structural things
C. Known Requirement
B. Behavioral things
D. None of the above
C. Grouping things
D. Annotational things 685. Site for Alpha testing is

680. Which aspect is important when the soft- A. Software company


ware is moved from one platform to an- B. Installation place
other?
C. Any where
A. Maintenance
D. None of the above
B. Operational
C. Transitional 686. Which one of the following is not a fun-
damental activity for software processes
D. None of the above
in software engineering?
681. is a collection of activities, actions A. Software Verification
and tasks that are performed when some
work product is to be created. B. Software Validation
A. Software Process C. Software design and implementation
B. Process Models D. Software evolution

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 459

687. The process of establishing what services 693. A data store in a DFD represents:
are required and the constraints on the A. a sequential file
system’s operation and development.

PRACTICE BOOK» NOT FOR SALE


B. a disk store
A. Software Engineering
C. a repository of data
B. Software Process
D. a random access memory
C. Software Specification
D. Software Process Model 694. Data flow testing is related to
688. Which defines the role of software? A. Data flow diagrams
A. Design B. E-R diagrams
B. Debugging C. Data dictionaries
C. Testing D. none of the above
D. None of the above 695. Spike solutions are used in XP when
689. is a piece of programming code that A. complexity is low and can easily be de-
performs a well-defined task. signed
A. . Computer Program B. complexity is high and cannot be de-
B. . Computer Software signed easily
C. . Both A & B C. developer team has no time to design
D. . None of the above D. All of the above

690. My video camera is very 696. Attributes of good software is


A. easy to use A. Development
B. uncomplicated B. Maintainability & functionality
C. obvious C. Functionality
D. none of above D. Maintainability
691. In Activity diagram, to divide the sequen- 697. Software design is an iterative process
tial flow into parallel concurrent flows, through which requirements are translated
which node is used? into a for constructing the software
A. decision node
A. blueprint
B. merge node
B. Architecture plan
C. fork node
C. both a and b
D. join node
D. none of above
692. Which model is also known as Verifica-
tion and validation model? 698. Who proposed the spiral model?
A. Waterfall model A. Barry Boehm
B. Big Bang model B. Pressman
C. V-model C. Royce
D. Spiral model D. IBM

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.13 Software Engineering 460

699. Which one is not a type of require- 704. Which of the following is the BEST ap-
ments? proach for estimation?
A. Known requirements A. Expert opinion
B. Unknown requirements B. Analogy

C. Undreamt requirements C. Disaggregation


D. A combination of all of the above
D. Complex requirements

NARAYAN CHANGDER
705. Class diagrams and collaboration dia-
700. The testing in which code is checked grams are the examples of, .
A. Black box testing A. Class models
B. White box testing B. Scenario-based models
C. Red box testing C. Behavioral models
D. Green box testing D. All of the mentioned above

701. The formal methods model of software 706. Most Effective way to convey informa-
development makes use of mathematical tion to and within a development team is
methods to A. Online meets
A. Define the specification for computer- B. Shared documents
based systems C. Sending a mail
B. Develop defect free computer-based D. Face to face
systems
707. Inspections and testing are what kinds of
C. Verify the correctness of computer- Quality Costs?
based systems
A. Prevention
D. All of the above
B. Internal Failure
702. Involving the team in Planning and Es- C. External Failure
timating and providing early feedback on
D. Appraisal
Delivery Velocity is BEST used to mitigate
what kind of risk? 708. A Swimlane Diagram is a,
A. Schedule flaws A. Useful variation of the activity diagram
B. Requirements creep
B. Represents the flow of activities de-
C. Employee turnover
scribed by the use case
D. Poor productivity C. Indicate which actor responsibility for
the action described by an activity rectan-
703. An analysis package is
gle
A. Analysis modeling categorization D. All of the mentioned above
B. Group of analysis package
709. Multiplicity for an association
C. Both A and B
A. association is the number of instances
D. None of the mentioned above with a single instance

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 461

B. association is the number of instances C. analytical


with a number instance
D. feedback
C. All of the mentioned

PRACTICE BOOK» NOT FOR SALE


D. None of the mentioned 711. Cyclomatic complexity is equal to
710. Decide and develop the most appropriate A. Number of paths
economic models and engineering methods
B. Number of independent paths
for projects
A. communication C. Number of edges
B. planning D. None of the above

1.14 Computer networking


1. LAN stands for? 5. “A software that finds websites, web-
A. Local Area Network pages, images, videos, news, maps, and
other information related to a specific topic
B. Local Area Name or keywords .”
C. Little Area Network A. Search Engine
D. Local Art Network
B. Subject Directory
2. A computer network is C. Search Directory
A. Sharing of resources D. Search Subject
B. Communication from one computer to
another computer. 6. What is the benefit of the client-server
model?
C. Exchange of data and information
among users via network A. It is faster than direct connection of
clients
D. All
B. Redundant resources
3. A network of computers located in a sin-
C. There are many servers to choose
gle location, like a home, school, or office
from
building
D. Ease of management
A. local area network
B. wide area network 7. Which of the following peripherals is
C. metro area network MOST likely to be shared via a network?

D. wireless network A. Projector


B. Printer
4. A network at a single site such as an indi-
vidual office building is a C. Keyboard
A. LAN D. none of above
B. WAN 8. Each of the following features are typical
C. PAN of 2G mobile phones systems except:
D. MAN A. Caller ID

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 462

B. Internet Access 14. Which of the following devices provides ac-


cess to the internet?
C. Multimedia Messaging
A. Adapter
D. Video Streaming
B. Modem
9. Choose the input for a computer devices C. Router
A. Barcode scanner D. Switch
B. Printer

NARAYAN CHANGDER
15. Which protocol would you use to create a
C. projector copy of the email from your email server?
D. photo copier A. FTP
B. IMAP
10. Computer devices attached to a network
are called C. POP3
A. Nodes D. HTTP

B. Hub 16. Which of the following topologies would


be used if every single computer was to
C. Server
have its own dedicated connection from
D. Data the central hub?

11. What is this:A means of connecting sepa- A. Star Topology


rate LANs through the internet while keep- B. Bus Topology
ing people who are not meant to see out C. Ring Topology
and maintaining the privacy of the user
D. none of above
A. NAT
17. What do you need to connect networks to-
B. Application
gether?
C. VPN
A. keyboard
D. Browser B. client
12. What does the term Email means? C. printer
A. Extraordinary Mail D. router

B. Encrypted Mail 18. Which of the following is the largest com-


puter network?
C. Electronic Mail
A. Large Area Network (LAN)
D. none of above
B. Local Area Network (LAN)
13. Why we need computer network? C. Metropolitan Area Network (MAN)
A. Help human to share resources faster D. Wide Area Network (WAN)

19. The most widely used network protocol


B. Send file to other faster
that allows data transmission speeds up
C. Chat and video conference to 10Mbps
D. I think there’s no wrong answers A. ethernet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 463

B. usernet 25. Hardware such as computers, servers,


printers, fax machines, switches, and
C. skynet
routers.

PRACTICE BOOK» NOT FOR SALE


D. internet
A. Device
20. A group of connecting things is a B. Physical Media
A. Computer network C. Network Adapter
B. Network D. Computer network
C. Topology
26. What allows a network to connect to the
D. none of above internet?

21. data is transmitted along thin glass fibre A. Network Interface Card
tubes B. Router
A. Tubes C. Switch
B. Fibre D. Airpods
C. ADSL
27. Peripherals are basically
D. Telkom
A. devices connected to a computer sys-
tem to add functionality.
22. Which device is used to transmit data from
one LAN to another LAN B. systems without compute systems
that function alone.
A. Router
C. are used to transform computer sys-
B. Bridge
tems.
C. Modem
D. will work only without computer sys-
D. Repeater tems.

23. Which protocol governs the way we trans- 28. What is Networking?
fer and load hypertext?
A. Networking is consists of two or more
A. FTP computers.
B. SMTP B. Networking is a business that you need
C. POP3 if you want to be rich.

D. HTTP C. Networking is all about business.


D. none of above
24. A is a device that forwards packets be-
tween networks by processing the routing 29. Data in Computer Networks is sent in the
information included in the packet. form of
A. bridge A. Boxes
B. firewall B. Baskets
C. router C. Groups
D. hub D. Packets

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 464

30. In this network, each node is daisy- 35. Jimmy is required to set up a computer net-
chained together where the end of the net- work in school laboratory. Which of the
work comes back around to the first node. following network types is he setting up?
A. bus network A. Large Area Network (LAN)
B. ring network B. Local Area Network (LAN)

C. star network C. Metropolitan Area Network (MAN)


D. Wide Area Network (WAN)
D. wireless network

NARAYAN CHANGDER
36. A computer that is connected to a network
31. Which of these is a problem that could oc- is called a
cur within a network?
A. Stand alone
A. Sharing software and data
B. Mainframe computer
B. A virus spreading from computer to
C. Workstation or node
computer
D. Personal computer
C. Sharing hardware
D. none of above 37. Which is the largest network size that can
cover areas such as a state, country, and
32. It is any software designed to damage or the world?
to disrupt a system. A. PAN
A. Malicious software (malware) B. LAN
B. Adware C. MAN
C. Spyware D. WAN

D. Phishing 38. Which of them is not an ideal way of


spreading the virus?
33. It is very difficult to add new devices to A. A Official Antivirus CDs
my network without affecting the running
of the network. Which topology am I us- B. B USBs
ing? C. C Emails
A. Ring D. D Infected website
B. Star 39. Connected to a central switch or server
C. Bus A. Mesh
D. none of above B. Star
C. Bus
34. What is a disadvantage of a network
D. Ring
A. You can share peripherals
40. Allows two or more people to hold online
B. Someone can control your computer
conferences at different locations using a
C. Is something goes wrong it is hard to computer network to transmit audio and
fix video as if they were all in the same room
D. none of above A. Video Conferencing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 465

B. Video Calls C. SPI


C. Video Locations D. SIP

PRACTICE BOOK» NOT FOR SALE


D. Video Line
46. Which of these is NOT a type of server?
41. many businesses use this Wi-Fi technology
to allow the public an access point to a A. Mail
wireless network B. Print
A. hotspots C. Web
B. coldspot D. Board
C. satellites
D. bluetooth 47. The school has several networked com-
puter rooms. What kind of network is
42. A type of network device that amplifies re- this?
ceived signal so it can be transmitted over
A. LAN
greater distance without loss in quality is
called: B. WAN
A. Patch Panel C. Mesh
B. Multiplexer D. GAN
C. Repeater
D. Passive Hub 48. Which if these terms refers to the max-
imum rate at which data can be trans-
43. when you play a game against someone in ferred? (1-4)
London you use A. Error detection
A. WAN
B. Packet switching
B. LAN
C. Bandwidth
C. Internet
D. Transmission media
D. none of above

44. Which of the following is a program capa- 49. In which OSI layer does routing occur?
ble of continually replicating with little or A. Network
no user intervention?
B. Data Link
A. Virus
B. Trojan horses C. Physical

C. Rootkit D. Transport
D. Worms 50. What does NIC stand for?
45. Company that has a permanent, fast con- A. Network interface Connector
nection to the internet and that sells inter-
net access and services for a monthly fee B. Network interface cord

A. IPS C. Network interface card


B. ISP D. New interface card

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 466

51. TCP / IP stands for 56. ADSL is the abbreviation of


A. Transfer Central Protocol / Internet A. Asymmetric Dual System Line
Protocol B. Asymmetric Digital System Line
B. Transmission Control Program/ Inter- C. Asymmetric Dual Subscriber Line
net Program
D. Asymmetric Digital Subscriber Line
C. Transmitted Central Protocol / Inter-
net Protocol 57. Internet is a space

NARAYAN CHANGDER
A. Public
D. Transmission Control Protocol / Inter-
net Protocol B. Private
C. Local
52. Which one is not a web browser
D. none of the above
A. Internet Explorer
58. Anything that is connected to a network is
B. Microsoft Onenote
considered to be a ?
C. Google A. node
D. Google chrome B. router
53. Provides only one type of resource to its C. computer
clients, such as printing D. switch
A. dedicated server 59. Limewire, Kazaa and Bearshare are all ex-
B. database amples of
C. non-dedicated server A. Brand names of networking hardware
products
D. cloud server
B. Web sites that store MP3 music files
54. What is not function of protocol? and Malware
A. Set the rules of data packet convertion C. Wireless network communication pro-
tocols
D. Software applications for peer-to-peer
B. Rules for routers
connection (P2P) file sharing
C. Set the rules attachment of the source
and destination of each packet 60. Other term for Switch?
D. Manage IP address assignment A. Bridge
B. Hub
55. “The world’s largest computer network
C. Router
which connects millions of computer all
over the world.” This is the definition for D. Cable
61. Which one is a type of Topology?
A. Communication A. Seashell
B. Network B. Tower
C. Internet C. Tree
D. World Wide Web D. Node

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 467

62. The highest in specifications/capacities/Speed B. If the central hub crashes the whole
in a network. It stands at the heart of network breaks
most networks?

PRACTICE BOOK» NOT FOR SALE


C. Only four computers can be attached
A. Server to the ring
B. Workstation D. Everyone has to sit facing each other
C. Client 68. This device performs a lot of processing to
D. Router filter and readdress network packets:
A. Router
63. Which of the following is not needed to ac-
cess the internet? B. Hub
A. A modem C. Switch

B. A microphone D. Modem

C. Data 69. small device that connects computers to-


gether
D. A web browser
A. wifi
64. What forwards data packets to the right
B. server
computer?
C. queue
A. Router
D. hub
B. Internet
C. Ethernet Cable 70. What is the abbreviated name of a net-
work card?
D. Clock
A. NIC
65. Peripherals are B. NC
A. anything that can be connected to a C. NetCar
computer
D. none of above
B. other devices in the network
71. Is where 2 or more computers/ laptops
C. the edges of your vision
are connected to a router via an Ethernet
D. none of above cable or wirelessly via Wi-fi.

66. What does the Router not look for when A. Local Area Network (LAN)
choosing a route? B. Personal Area Network (PAN)
A. The fastest route C. Wireless Local Area Network (WLAN)
B. The route with the least traffic D. Campus Area Network (CAN)
C. The cheapest route 72. every computer looking to access the In-
D. none of above ternet would be known as this
A. client
67. Which of these is a disadvantage of the
ring topology? B. desktop

A. If one cable is disabled the whole net- C. hub


work can crash D. server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 468

73. The network size which connects two or D. Expensive machine for technicians to
more personal devices is called a use
A. PAN
79. A series of number used to identify a net-
B. LAN work device.
C. MAN A. IP Address
D. WAN
B. IM Address
74. A (n) is a collection of computers and

NARAYAN CHANGDER
C. MAC Address
devices connected together via communica-
tions devices and transmission media. D. OP Address
A. network 80. The largest network! It connects millions
B. Internet of computers together.
C. web page A. Internet
D. IP address B. Domain
75. What provides a port for a computer to C. Hyperlink
connect to a LAN?
D. Search Engine
A. Modem
B. RJ-11 81. What are the some factors that determine
whether a communication system is LAN
C. NIC
or WAN?
D. CAT 5
A. Size, geographical area and ownership
76. You need to connect more than two
computers in a network.
B. Platform, size and device
A. Network Interface Card
C. Device, geographical area and size
B. Network Cable
D. Platform, users and size
C. Network Hub
D. none of above 82. is a web browser
77. retreieve emails from server A. Internet
A. HTTP B. DIS
B. FTP C. Google
C. SMTP D. Google chrome
D. IMAP/POP
83. Which field is computer networks origi-
78. What is the purpose of a server on a net- nated from?
work?
A. Government
A. Connects all PCs together
B. Military
B. Central hub for a network
C. Media
C. Powerful computer than provides ser-
vices D. Police

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 469

84. Worldwide computer network, consisting B. Switch


of computers, devices and networks linked C. Bridge
using some form of communication media.

PRACTICE BOOK» NOT FOR SALE


D. Repeater
A. Webpage
B. Internet 90. Covers a small geographical area on a sin-
gle site
C. Website
A. LAN
D. Intranet
B. PAN
85. Hospitals, banks and supermarkets are all
C. WAN
linked using which network type?
D. SAN
A. WAN
B. LAN 91. Of your internal network connection op-
tions, which one can provide the fastest
C. BUS
speeds?
D. WiFi
A. UTP
86. What is an advantage of a peer to peer B. Fiber
network?
C. Infrared
A. Security can be managed centrally
D. 802.11n
B. Cheap and easy to set up
C. Will stop working if one of the peers 92. List the Network coverage sizes in order
goes down from smallest to largest.

D. You need high end computers to keep A. WAN, MAN, LAN, PAN
everything working B. LAN, PAN, WAN, MAN
87. is an international network of comput- C. PAN, MAN, LAN, WAN
ers. D. PAN, LAN, MAN, WAN
A. Network
93. Which device is not intelligent as it sends
B. WWW data to all computers on a network which
C. Internet causes a reduction in network speed?
D. Local Area Network A. Switch
B. Router
88. What does VPN stand for?
C. Hub
A. Virtual Private Network
D. Network Interface Card (NIC)
B. Virtual Public Network
C. Visual Private Network 94. Which one is the network type which al-
ways open for all?
D. Virtual Pirate Network
A. Network
89. Which network hardware is said to be in-
telligent as it can send data to the intended B. Indonet
computer and not every computer C. Internet
A. Hub D. Intranet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 470

95. Is the way a network is arranged, includ- C. Fibre Optic


ing the physical or logical description of
D. none of above
how links and nodes are set up to relate
to each other.
101. PAK EDUCATION School has computers
A. Network Topology being used in a number of school build-
B. Product Topology ings within the site.Which network is be-
ing used?
C. Computer Network

NARAYAN CHANGDER
D. Computer Topology A. LAN
B. WAN
96. What is an advantage of a LAN?
A. You can save money by sharing periph- C. PAN
erals like printers. D. none of above
B. It is limited to a small area.
C. Can cover near infinite geographical 102. What is meant by a data packet? (6-9)
distance. A. A unit of data that travels along a net-
D. Expensive to setup. work

97. Smartphones and smart watches communi- B. The number of error found in data
cate using when it has been transmitted

A. bluetooth technology C. The data a computer needs to connect


to a network
B. speed technology
C. hardware technology D. A connection point in a network that al-
lows data to be shared
D. none of above

98. A is a connected system of objects or 103. Two or more computers connected to-
people. gether over a wide geographical area (e.g.
county, country, globe). What type of net-
A. Node work is this?
B. Data Transmission
A. LAN
C. Network
B. School Network
D. Operating System
C. WAN
99. Firewalls
D. The Internet
A. are software on the computer
B. protect the network 104. Transfer files to and from another com-
C. help you lock your modem/router puter.

D. none of above A. HTTP

100. In cabling, which is the most expensive? B. FTP

A. Coaxial C. MIME type


B. Twisted Pair D. SMTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 471

105. Type of networks covers a large geo- 110. A type of tool used for verifying correct
graphical area and usually consists of sev- electrical connections of wires in a cable is
eral smaller networks, which might use known as:

PRACTICE BOOK» NOT FOR SALE


different computer platforms and network
A. Loopback plug
technologies:
B. Tone generator
A. SAN (small area network)
B. MAN (middle area network) C. Cable tester

C. GAN (great area network) D. Multimeter

D. WAN (wide area network) 111. What is ICANN stand for?


106. What term describes the physical layout A. Internet Corporation for Assigned Net-
of a network? work and Numbers
A. Topology B. Internet Corporation for Association
Names and Numbers
B. topping
C. topiology C. International Corporation for As-
signed Names and Numbers
D. toppology
D. Internet Corporation for Assigned
107. Which one of the following is a search en- Names and Numbers
gine?
112. Computers that work behind the scenes
A. Macromedia Flash
to provide the resources requested by the
B. Google clients
C. Netscape A. server
D. Librarians’ Index to the Internet B. client
108. Networking includes all comput- C. shared
ers, peripherals, interface cards and D. switch
other equipment needed to perform data-
processing and communications within the 113. Which pair below are most alike
network?
A. Router and Modem
A. Bridge
B. Switch & Modem
B. Hub
C. Router and Hub
C. Software
D. Hub & Switch
D. Hardware

109. Which data transmission service is run 114. Group of devices connected with one an
through your TV cable connection? other

A. Fiber Optics A. Network


B. DSL B. Computer
C. Cable C. printer
D. none of above D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 472

115. Refers to the actual connections (wires, 120. The biggest WAN
cables, etc.) of how the network is ar- A. Internet
ranged. Setup, maintenance, and provi-
B. Intranet
sioning tasks require insight into the phys-
ical network. C. Extranet
A. Physical Network Topology D. none of above
B. Hardware Connections 121. Data communication system within a
building or campus is

NARAYAN CHANGDER
C. Logical Network Topology
D. Planned Connections A. MAN
B. LAN
116. The server
C. PAN
A. Receives something from the server
D. WAN
B. Provides something for the client
122. Radiowaves transmit data
C. Prints things
A. Through a Wired connection
D. Gives you internet
B. Wirelessly
117. A protocol used to transfer data from one C. Locally
computer to another through a network, D. Louder
such as the Internet
A. FTP 123. Physical pieces used to transport data
from one computer to another computer or
B. HTP peripheral on the network
C. DTTP A. media
D. HTTPS B. backbone
118. The computers in Prime Medical Hospital C. gateway
building are linked so that the staff can D. switch
share the files and printers.This kind of
network is an example of 124. The most common network topology, is
laid out so every node in the network is
A. PAN directly connected to one central hub via
B. LAN coaxial, twisted-pair, or fiber-optic cable.
C. WAN A. Star Topology
D. none of above B. Tree Topology
C. Mesh Topology
119. A computer has the ability to:
D. Ring Topology
A. It has the ability to store, retrieve, and
process data. 125. A device that connect LANs using the
same protocol is called?
B. It has the ability to store, retrieve, and
pastas data. A. Switch
C. It has the ability to stage, retrieve, and B. Bridge
process data. C. Router
D. none of above D. Gateway

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 473

126. When there’s speed limit on computer C. Wide are network (WAN)
networking? D. Metropolitan area network (MAN)

PRACTICE BOOK» NOT FOR SALE


A. Increasing traffic
132. the protocol for hyper text transfer
B. Earthquake
A. https
C. Tsunami
B. http
D. Decreasing traffic
C. html
127. allows computers, smartphones, or other D. pdf
devices to connect to the Internet or
communicate with one another wirelessly 133. Hardware is
within a particular area A. any part of your computer
A. wifi B. any part of your computer that has a
B. html hard structure
C. LAN C. any part of your computer that has a
software structure
D. ftp
D. any part of your computer that has a
128. Type of devices that have stable and re- physical structure
liable internet connection but are not very
portable 134. How do clients communicate with the
server?
A. Smartphones
A. It uses the shared resources on the
B. Tablets server
C. Desktop computer B. The Network
D. Laptops C. It speaks to the client
129. Confined to a relatively small space, such D. It uses the patches that come with the
as a building or an office is refers to server and client
A. LAN 135. Which is the order of a basic home LAN
B. MAN network?
C. WAN A. Devices, Modem, Router, ISP/INTERNET
D. WLAN
B. Modem, Devices, ISP/INTERNET,
130. Which one is a collection of point-point Router
links that may form a circle
C. Router, Devices, Modem, ISP/INTERNET
A. Star
B. Ring D. Devices, Router, Modem, ISP/INTERNET
C. Bus
136. FTP stands for
D. Hybrid A. Free Tower Protocol
131. Which is the largest type of network? B. Final Transfer Protocol
A. Home network C. Fast Transfer Protocol
B. Local area network (LAN) D. File Transfer Protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 474

137. The internet is A. Web designer


A. A network of computer networks that B. Stock controller
spans the globe. C. Hacker
B. WiFi D. Computer technician
C. Google
143. What is a network?
D. A local area network
A. a blue net you take to work

NARAYAN CHANGDER
138. computer network that connects com- B. a job where you make fishing nets
puters within a limited area such as a
home, school, computer laboratory, or of- C. 1 computer not connected to anything
fice building, using network media D. 2 or more computers connected to-
A. LAN gether

B. MAN 144. What is the biggest number you can use


for an IP address?
C. WAN
A. 355
D. NET
B. 245
139. In computer networks, MAN stands for
C. 279
Area Network.
D. 255
A. Master
B. Maximum 145. Your friend Barbara needs to set up an In-
ternet connection. In this scenario, which
C. Metropolitan
of the following options will give her the
D. Mini best speed?
140. DNS maps human, readable domain A. Cable Internet
names into actual B. Wireless
A. IP addresses. C. Satelllite
B. domain names. D. Cellular
C. servers.
146. What piece of hardware is usually at the
D. caches. centre of a star network?
141. What command would you use on a Mac A. Router
to determine your TCP/IP configuration in- B. Gateway
formation? C. Repeater
A. ifconfig D. Hub
B. ipconfig
147. numbered label that is given to any de-
C. ipinfo vice in a computer network. It allows for
D. tcpipconfig network identification and local address-
ing.
142. Who might want to penetrate a com-
puter network? Remember this is morally A. ftp
wrong and illegal! B. encryption

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 475

C. internet protocol 153. Which is not included to connect to a net-


D. url work?

PRACTICE BOOK» NOT FOR SALE


A. Mouse
148. The time it takes for a bit to get from
sender to receiver. B. Hub
A. Network C. Cable
B. Latency D. Network Interface Card
C. Bandwidth
154. Bluetooth technology supports network-
D. Bitrate
ing over
149. A hybrid topology is A. Wi-Fi standard wireless radio connec-
A. a made up topology tions
B. when two or more topologies are used. B. Its own standard wireless radio con-
nections
C. when a network doesn’t have a struc- C. USB cable connections
ture
D. Ethernet cable connections
D. none of above

150. The main advantages of a star network 155. Which of the following connections has
are: the fastest speed to send and receive large
amounts of data?
A. Cheap to set up
A. dial-up
B. Easy to implement
C. Proceses data very fast B. satellite

D. A, B C. wireless
D. leased line
151. The network protocol that breaks mes-
sages into packets, reassembles the pack-
156. IP protocol is used in which layer
ets at the destination, and takes care of
errors. A. Physical layer
A. Telnet B. Network layer
B. TCP C. Transport layer
C. DSL
D. Application layer
D. UDP
157. Arrange the Following Types of Net-
152. An organisation has several offices with
works according to their size, from largest
a linked network in the local town. What
to smallest?
kind of network would this be?
A. LAN, MAN, WAN
A. LAN
B. WAN B. MAN, LAN, WAN
C. Mesh C. WAN, LAN, MAN
D. GAN D. WAN, MAN, LAN

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 476

158. Connects at least two networks, com- A. ring


monly two LANs or WANs or a LAN and B. star
its ISP’s network
C. both
A. router
D. none of above
B. switch
164. It is a group of computers that are con-
C. gateway nected to each other for the purpose of
D. backbone communication?

NARAYAN CHANGDER
159. directing them between devices A. File Network
B. Computer Network
A. transport layer
C. Folder Network
B. internet layer
D. Cable Network
C. link layer
D. application layer 165. Which cable sends data as light?
A. Copper
160. What is a hardware device that con-
B. Fibre Optic
verts data so that is can be transmitted
from computer to computer over telephone C. Ethernet
lines? D. none of above
A. topology 166. Which one of the following types of net-
B. protocol work connections can give you the highest
C. router data transfer rates?
A. wired
D. modem
B. cellular
161. Select one of server application in an of-
C. broadband
fice
D. wireless
A. Game Server
B. Image Server 167. Which of the following uses light for
transmitting data?
C. Print Server
A. STP Twisted Pair
D. Application Server
B. UTP Twisted Pair
162. is a needed requirement to make an inter- C. Copper Cable
net connection? D. Optical Fiber
A. Pencil
168. ‘Witches use switches’ helps us to re-
B. Table member that
C. Modem A. Switches forward data ‘intelligently’
D. Camera B. Switches work by magic and spells
163. Which type of topology is best suited for C. Switches are efficient, but not as much
large businesses which must carefully con- as hubs
trol and coordinate the operation of dis- D. Swiches use CAT5 Ethernet and
tributed branch outlets? witches usually have a cat

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 477

169. An advantage of a network is B. JAN


A. You can get hacked C. LAN

PRACTICE BOOK» NOT FOR SALE


B. You can share peripherals D. GAN
C. You need to remember your password
175. Which of the following cables are limited
to 100 meters distance?
D. none of above
A. Optical Fiber
170. A computer network is a system of: B. Copper
A. two or more computing devices con- C. Twisted pair
nected to one another
D. Co-axial
B. Data transfer and information storage
176. What is the form of an IP address?
C. Sharing devices like scanners A. ###.###.###.###
D. A whole lot of individual machines B. ##.###.####.####
working on their own
C. .com
171. Which model has 4 layers? D. .net
A. UCP/UP
177. what is indicated when the domain name
B. TCP/IP
has only two letters like .us, .uk, .au, .mx,
C. CS/IP or .ca
D. UDP/IP A. invalid domain
172. Mention a computer intended for individ- B. private domain
ual use in a networking environment.. C. secure domain
A. Workstation D. country domain
B. User
178. Secure version of HTTP, encrypts all data
C. Client
sent & received
D. Server
A. HTTP
173. Can cover country, continent or even a B. TCP/IP
whole world. Internet connection is an ex-
ample of this network. C. FTP

A. Wide Area Network (WAN) D. HTTPS


B. Metropolitan Area Network (MAN) 179. This is an internal network that uses In-
C. Storage-Area Network (SAN) ternet technologies to make information
accessible to employees.
D. System-Area Network (also known as
SAN) A. Protocol
B. Bluetooth
174. What network covers a SMALL geograph-
ical area? C. Ethernet
A. WAN D. Intranet

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 478

180. The following are examples of popular 185. This refers to the main cabling of a net-
Web browsers, EXCEPT work that all of the segments connect to
A. Microsoft Internet Explorer which can carry 10 times more megabits
than a segment
B. Mozilla Firefox
A. backbone
C. Google Chrome
B. line
D. Yahoo!
C. router

NARAYAN CHANGDER
181. Which of the following tools would be D. gateway
used for attaching RJ-45 connectors to a
twisted-pair Ethernet cable? 186. Mention which one from this type is
A. Cable Tester working specifically to users of an orga-
nization !
B. Needle-Nose Plier
A. Network
C. Punchdown Tool
B. Indonet
D. Crimper
C. Internet
182. is a network that covers geographic D. Intranet
that are larger, such as Cities
A. LAN 187. What is the advantage of STP cable over
UTP cable?
B. WAN
A. STP is smaller and more flexible than
C. PAN UTP
D. MAN B. STP cable is less susceptible to EMI
and other interference than UTP
183. allows information to be delivered to
other computers or electronic devices that C. STP cable is less expensive to deploy
are connected than UTP
A. network D. STP cable has a lower attenuation than
UTP
B. web browser
C. hub 188. What is the meaning of CSS?
D. country A. Computer Solves Something
B. Computer Systems Servicing
184. Which of the following is a software that,
once installed on your computer, tracks C. Computer Shop Service
your internet browsing habits and sends D. Computer Service Special
you popups containing advertisements re-
lated to the sites and topics you’ve vis- 189. The maximum length limit for unshielded
ited? twisted-pair cable is meters?
A. Backdoors A. 50
B. Adware B. 80
C. Malware C. 100
D. Bots D. 120

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 479

190. use a single backbone cable C. Search Engine


A. Mesh D. Email

PRACTICE BOOK» NOT FOR SALE


B. Star 196. what is tcp/ip
C. Bus A. protocol
D. Ring B. internet
191. Which is the correct answer to the be- C. harbir
low:”A number of devices that communi- D. layer
cate with each other without the need of
the internet” 197. A device not connected to a computer net-
A. LAN work is known as
B. WAN A. LAN
C. TCP/IP B. Bridge
D. DSL C. Standalone
D. WLAN
192. You are configuring a computer to partici-
pate on a network. Which of the following 198. These are examples of wireless network
are mandatory? technologies
A. IP address A. Wi-Fi, Bluetooth & Microwave
B. Default gateway B. Satellite, Wi-Fi & Infrared
C. DHCP server C. Hotspot, Wi-Fi & Bluetooth
D. DNS D. none of above
193. Which of these is made of tiny glass 199. The type of computer networks used to
strands and is the fastest at transmitting connected computers within one building
data? or not very far away from each other ge-
A. Fiber-optic lines ographically
B. DSL lines A. Personal Area Network
C. Cable lines B. Metropolitan Area Network
D. none of above C. Wireless Local Area Network

194. Bluetooth is an example of D. Wide Area Network

A. personal area network 200. What is cloud computing? (1-4)


B. local area network A. Storing large amounts of data on a sin-
C. wide area network gle computer

D. Metropolitan Area Network B. Using the internet to store and access


data and programs remotely
195. Which of the following would you use to C. Storing hard copies of data as a
find information on the internet? backup
A. Help menu D. Using the internet to communicate
B. Microsoft Word with other users

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 480

201. What is the network device that ampli- 206. What do networks allow you to share?
fies and restores signals for long distance
A. information
transmission.
B. dinner
A. Bridge
C. cars
B. Switch
D. desks
C. Router
D. Repeater 207. the acronym for hyper text transfer pro-

NARAYAN CHANGDER
tocol secure
202. the protocol for file transfer
A. https
A. http
B. http
B. https
C. html
C. ftp
D. pdf
D. pdf
208. What is Bandwidth
203. Which is the slowest way for transmit-
A. Indie band made up of larger members
ting data to the internet?
A. Fiber Optic lines
B. The number of connections a location
B. Cable Lines has
C. DSL Phone lines C. The amount of data that can be trans-
mitted over WiFi
D. none of above
D. The amount of data that can be trans-
204. Parallel Data Transmission is where mitted along a communication channel
A. 1 bit is transmitted at a time
209. A device that is connected and controlled
B. 8 bits are transmitted at the same time by many computers on a network
A. shared peripheral
C. data can only be transmitted in one di-
B. laptop
rection at a time
C. router
D. 8 elephants are ridden at the same
time D. switch

205. in a multiplayer game center, we can 210. What does a DNS do?
found 2 or more devices which help to con-
A. translate a domain name into the cor-
nect multiple devices and makes it work as
rect IP address
a single netwok. What are they?
B. translate an IP address into a domain
A. WIFI
name
B. Hub
C. Gives names to websites which aren’t
C. NIC named
D. Satellite D. Leaves websites alone

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 481

211. UTP is a cable type normally associated 216. a protocol used by the World Wide Web
with? that defines how messages are formatted
and transmitted, and what actions web

PRACTICE BOOK» NOT FOR SALE


A. Ethernet
servers and browsers should take in re-
B. Fiber-optics sponse to various commands
C. Last-mile A. HTTP
D. Coaxial bus B. FTP

212. The use of networks that allows you to C. HTML


share files without having to use flash D. TTP
drives or any other storage devices.
217. Wireless routers use which medium for
A. File Sharing
data transmission?
B. Network Files
A. Fiber optics.
C. Sharing of Printers and Peripherals
B. Radio waves.
D. Sharing of Internet Connection
C. Copper cables.
213. A protocol used for the transfer of files D. Power cables.
between remote computers with an inter-
net connection 218. A network spread over a wide geograph-
ical area, such as a city, country or even
A. FPT
continents
B. PTF
A. LAN
C. TPF
B. PAN
D. FTP
C. GAN
214. supplies networking capability to a group D. WAN
of computers in close proximity to each
other such as in an office building, a school, 219. DNS is the abbreviation of
or a home
A. Domain Name System
A. LAN (Local Area Network)
B. Dynamic Name System
B. MAN (Metropolitan Area Network)
C. Domain Network Service
C. WAN (Wide Area Network)
D. Dynamic Network System
D. PAN (Personal Area Network)
220. An application that enables users with
215. Which of these has the ability to create, an Internet connection to access and view
maintain and destroy connections between webpages on a computer or mobile de-
nodes on a network? vice.
A. Presentation A. Browser
B. Transport B. Surfer
C. Emojis C. Search Engine
D. Session D. Subject Directory

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 482

221. Which of the following statements about 226. A computer networking device that con-
a network is FALSE? nects network segments
A. Viruses can spread to other computers A. switch
throughout a computer network
B. backbone
B. Resources such as printers can be
shared C. modem
C. Files cannot be shared between users D. router

NARAYAN CHANGDER
D. You can communicate with other users 227. DHCP is the abbreviation of
using e-mail and messaging
A. Dynamic Host Control Protocol
222. Which statement is correct? B. Dynamic Hyper Control Protocol
A. The more bandwidth you have, the
C. Dynamic Host Configuration Protocol
worse the connection will be
B. A switch is more efficient than a hub D. Dynamic Hyper Configuration Protocol
C. A hub is more expensive than a switch
228. Which protocol is used to exchange infor-
mation on the Internet?
D. Changing your password will not help
secure your account A. IPX/SPX

223. A type of network where no one outside B. TCP/IP


an organisation is allowed access is called C. NetBEUI
a(n):
D. AppleTalk
A. telnet
B. extranet 229. Which of these statements is TRUE about
C. intranet a LAN?
D. internet A. A LAN connects computers in a small
area such as an office
224. Which of the following is used for modu-
lation and demodulation? B. A modem is needed to connect a com-
A. Modem puter to a LAN

B. Protocols C. A LAN consists of only one computer


C. Gateway D. none of above
D. Multiplexer
230. What piece of equipment assigns IP ad-
225. Which of the three main topologies rely dresses to internet connected devices in
on a single main cable to transmit data your home?
packets?
A. ISP
A. Ring
B. Internet
B. Star
C. Bus C. Router
D. none of above D. Modem

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 483

231. Which is a network which is linked by a B. IPv6


shared cable? C. Both the same

PRACTICE BOOK» NOT FOR SALE


A. Bus
D. none of above
B. Ring
237. HTTP stands for..
C. Star
A. .. Hyper Technology Transmission
D. none of above
Piece
232. FTP is used for.. B. Hypertext Transfer Protocol
A. .. reading files from the server C. Hypertext Talking Package
B. .. training people to manage server D. Hypertext Transfer Program
space
C. .. moving files from one computer to 238. If you have a school LAN that you want
another across the internet to share Internet wireless connection, you
will need to purchase a ?
D. .. following files from the server to
your email A. Bridge
B. Hub
233. Which one of these connection types has
the longest delay? C. Router
A. Wireless D. UTP Cable
B. Infrared 239. . The protocol that maps IP addresses to
C. Wired a Media Access Control (MAC) address is:
D. Cellular A. Internet Message Access Protocol
(IMAP).
234. What is an example of a Layer 3 device
that connects multiple computers and net- B. Dynamic Host Configuration Protocol
works? (DHCP).
A. Packet C. Address Resolution Protocol (ARP).
B. Repeater D. User Datagram Protocol (UDP).
C. Switch 240. The data transmission speed of a router
D. Router or switch is known as

235. A private network within an organization A. Bandwidth.


that may consist of many linked LANS. B. Latency.
A. Internet C. Capacity.
B. Intranet D. Rate.
C. Ethernet
241. What is TCP / IP?
D. PAN
A. Transmission Caption Protocol / Inter-
236. Which has the greater number of possible net Protocol
addresses? B. Terminal Connection Protocol / Inter-
A. IPv4 net Protocol

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 484

C. Transmission Control Protocol / Inside C. Wide Area Network


Protocol D. Wi-Fi
D. Transmission Control Protocol / Inter-
net Protocol 247. Which layer does IP operate on
A. Application
242. The most basic device, within a computer
network that connects computers together B. Transport
and has no other function is C. Network

NARAYAN CHANGDER
A. Router D. Link
B. Switch 248. Which of the following is a web
C. Hub browser?
D. Modem A. Internet
B. DIS
243. providing networking services to applica-
tions C. Google
A. transport layer D. Google chrome
B. internet layer 249. SMTP is used for ..
C. link layer A. .. Retrieving emails
D. application layer B. .. Sending emails from one server to
another
244. Network connections are created using
C. .. Maintaing CPU performance
A. wires and cables
D. .. Downloading files
B. files and resources
250. Which of these is not an advantage of
C. computers and printers
networking computers?
D. none of above
A. Printers can be shared
245. The network size that is bigger than a B. Fewer cables are needed
LAN and can cover a city or a village is a
C. Files are easier to share
D. Install can be done on many comput-
A. PAN
ers at once
B. LAN
251. The internet is owned by
C. MAN
A. no one
D. WAN
B. the USA
246. This is a type of computer network that C. NATO
spans a small area, building or group of
buildings. It is usually owned, managed, D. the government
and controlled by a single entity or organi- 252. This device that changes computer net-
zation. work signals so they can travel along
A. Computer Networks phone or cable lines to the internet.
B. Local Area Network A. Router

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 485

B. Modem 258. Which network model is the least se-


cure?
C. Printer

PRACTICE BOOK» NOT FOR SALE


A. Client/server network
D. Ethernet cable
B. Local area nettwork (LAN)
253. What is a URL? C. Peer-to-peer (P2P) network
A. a computer software program D. Mainframe/terminal network
B. a type of UFO
259. Computer networks exist to
C. the address of a document or “page” A. Allow you to play games
on the World Wide Web
B. Provide internet connections
D. an acronym for Unlimited Resources
C. Share resources and data
for Learning
D. Allow Google to function
254. How is a network connected?
260. If your computer screen freezes
A. Wires
A. push the Escape button
B. Wifi
B. use Control, Alt, and Delete to open the
C. Wires or Wifi Task Manager
D. none of above C. Use Control Z to undo the last thing you
did
255. You can connect from your computer to
D. none of above
the internet using
A. software 261. Which of the following is needed to make
an internet connection?
B. a router
A. Pencil
C. a web browser
B. Table
D. none of above
C. Modem
256. Which protocol would you use to transfer D. Camera
hypertext?
262. In almost all cases, this device is respon-
A. FTP sible for sending out WIFI signals in your
B. SMTP home for you to connect to.

C. POP3 A. Router
B. Hub
D. HTTP
C. TCP IP
257. A private computer network within an or- D. MAC
ganisation.
A. Internet 263. The suite of protocols and programs that
supports low-level network communica-
B. Intranet tion.
C. Extranet A. HTTP
D. Outernet B. P2P

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 486

C. gateway C. SSID
D. TCP/IP D. Hub
264. A computer network is computers 269. What is an example of an intermediary
connected together network device?
A. 2
A. PC
B. 2 or more
B. printer

NARAYAN CHANGDER
C. A large number
C. network switch
D. none of above
D. mouse
265. You configured a wireless network for
your neighbor, and he wants to imple- 270. passes data over the physical network
ment security measures beyond the stan-
A. transport layer
dard wireless encryption. What options
does he have? B. internet layer
A. Use NAT. C. link layer
B. DNS D. application layer
C. Enable DHCP.
271. Other term for LAN Card?
D. Use MAC filtering.
A. Interconnect Card
266. Defined as a subset of telecommunication
B. Network Interface Card
involving the transmission of data to and
from computers and components of com- C. Internet Local Card
puter systems
D. Local ArpaNet Card
A. Telecommunication
B. Data communication 272. Which of these is NOT an advantage of a
network?
C. Communication
A. Sharing peripheral devices such as
D. Network
printers and scanners
267. an application used to search and find in- B. Possible to communicate globally
formation on the Internet
C. Can protect against viruses
A. wifi
D. PCs can be backed up and updated by
B. server one central PC
C. web browser
273. How do wired networks connect to other
D. search engine
devices?
268. A small network hardware device that A. Radio frequencies
joins multiple computers together within
the same LAN. B. Microwave signals
A. Router C. Ethernet cables
B. Switch D. Barbed wire

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 487

274. The industry standard for LANs. B. UltraSound


A. ethernet C. Fiber Optics

PRACTICE BOOK» NOT FOR SALE


B. P2P D. Satellite Connection
C. gateway
280. What network covers the smallest geo-
D. TCP/IP graphical area?
275. What is data split into before it is sent? A. Wide Area Network
A. Packets B. Local Area Network
B. Sections C. Personal Area Network
C. Pieces D. Metropolitan Area Netwrok
D. Segments
281. The sharing and use of resources and ap-
276. is a wireless technology standard for plications offered as services over the in-
exchanging data over short distances from ternet
fixed and mobile devices.
A. Cloud Computers
A. Infrared
B. Computer Clouding
B. WIFI
C. Cloud Computing
C. Bluetooth
D. Computer Clouds
D. 4G

277. Consider a number of computers are in 282. The Internet was originally developed by
a network, and one computer crashes. In whom?
which of the following network topologies A. computer hackers
will the entire network also go down?
B. a corporation
A. Ring
C. the U.S. Department of Defense
B. Star
D. the University of Michigan
C. Bus
D. Tree 283. What type of signals are transmitted
across fibre optic cables?
278. Technology that carry information, such
A. Electric
as sound, by systematically modulat-
ing properties of electromagnetic energy B. Light
waves transmitted through space.
C. Sound
A. Transistors
D. Radio
B. Radio Waves
C. Telephone Cables 284. Disadvantages of networks?

D. Wi-Fi A. Share files


B. Viruses
279. Which of the following way is suitable
for communicating between continents? C. Share Internet
A. Infrared D. Roaming

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 488

285. A network that has a large capacity, cov- 290. The term of sending data from your com-
ers a large geographical area, and com- puter to another computer on a network
bines multiple communication channels is or the internet is:
known as what type of network?
A. Create
A. MAN
B. Download
B. SAN
C. Modify
C. WAN
D. Upload

NARAYAN CHANGDER
D. LAN

286. A network that allows data to be trans- 291. Which of the following is an advantage
mitted from one device to another without of computer networks?
cables or wires A. They are portable and easy to carry
A. wireless network around with you
B. cloud network B. Viruses can spread quickly across a
C. local area network network
D. near field network C. Specialist IT staff are needed to main-
tain them which is expensive
287. computer that provides data to other
computers. It may serve data to systems D. Sharing devices such as printers saves
on a local area network (LAN) or a wide money
area network (WAN) over the Internet.
292. The full form of word MAC in MAC ad-
A. satellite dress is
B. hub
A. Mode Access capacity
C. server
B. Media Access Control
D. queue
C. Mode alias control
288. You can establish a Virtual Private Net-
work (VPN) connection D. Media Access capability

A. Only when using wireless connections 293. used for non-profit organization sites
to the Internet
A. .com
B. Only when using Ethernet connections
to the Internet B. .org
C. Only when connected to the Internet C. .net
D. None of these answers D. .edu
289. Which one is inccorect option to connect
294. which one is NOT a web browser
workstation with server?
A. Mozilla Firefox
A. Cable
B. Radio Transmitter B. Safari
C. Infra Red C. Google
D. Bluetooth D. Google Chrome

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 489

295. Which of the following is an example of 300. Computer networks allow users to
a WIRED connection? share:

PRACTICE BOOK» NOT FOR SALE


A. WI-Fi A. printers
B. Ethernet B. screens

C. 3G C. input devices
D. power
D. Bluetooth
301. What is a disadvantage of a client-server
296. A worldwide collection of networks that network?
connects millions of businesses, govern-
ment agencies, educational institutions, A. Cheap to set up
and individuals. B. If the server goes down, the network
goes down
A. World Wide Web
C. Each client manages its own security
B. Internet
D. The network can be managed centrally
C. ARPANet
D. ICANN 302. Which network topology requires a cen-
tral controller or hub?
297. Which type of network needs a ‘hub’ or A. Star
‘switch’? B. ring
A. Star C. Bus
B. Ring D. mesh
C. Bus 303. http://www.classzone.com is an exam-
D. none of above ple of what?
A. a URL
298. What is FTP used for?
B. an access code
A. To send information across the inter-
net in packets C. a directory
D. a server
B. To ensure that information is sent to
the correct computer 304. Any portion of a network that is sepa-
C. To send mail across the internet rated (by a switch, bridge, or router) from
other parts of the network.
D. To copy files from one computer to an-
other A. segment
B. backbone
299. encrypts all information sent and re-
C. hub
ceived
D. bus
A. HTTP
305. What is a network in which resource
B. FTP
sharing, processing and communications
C. HTTPS control are completely decentralized?
D. SMTP A. Client/Server Network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 490

B. Wide Are Network 311. Connects multiple computers together in


C. Local Area network a network. Only sends data to the specific
computer address
D. Peer-to-Peer Network
A. Switch
306. Is a higher-level idea of how the network
is set up, including which nodes connect to B. Hub
each other and in which ways, as well as C. Repeater
how data is transmitted through the net-

NARAYAN CHANGDER
work. D. Modem
A. Logical Network Topology
312. WiFi is a?
B. Planned Network
A. Type of computer
C. Physical Network Topology
D. Hardware Network B. Type of network cable

307. How many layers are there in the OSI ref- C. Popular technologies and standards
erence model? for wireless computer networking
A. 7 D. Computer programs that help people
B. 4 make money on the Internet

C. 5 313. Why are hubs not very efficient?


D. 9
A. Ethernet protocols are slower than IP
308. Another name for electronic document
B. Because witches use switches
found on the web is
A. Webpage C. There might be too many people
logged on
B. Website
C. Homepage D. They transmit data on ALL ports

D. Pagesite 314. The term HTTP stands for?


309. a list of data items that are reclaimed in A. Hypertext tracing protocol
a specific order
B. Hypertext transfer protocol
A. queues
B. ftp C. Hypertext transfer program
C. memory D. none of above
D. internet protocol
315. How many bus lines are used to transmit
310. A computer network is connected to- data in serial transmission?
gether.
A. 1
A. One computer
B. 2
B. Two or more
C. Three or more C. 4
D. Four or more D. 8

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 491

316. What is a WAN? C. DUC


A. Wide Area Network:A more extensive D. NIC

PRACTICE BOOK» NOT FOR SALE


network than a LAN
322. Which is the largest computer network in
B. A unit which is transferred over a net- the world?
work
A. Cellular
C. A Local Area Network
B. Airdrop
D. Worst Area Network:A more extensive
network than a LAN C. Bluetooth
D. The Internet
317. How many network topologies are
there? 323. Which topology is most used in busi-
A. 1 nesses and companies today?

B. 2 A. Mesh

C. 3 B. Ring

D. 4 C. Star
D. Tree
318. Computer networks share
A. Files 324. ISP

B. Resources A. internet service protocol

C. Software B. internet service provider

D. All of the above C. international service provider


D. internet success protocol
319. It is a computer network used for commu-
nication among computer devices close to 325. two or more topologies are combined to
one person? form a complete network.
A. Peer to Peer Network A. TREE / HYBRID TOPOLOGY
B. Metropolitan Area Network B. MESH TOPOLOGY
C. Wide Area Network C. STAR TOPOLOGY
D. Local Area Network D. none of above

320. Radio waves and microwaves are used in 326. network that covers a broad area using
which of the following communications? leased telecommunication lines
A. Voice over IP A. LAN
B. IP Telephony B. MAN
C. Wireless C. WAN
D. Enterprise D. NET

321. What do we need to set in our computer 327. A group of 2 more computer systems
in a network? linked together.
A. WAN A. Network
B. LAN B. Bandwidth

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 492

C. Bitrate 333. Which email protocol allows an email


client to download email messages to the
D. Latency
local computer?
328. What is an example of a LAN A. IMAP4
A. Internet B. SMTP

B. Desktop C. TCP
D. POP3
C. school network

NARAYAN CHANGDER
D. none of above 334. Advantages of the network?
A. Expensive Hardware
329. provides many different services to its B. Specialist staff required
client computers such as file retrieval,
printing, and emailing C. Communication

A. non-dedicated server D. Hacking

B. dedicated server 335. It is a collection of computers that are con-


nected for the purpose of sharing informa-
C. cloud server tion, resources and devices.
D. database A. Internet
B. World Wide Web
330. This is the physical arrangement of de-
vices in a network. C. Computer Networks
A. topology D. Wi-Fi

B. protocol 336. What type of network would be used for


an organization which wants to keep all its
C. switch
information private but accessible to some
D. router outsiders?
A. Intranet
331. A forwards every frame; it has no
filtering capability B. Extranet

A. passive hub C. Bot Net


D. MIFI
B. repeater
C. bridge 337. Which of the following can you share in
a network?
D. router
A. Software
332. What is coaxial cable used for? B. Peripherals
A. Transmitting TV and Broadband sig- C. Both of them
nals D. none of above
B. Connecting LANs 338. A switch provides security than a hub
C. Connecting WANs A. More
D. Connecting clients to a server B. The same

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 493

C. Less 344. When and where was Muhammad born?


D. none of above A. 600, in the U.S.

PRACTICE BOOK» NOT FOR SALE


339. A device that allows multiple computers B. 570, in Mecca
to communicate with each other over a net-
C. 10000000000 in the Byzantine empire
work. It has several ethernet ports that
are used to connect two or more network D. 400, in the Byzantine empire
devices together.
345. A network that extends across several
A. hub
cities is a
B. switch
A. FAN
C. protocol
B. WAN
D. gateway
C. LAN
340. The smallest type of network is..
D. PAN
A. PAN
B. LAN 346. What is a protocol?
C. WAN A. Set of rules for transmission of data
D. MAN B. A term used to describe network hard-
341. the acronym for hyper text transfer pro- ware
toco C. The method of connecting devices to-
A. https gether on a network
B. http D. Set of controls for connections on a
C. html network

D. pdf 347. Is a class of network which serves a large


geographical area between 5 to 50 kilome-
342. What is difference between an IP address
ters in range.
and a MAC address?
A. One can be changed and the other A. Metropolitan Area Network (MAN)
can’t B. Wide Area Network (WAN)
B. They are both the same C. Storage-Area Network (SAN)
C. They’re addresses
D. System-Area Network (also known as
D. none of above SAN)
343. A set of rules that govern the connec-
348. the most popular search engine in the
tion, communication, and data transfer be-
United States
tween computers on a network
A. Internet Explorer
A. protocol
B. ethernet B. Google Chrome
C. hub C. Google
D. provision D. Mozilla Firefox

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 494

349. How are computers on a virtual network C. 10


connected? D. 12
A. Using satellites
355. Which of the following CANNOT be a rea-
B. Using cables son for network problems?
C. Using WiFi A. Incorrect network problems
D. Using software B. Unplugged network hub, switch
350. Which of the following is true of a WAN? C. Network cables are connected

NARAYAN CHANGDER
A. It connects LANs via the public infras- D. Network disabled
tructure (internet)
356. What is failover?
B. It is wireless
A. Having a parallel server that ‘kicks in’
C. It only covers a limited area if the other server breaks
D. It will only support a small number of B. Taking a back up every time new data
users is saved
351. Which one is the advantage using com- C. Sending the entire day’s files to a tape
puter network? drive
A. Unprotected file access D. Never use ‘password’ as a password
B. Need more time for set up 357. Which is not true?
C. Expensive A. HTTP is a vehicle for accessing WWW
D. Faster Speed
B. SMTP is main protocol used in email
352. A collection of related webpages and as-
sociated items, such as documents and pho- C. FTP used for transferring files from
tos, one host to another

A. Webpage D. DNS used by administrator to manage


the internet
B. Website
358. Which protocol would you use to transfer
C. Homepage
files?
D. Pagesite
A. FTP
353. Cameron has decided that he is going to B. SMTP
send a file to his cloud service. What ac-
C. POP3
tive process is he engaging in?
D. HTTP
A. Downloading
B. Uploading 359. a type of computer network that con-
nects a computer in a relatively small area
C. Cryptology
like in an office building, school or home
D. Espionage A. Local Area Network
354. There are types of computer virus. B. Wide Area Network
A. 5 C. Wireless Local Area Network
B. 7 D. Metropolitan Area Network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 495

360. In this network type, each computer can 365. In this network, each node is connected
be both a server and a client. What type to a central device or hub.
of network am I?

PRACTICE BOOK» NOT FOR SALE


A. bus network
A. WAN B. ring network
B. LAN C. star network
C. Peer to Peer D. wireless network
D. Wireless Network 366. All Abu Dhabi Banks are connected to-
gether throughout
361. Connects multiple computers together in
a network. Shares data between all com- A. WAN
puters B. LAN
A. Router C. WIRELESS
B. Hub D. none of above

C. Switch 367. This is the part of a computer message


that is transmitted over a network.
D. Terminator
A. link
362. This device is responsible for sending out B. node
WIFI (wireless) signals in your home for
C. packet
you to connect to.
D. topology
A. Router
B. Hub 368. Which of these is restricted to one indi-
vidual
C. Modem
A. LAN
D. ISP
B. WAN
363. ARPA stands for C. MAN
A. Advanced Research Projects Adminis- D. PAN
tration 369. Routers can be used on networks for de-
B. Advanced Repeater Projects Agency vices to
C. Advanced Research Projects Agency A. to be totally dependent without net-
works
D. Advanced Rear Projects Agency
B. to be independent of each other
364. A computer that is not connected to a net- C. to join the same network
work is called a computer. All data is
D. to function solely on first-come, first
store on its hard disk locally.
serve
A. Standalone
370. Two or more computers connected to-
B. Workstation gether form a
C. Network Node A. search engine
D. LAN B. browser

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 496

C. network 376. Which of these types is connecting be-


D. hyperlink tween countries:
A. WAN
371. What does Protocol mean?
B. MAN
A. Security
C. LAN
B. Rules
D. PAN
C. Orders

NARAYAN CHANGDER
D. Services 377. What is the DNS record type that spec-
ifies an alias name of another address
372. which type of computer on a network pro- record?
vides something such as file space? A. MX
A. Client B. NS
B. Server C. CNAME
C. Peer D. SOA
D. Node
378. What is a node?
373. What is a client? A. Only the computers in a network
A. Powerful Computers that provide ser- B. Resources connected to servers such
vices to other computers as printers and scanners
B. Computers that ask for the services a C. The switch or hub
server provides
D. Anything in a network
C. Physical connection between devices
379. What is Hypertext used for?
D. A circuitboard with the components to
send/receive data A. Creating websites
B. Sending emails
374. the way that each node is physically con-
nected to the network C. Saving programs
A. topology D. Storing data
B. net design 380. A computer network permits sharing of
C. peer-to-peer A. Resources
D. protocol B. Information
375. It is the practice of testing a computer C. both a & b
system, network or Web application to D. none of these
find vulnerabilities that an attacker could
exploit. 381. Wireless connections happen by way of
A. Eavesdropping A. radio waves.
B. Hacking B. cables.
C. Impersonation C. Cat 5.
D. Penetration testing D. tubes.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 497

382. A network in a home is what type of net- 388. Which is a con of a Peer-to-Peer server?
work?
A. They cannot connect to the internet

PRACTICE BOOK» NOT FOR SALE


A. LAN
B. They cannot handle streaming web-
B. BAN
sites
C. WAN
C. They cannot handle high traffic
D. VAN
D. They Can handle data collisions
383. What does NAT stand for?
A. Network Access Terminal 389. Which of these would be a benefit of hav-
B. Network Address Translation ing a network?

C. Node Address Translation A. Preventing any viruses spreading from


computer to computer
D. Not Actually True
B. Sharing hardware, software and data
384. Which protocol is used to connect to the
Internet? C. Preventing computers from being
A. POP hacked

B. IMAP D. none of above


C. SMTP
390. identifies company or commercial sites
D. TCP/IP
A. .org
385. Which is a network where each computer
is linked to the next, and the last is linked B. .com
to the first? ? C. .gov
A. Bus
D. .edu
B. Ring
C. Star 391. What is a computer network?
D. none of above A. A computer covered in spider webs.
386. Every piece of equipment that connects to B. A collection of computers that can com-
the, is assigned a different address. municate with each other electronically.
A. IP C. A collection of computers that can com-
B. Network municate with each other telepathically.
C. Router D. WiFi
D. Home
392. What is the job of the switch?
387. The card that is installed in a computer so
that it can be connected to a network. A. To forward data packets to a network
A. Router Card B. Connects other computers to a net-
work
B. Gateway Card
C. Motherboard Card C. Absorbs the signal
D. Network Interface Card D. Connects the computer to the network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 498

393. The basic advantages of the computer 399. The amount of information (aka traffic)
network is carried on a network at one time.
A. Hacking A. Bandrate
B. easy to communicate B. Bandwidth
C. network down C. Mobile Data
D. none of above D. Internet speed
400. For Network Configurations, it is impor-

NARAYAN CHANGDER
394. Computers that request or order informa-
tion from a server tant to consider the size and geographical
area of a network.
A. client
A. Yes
B. server
B. No
C. routers
C. Maybe
D. requester D. It doesn’t really matter.
395. Which of these is NOT an authentication 401. What network covers a LARGE geograph-
method ical area?
A. password A. LAN
B. PIN B. WAN
C. Fingerprint scanner C. BAN
D. Wifi D. KAN
396. Which cable sends data as electricity? 402. What is the meaning of the CAN net-
A. Copper work?
A. Canadian Agency Network
B. Fibre Optic
B. Caribbean Area Network
C. Ethernet
C. Campus Area Network
D. none of above
D. Caliology Area Network
397. name for the thin tubes of glass used by
much of the Internet to send data quickly 403. Which network would be best for a Col-
over long distances underground lege?
A. MAN
A. ethernet
B. LAN
B. wifi
C. WAN
C. hub
D. CAN
D. fiber optic
404. Which network device is primarily used
398. Google Chrome is an example of to connect network segments?
A. Email A. switch
B. Search engine B. . patch panel
C. Web browser C. hub
D. Hardware D. Router

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 499

405. Routers are used to computers C. Bible


A. to be totally dependent without net- D. ten million DOLLARS

PRACTICE BOOK» NOT FOR SALE


works
411. used for government sites
B. to be independent of each other
A. .edu
C. to join the same network
B. .gov
D. to function solely on first-come, first
serve C. .com
D. .net
406. is the technology that connects the
machines and people within a site small 412. the acronym for hyper text markup lan-
area. guage that is widely considered the lan-
guage of the Internet
A. WAN
A. https
B. LAN
B. http
C. WAN
C. ftp
D. PAN
D. html
407. The client
413. Exchange of World Wide Web docu-
A. Receives something from the server ments.
B. Provides something from the server A. HTTP
C. Prints things B. FTP
D. Gives you internet C. MIME type
408. used for educational sites (most com- D. SMTP
monly four year universities)
414. What is the most common network topol-
A. .edu ogy today?
B. .com A. star
C. .org B. collapsed ring
D. .net C. ring
409. Unique address given to each device on D. bus
the internet
415. is an example of..
A. Media Access Control address
A. Subnet mask
B. Internet Protocol address
B. IP address
C. Data Packets address
C. Gateway
D. Data Protocol address
D. none of above
410. The (blank) is the more in depth Muslim 416. A network device that associates a Me-
religious text. dia Access Control (MAC) address with a
A. Sunnah port is a:
B. Quran A. Switch

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 500

B. Router 422. A packet is


C. Hub A. Something you put crisps in.
D. DSL modem. B. An entire message you send across
the internet.
417. The use of various services, such as
C. A small piece of information that is
software development platforms, servers,
sent across the internet
storage and software, over the internet
D. An IP address.

NARAYAN CHANGDER
A. cloud computing
B. Internet service provider 423. Which term describes the interference
when electrical impulses from one cable
C. world wide web
cross over to an adjacent cable?
D. packet storage
A. cross over
418. What does LAN stand for? B. cross talk
A. Local Arena Network C. RFI
B. Local Area Network D. none of above
C. Long Area Network
424. What is the name given to a com-
D. Local Arena Name puter/device that is NOT connected on
ANY network?
419. Which network device sends data to ev-
A. Computer
ery device that is connected to it?
B. Device
A. Hub
C. Standalone device
B. Router
D. Standalone
C. Switch
D. Modem 425. It is a type of computer network that
spans a larger area, such as an entire re-
420. What are MAC addresses used to iden- gion, state, or even country.
tify?
A. Computer Networks
A. Hardware
B. Local Area Network
B. Networking software
C. Wide Area Network
C. DSI-Ware
D. Wi-Fi
D. Firmware
426. is the IEEE designation for which network
421. devices are connected in a circular layout type?
A. Ring A. Ethernet
B. Bus B. Token Ring
C. Star C. Bus
D. none of above D. Wireless

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 501

427. Scenario:A small office wants to connect 432. Another way to connect to a Wireless
two computers together to share the odd Network is by way
file every now and again. Which topology

PRACTICE BOOK» NOT FOR SALE


A. more radio waves.
should be used?
B. wireless waves.
A. Star
B. Bus C. sky waves.

C. Mesh D. infrared signals.


D. Ring 433. Data transmitted through radio signals
428. Scenario:A large organisation wants to and does not need wires and cables is
connect all of their computers together called
and store all the files on a central server. A. transmission
Which topology should be used?
B. wireless communication
A. Star
C. data transfer
B. Bus
D. none of above
C. Mesh
D. Ring 434. Which of the following is a group of com-
puters connected together in a way that
429. A number that is assigned to each com- allows information to be exchanged be-
puter or device for identification when con- tween the computers?
nected to a network.
A. network
A. IP address
B. node
B. routing number
C. gateway C. backbone

D. ping address D. router

430. You can make telephone calls over the In- 435. What is a LAN?
ternet using a technology called A. Network that covers a Large area, for
A. Intertel example a city
B. Telenet B. Network that covers an area such as a
C. VoIP country
D. Skynet C. Network that covers a small geo-
graphic distance
431. This Topology structure gets its name
from how the central node functions as a D. Network that links countries together
sort of trunk for the network, with nodes
436. Which of the following connectivity op-
extending outward in a branch-like fash-
tions gives you the best mobility?
ion
A. Tree Topology A. Cellular
B. Ring Topology B. Wireless
C. Mesh Topology C. Wired
D. Star Topology D. Broadband

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 502

437. A type of cable widely used to connect 442. Each of the following reasons are issues
computers on a network with using email, except:
A. Ethernet A. emails are not private
B. normal cable B. emails can be sent immediately
C. wires C. not everyone has access to a computer
D. none of the above
D. you don’t know if the recipient has

NARAYAN CHANGDER
438. I can use wireless connections in my net- read the email
work. Which topology am I using?
443. An ISP provides access to the infras-
A. Ring tructure for the users.
B. Star A. Internet
C. Bus B. Protocols
D. none of above C. Router

439. An IP address is D. Layers

A. A selection of letters that help comput- 444. A is a computer that serves up infor-
ers to communicate with each other. mation to other computers on a network.
B. A selection of numbers that help com- A. Mainstay
puters to communicate with each other. B. Laptop
C. A way of finding your local computer C. Desktop
shop.
D. Server
D. A type of code used to program a com-
puter. 445. uses encrypted data before it is sent
over a public network
440. select the invalid IP/Logical address from
A. WAN
the following
B. SAN
A. 192.168.100.10
C. VPN
B. 0.0.10.20
D. MAN
C. 329.12.203.10
446. Bluetooth allows for the exchange of
D. 192.194.120.23
data across each of the following, except:
441. A switch is a device A. Long Distances
A. that connects all the devices in the net- B. Short Distances
work.
C. Wired Devices
B. that manages all the softwares in the D. Wireless Devices
network.
C. that manages all the devices in the net- 447. A wide area network (WAN)
work. A. connects two or more LANs together
D. none of above B. means Wi-Fi can be used

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 503

C. is easier to use than a LAN 453. A software or hardware that checks in-
D. connects two or more computers to- formation coming from the Internet and de-
pending on the applied configuration set-

PRACTICE BOOK» NOT FOR SALE


gether
tings either blocks it or allows it to pass
448. Which type of network component is through is called:
used to interconnect computing devices? A. Antivirus
A. shared peripheral B. Firewall
B. host C. Antispyware
C. network media D. Malware
D. intermediate device
454. Computer Network is
449. the acronym for file transfer protocol
A. Collection of hardware components
A. http and computers
B. https B. Interconnected by communication
C. ftp channels

D. pdf C. Sharing of resources and information


D. All of the Above
450. What is a client computer?
A. A normal computer that cannot con- 455. Protocols
nect to a network A. protect the network
B. A normal computer that does basic B. control how computers work
functions
C. control access and security of shared
C. A powerful computer that controls the
resources in the network
network
D. none of above
D. A powerful computer that does basic
functions 456. Every device in my network is connected
via a switch. Which topology am I using?
451. The address of the web page is called
A. HTTP A. Ring

B. HTML B. Star

C. UTP C. Bus

D. URL D. none of above

452. What command to check internet connec- 457. What kind of cable would you use to con-
tion with Command Prompt? nect a modem to a router?
A. PING A. Eithernet cable
B. iperf B. Phone cable
C. redgedit C. VGA cable
D. telnet D. TCP Cable

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 504

458. One of my workstations has gone down C. Operating System Interaction


and my entire network has gone down. D. Objective Software Interface
Which topology am I using?
A. Ring 464. What is the logical or physical layout of
a local area network called?
B. Star
A. setup
C. Bus
B. topology
D. none of above

NARAYAN CHANGDER
C. configuration
459. It describes the configuration of a commu-
nication network? D. Channels

A. ARPA Network 465. What is the acronym MAN stand for?


B. Workgroup Network A. Magnetic Access Network
C. Ad Hoc Network B. Metropolitan Area Network
D. Topology C. Multi-Area Network
460. What is the device that connects all com- D. Multi-Access net
puters, laptops, smart TVs, and printers in
your home network. 466. physical addition to the computer that al-
lows for storage of programs, information
A. Workstation and resources
B. Router A. server
C. Clients B. queue
D. Modem
C. memory
461. Each computer has a unique , like a D. ethernet
telephone number for the internet.
467. This network device has an internal pro-
A. Meme
cessor and has the address of each con-
B. Graphic Card nected device stored in a table on it. What
C. IP Address is it?
D. Network Pin A. Modem

462. Which of the following shows the cor- B. NIC


rect arrangemment of networks from the C. Switch
smallest to the largest network? D. Server
A. LAN, WAN, MAN, PAN
468. If a router cannot determine the next hop
B. PAN, LAN, MAN, WAN
for a packet, the router will;
C. WAN, PAN, LAN, MAN
A. drop the packet
D. WAN, MAN, PAN, LAN
B. broadcast the packet
463. OSI is an acronym for? C. store the packet in the memory buffer
A. Open Systems Interconnection
B. Operating Systems Input D. forward the packet to the default route

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 505

469. Who is your CSS 10 Teacher? C. STP


A. Gladys Mejia D. wireless

PRACTICE BOOK» NOT FOR SALE


B. Ruben Baruelo 475. What layer of the OSI model is
C. Don John Ingaran this:Routes data between different nodes,
D. Ma. Melody Ann Navarro using addresses to tell which computer the
information should be sent to
470. This refers to the physical structure of a A. Internet
network, like how the wires are connected
to different computers in a network. B. Transport
A. Ring Topology C. Physical
B. Logical Topology D. Network
C. Physical Topology 476. Physical or logical arrangement of net-
D. Bus Topology work is
A. Topology
471. arge computer network that spans a
metropolitan area and falls between a LAN B. Routing
and a WAN C. Networking
A. LAN D. Control
B. MAN
477. What does the word Topology mean?
C. WAN
A. The type of devices on the network
D. NET
B. The way connections on a network are
472. The IEEE designation for Fast Ethernet configured
is? C. The method of sending data on a net-
A. 802.1 work
B. 801.2 D. The study of network
C. 802.3 478. Is a network that covers an educational
D. 803.2 or corporate campus. Examples include
elementary schools, university campuses,
473. What is made up of lots of LANs (Local and corporate buildings
Area Network)?
A. Campus Area Network (CAN)
A. WAN (Wide Area Network)
B. Wireless Local Area Network (WLAN)
B. PAN (Personal Area Network)
C. Local Area Network (LAN)
C. VPN (Virtual Private Network)
D. Personal Area Network (PAN)
D. MAN (Metroplolitin Area Network)
479. What does HTTPS stand for?
474. Which media type is least susceptible to
external interference, including EMI and A. Hypertext Transfer Protocol Secure
RFI? B. Hyper Text Protocol Secure
A. UTP C. Hidden Text Transfer Protocol Station
B. fiber optic D. Hypertext Transfer Protocol Station

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 506

480. This network connects devices using ra- 485. Which type of network cable is commonly
dio signals. used in backbone networks and telephone
companies?
A. bus network
A. CAT
B. ring network
B. Fiber Optic
C. star network
C. Coaxial
D. wireless network
D. RJ11

NARAYAN CHANGDER
481. A network that separates an organiza-
tion’s private network from a public net- 486. What does ISP stand for?
work is a/an: A. Internet Service Protocol
A. firewall B. Internet Service Provider
B. extranet C. Internet Service Person
C. perimeter D. Internet Service Price
D. internet
487. It is a computer network covering a small
physical area, like a home, office, or small
482. What is a MAC address?
group of buildings, such as a school, or an
A. A set of integers that identify a com- airport?
puter on a network
A. Peer to Peer Network
B. A unique identifier for all computers on
B. Local Area Network
a network
C. Metropolitan Area Network
C. A unique identifier for all ports on a
network D. Wide Area Network
D. A unique identifier for all devices con- 488. The layout of how computers are con-
nected to a network nected is
483. What are the Three common types of A. network
computer Networks? B. type
A. ROM, MAN, FAN C. topology
B. MAN, LAN, WAN D. none of above
C. RAN, PAN, RAM
489. Customers in Martin’s company can ac-
D. NONE OF THE ABOVE cess certain parts of the company network
from their own company computer outside
484. What topology (server) has terminators of Martin’s company. This is an example
at the ends of the server? of a/an:
A. Ring A. extranet
B. Bus B. internet.
C. Mesh C. intranet.
D. Star D. throughput.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 507

490. What can Client servers do that Peer-to- 496. The place where two or more net-
Peer servers cannot? works connect and is a critical device that
keeps data flowing between networks

PRACTICE BOOK» NOT FOR SALE


A. Send data packets
and keeps the networks connected to the
B. Handle more than one device Internet.
C. Let users create secure accounts
A. gateway
D. none of above
B. router
491. The best topology is
C. bus
A. Bus
D. bridge
B. Star
C. Ring 497. Which uses a network access method
D. none of above based on detecting collisions between
nodes?
492. What is the meaning of Bandwidth in the
Network? A. FDDI
A. Level of ping B. 802.11(Wi-Fi)
B. Class of IP used in Network C. Ethernet
C. Connected Computers in the Network
D. token ring
D. Transmission capacity of communica-
tion channels 498. Internet is the
493. What is bit rate measured in? A. network
A. cm / mm / m B. small network
B. mHz
C. biggest network
C. bps
D. big network
D. km
494. In this network, each node is daisy- 499. A home router
chained along the same backbone.
A. Makes home computers run faster
A. bus network
B. Enables safe sharing of resources
B. ring network among network devices in the home
C. star network
C. Helps people build Web sites
D. wireless network
D. Boils water
495. Two or more computers connected close
together in a local area e.g. building or of- 500. What is bandwidth measured in?
fice is called?
A. mm / cm / km
A. WAN
B. Nm
B. LAN
C. The Internet C. Hz
D. Virtual Network D. kg

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 508

501. Which of these is an advantage of a Bus B. Bitrate


network? C. Latency
A. Easy to install D. Network
B. Fast
507. Who owns the Internet?
C. Good security
A. No one
D. none of above
B. the governement

NARAYAN CHANGDER
502. Which of these is not a network security C. Bill Gates
measure?
D. Vint Cerf
A. Restricting access levels
508. I am usually built into the motherboard
B. Passwords to log on
and have a cat cable plugged into me-what
C. Encryption of WiFi signals am I?
D. Yale locks on the computer room A. Graphics card
503. What is the software called that’s de- B. Network interface card (NIC)
signed to exploit a computer user and is C. Audio card
a broad term covering computer viruses,
D. Router
worms, Trojan, adware, etc.?
A. A Backdoors 509. Transfer of electronic mail.
B. B Spyware A. Telnet
C. C Malware B. FTP
D. D Key-logger C. SMTP
D. MIME type
504. Which of the following can you do on the
Internet? 510. What is a technology used in a cellular
A. All of them telephone network?
B. Online shopping A. Bluetooth
C. Video calling B. fiber-optic
D. Streaming music C. Global System for Mobile Communica-
tions (GSM)
505. What is a Router? D. Wi-Fi
A. A computer or device
511. ICANN manages
B. The physical layout of computers on a
network. A. Router package, IP address manage-
ment
C. A device that transfers data from one
network to another in an intelligent way B. IP address assignment, Domain Name
registration
D. A Local Area Network
C. Content of the website, Domain Name
506. The capacity of data transfer in a sys- registration
tem. D. Router package, content of the web-
A. Bandwidth site

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 509

512. when encryption is needed to protect C. TCP


valuable passwords and financial transac- D. POP3
tions, this will allow you a safe and secure

PRACTICE BOOK» NOT FOR SALE


connection to the Internet 518. all workstations are connecting directly
to the main backbone that carries the
A. html
data.
B. wifi
A. BUS TOPOLOGY
C. http
B. RING TOPOLOGY
D. https C. STAR TOPOLOGY
513. Networks provide D. none of above
A. goods 519. A set of rules that has to be followed
B. services by the network computers to communicate
with each other.
C. information
A. Protocol
D. all of these
B. Terminal
514. What does HTML stand for? C. Topology
A. Hyper Text Markup Lanuage D. Architecture
B. High Transitional Math Language
520. Why are protocol needed?
C. Hyped Trade Mesh
A. The information (data) to be communi-
D. none of above cated
515. network designed for a town or city B. To become a device that sends the
data message
A. LAN (Local Area Network)
C. Physical path by which a message trav-
B. MAN (Metropolitan Area Network) els
C. WAN (Wide Area Network) D. Rules that govern data communication
D. PAN (Personal Area Network)
521. The computers in a network can be linked
516. The World Wide Web only works by us- to each other through
ing an internet browser. Which is not a A. a)telephone wires
browser?
B. b)satellite links
A. Chrome C. both a and b
B. Internet Explorer D. none of above
C. Safari
522. process of encoding messages or informa-
D. Microsoft tion in such a way that only authorized
parties can read it
517. Which email protocol allows an email
client to read mail stored on the mail A. layering
server? B. securing
A. IMAP4 C. encryption
B. SMTP D. phishing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 510

523. Communication channel is shared by all B. star


the machines on the network in C. ring
A. broadcast network
D. mesh
B. unicast network
529. To see web pages on the World Wide Web
C. multicast network
you need special software called a
D. none of above
A. Web worm

NARAYAN CHANGDER
524. The following device is not very intelli- B. Web browser
gent but allows computers to form a seg-
ment of a network: C. URL
A. Hub D. Web space
B. Router 530. What are the benefits of computer Net-
C. Modem work
D. NIC A. Share applications

525. allows information to be delivered to B. Share USB


other computers or electronic devices con- C. Share Projectors
nected to the network D. none of above
A. network
531. In the client-server model, what is the
B. web browser
primary protocol used for communication
C. hub between a browser & web server?
D. country A. FTP
526. Why use a network? B. TCP
A. Share viruses C. HTTP
B. To lose data D. SSL
C. To easily share documents
532. Networking device used to send data
D. To install cables among multiple networks that use the
same protocol.
527. On a network, what is used to store pro-
grams so that hard drive space is not taken A. Hub
from the computers? B. Switch
A. Server C. Star
B. Internet D. Router
C. Memory
533. De facto means
D. Floppy Disk
A. by law
528. An Ethernet 1000BasedT network is
B. by fact
wired as a physical star using switches.
What is the logical topology C. by regulation
A. bus D. none of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 511

534. Which of the following is the smallest 540. Which of the following is an example of
computer network? network topology?

PRACTICE BOOK» NOT FOR SALE


A. Large Area Network (LAN) A. Nova
B. Local Area Network (LAN)
B. Bus
C. Metropolitan Area Network (MAN)
C. Branched
D. Wide Area Network (WAN)
D. Circle
535. Log into a remote computer system.
A. HTTP 541. which of these represents the internet
B. FTP Protocol version 6 (IPv6) loopback ad-
dress?
C. Telnet
D. SMTP A. 127.0.0.1

536. A is needed to connect two different B. FEC0:A8C0::AAO1


networks together C. 192.168.0.1
A. Hub
D. ::1
B. Switch
C. Router 542. Computer networks can be connected via
D. none of above cables or

537. used for Internet service providers or A. wirelessly


other types of networks B. email
A. .com
C. the Internet
B. .net
D. plumbing
C. .org
D. .edu 543. Device is used to connect one LAN to an-
other LAN uses the same communication
538. Which of the following would be the
rules
LEAST likely to be used in a LAN?
A. Wi-Fi A. Bridge
B. Ethernet cable B. Gateway
C. Fibre optic cable C. Router
D. none of above
D. Switches
539. Which of the following would normally be
used to connect networks across different 544. How far can Wi-fi reach?
continents?
A. Around 50 meters
A. Fibre optic cables
B. Around 70 meters
B. Microwave links
C. Wi-Fi C. Around 20 meters
D. none of above D. Around 100 meters

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 512

545. the number assigned to a network B. Hubs


equipped piece of hardware by which other C. Routers
device identify it.
D. Modems
A. IP Address
B. Router 551. A computer network is where two or
more devices are connected together so
C. TCP/IP
they can share
D. none of above
A. people

NARAYAN CHANGDER
546. Which of the following is not a type of B. resources
virus?
C. cables
A. Boot sector
D. none of above
B. Polymorphic
552. Coaxial cable used in networking are usu-
C. Multipartite
ally terminated with which connector?
D. Trojans
A. RF
547. Network components are connected to B. RJ45
the same cable in the topology.
C. Netbui
A. Mesh
D. BNC
B. Bus
C. Star 553. What is formed when Bluetooth devices
are paired with one another?
D. Ring
A. Local are network (LAN)
548. A network of personal computers, each B. Wide are network (WAN)
of which acts as both client and server, so
that each can exchange files directly with C. Personal area network (PAN)
every other computer on the network D. Metropolitan area network (MAN)
A. peer-to-peer network
554. one of the most common network topolo-
B. client network gies found in most offices and home net-
C. server network works.
D. social network A. STAR TOPOLOGY
B. RING TOPOLOGY
549. A network in which devices can function
as clients or servers C. BUS TOPOLOGY
A. client/server network D. none of above
B. dedicated network 555. Which device is used to connect LANs to
C. non-dedicated network each other?
D. gateway network A. Routers

550. These devices are designed to transmit B. Hubs


data within a computer network C. Access Points
A. Switches D. Gateways

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 513

556. Bluetooth and Wi-Fi enable devices to B. Internet


communicate using C. LAN

PRACTICE BOOK» NOT FOR SALE


A. Router D. WAN
B. WLAN
562. What is an example of network media?
C. Switch
A. networking CAT5 cable
D. Radiowaves
B. desktop computer
557. What are the three criteria necessary for C. laptop
an effective and efficient network? D. network switch
A. Performance, Reliability and Security
563. It is a logical subdivision of an IP network
B. Transformation, Effective and Reliable or the practice of dividing a network into
two or more networks?
C. Transformation, Effective and Security A. Subnetwork
B. Default Getway
D. Capacity, Reliable and Cost
C. IP Config
558. A Computer, specially reserved for the D. MAC Address
Server purpose
564. A Wide Area Network is a network in
A. Dedicated Server which
B. File server A. Computers and devices that are con-
C. Non dedicated Server nected over a large geographic area.
D. Printer server B. Computers and devices that are con-
nected over a small geographic area.
559. Is a type of Network where data is trans-
C. Computers and devices that are not
mitted wirelessly over a short distance ex-
connected with each oher.
amples are Bluetooth and Wi-Fi Direct
D. none of above
A. Personal Area Network (PAN)
B. Local Area Network (LAN) 565. Examples of this network includes cell
phone networks, wireless sensor net-
C. Wireless Local Area Network (WLAN)
works, satellite communication networks,
D. Campus Area Network (CAN) and terrestrial microwave networks.
560. Grouped data transmitted through a net- A. Wireless Local Area Network (WLAN)
work B. Local Area Network (LAN)
A. packets C. Personal Area Network (PAN)
B. peripheral D. Campus Area Network (CAN)
C. segment 566. PAN is known as a
D. router A. public network
561. A network that is in a small geographic B. home network
area a home, or one building. C. bluetooth network
A. AUP D. personal area network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 514

567. A device used to connect several comput- 572. This layer is concerned with specify-
ers to form a LAN is called? ing the characteristics of the transmission
medium, the nature of the signals, the data
A. Switch
rate, and related matters. This is defined
B. Bridge as a:
C. Router A. Physical layer
D. Gateway B. Network layer

NARAYAN CHANGDER
568. Home networks are more likely to use a C. Transport layer
D. Application layer
A. router 573. Each device connected to the network is
B. switch called a
C. hub A. node
D. none of above B. hub
C. computer
569. Which of the following does a computer
need to connect to a network or other com- D. stand alone machine
puter devices?
574. Which is the correct answer to the be-
A. ethernet card low:”A computer that does not communi-
B. NIC card cate with other devices”
A. LAN
C. IP Address
B. WAN
D. WiFi
C. Stand-Alone
570. What is a group of computers that
D. Server
are connected and communicate with each
other? 575. Define what is a LAN?
A. bus network A. Normally find within a business and
B. computer network school

C. local area network B. Connected devices share the re-


sources of a single processor or server
D. wireless network within a small geographic area
571. Which of these statements about Clients C. These are computers that share re-
and Servers is false? sources over a large area
A. Servers always have a ‘failover’ part- D. using for long distance
ner.
576. Connected in order to share resources and
B. Servers can authenticate log-ins communicate with each other the an-
C. Clients often have less file storage swer relates to the unit we are exploring
space now in class.

D. Clients can use software running on A. Verbal Networks


servers B. People Networks

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 515

C. Social Networks 582. Is a combinination of two or more differ-


D. Computer Networks ent topology structures.

PRACTICE BOOK» NOT FOR SALE


A. Hybrid Topology
577. Trojans and worms are examples of
B. Tree Topology
A. software
C. Ring Topology
B. malware
D. Star Topology
C. questionable websites
D. none of above 583. provides wireless network communica-
tion over short distances using radio or
578. If there is a problem with the then infrared signals instead of traditional net-
people on the network will be unable to work cabling.
access their files.
A. WLAN (WIRLESS LOCAL AREA NET-
A. Internet server WORK)
B. File server B. PAN (Personal Area Network)
C. Mail server C. CAN (Campus Area Network, Cluster
D. Database server Area Network)
D. LAN (Local Area Network)
579. To send an email, you need to have each
of the following, except: 584. Used by web browsers to access web-
A. a file to attach to the email sites and communicate with web servers
B. your own email adress A. HTTP
C. information to type in the email B. TCP/IP
D. the email address of each intended re- C. FTP
cipient.
D. SMTP
580. What type of file are GIFs?
585. A network over a large area like a city,
A. Image a country, or multiple countries
B. Music A. wide area network
C. Video B. local area network
D. Document C. campus area network
581. What are HTTP[S] used for? D. ranged area network
A. To send information across the inter-
586. Which is not the data flow of communica-
net in packets
tion?
B. To ensure that information is sent to
A. Simplex
the correct computer
B. Half-duplex
C. To send mail across the internet
C. Duplex
D. To transmit webpages across the inter-
net D. Full-duplex

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 516

587. Email services means 592. Which one from this list is a file server?
A. transmission of messages from one A. Gmail
user to another user. B. Google Drive
B. a group of email addresses used for C. Google Classroom
mass distribution of a message
D. Google Meet
C. that files can be uploaded and down-
loaded 593. Which layer does TCP operate on

NARAYAN CHANGDER
D. none of above A. Application
B. Transport
588. Which of the following network topolo-
gies contains a backbone which runs the C. Network
length of the network? D. Link
A. Star
594. What is a Firewall in Computer Net-
B. Bus work?
C. Mesh A. A web browsing Software
D. Ring B. The physical boundary of Network
C. An operating System of Computer Net-
589. What this the acronym of TVL? work
A. Technical Vacation Living D. A system designed to prevent unautho-
B. Technic Volcanizing Living rized access
C. Technical Vocational Livelihood 595. The physical topology of a network
D. Technology Vocation Livelihood refers to the layout of cables, computers
and other peripherals.
590. Which of these is an advantage of the A. Network topology
star topology?
B. Physical Topology
A. Devices do not rely on each other to
C. Logical Topologies
function
D. none of above
B. It looks nice
C. A central server is not needed 596. In this type of network topology, each
node of the network is connected to a cen-
D. Only one cable is needed to connect ev- tral node, which is known as a hub?
erything together
A. Mesh
591. How many devices do you need to create B. Ring
a LAN?
C. Bus
A. 2 or more
D. Star
B. 100
597. the study of the arrangement or map-
C. 50
ping of the elements (links, nodes) of a
D. Only 1 network, especially the physical (real) and

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 517

logical (virtual) interconnections between 602. Mention a computer which could manages
nodes. network resources.

PRACTICE BOOK» NOT FOR SALE


A. Network topology A. Workstation
B. Physical Topology B. User
C. Logical Topologies C. Client
D. none of above D. Server

598. network that allows information to be 603. The arrangement of devices in a network
shared between devices over LAN is called a Network

A. wifi A. GPS

B. hotspots B. Topology
C. Architecture
C. ethernet
D. Hub
D. server
604. An IP address is a numeric quantity that
599. Is a group of computers that use a set
identifies (Select all correct answers )
of common communication protocols over
digital interconnections for the purpose of A. A network adapter to other devices on
sharing resources located on or provided the network
by the network nodes B. The manufacturer of a computer
A. Computer network C. The physical location of a computer
B. Hardware network D. None of these answers
C. Product Network 605. If you need to log on to a Domain, what
D. Device Network type of network are you using?
A. Stand Alone
600. Which of these is an advantage of the bus
topology? B. Ad-hoc
A. It is easy and cheap to set up C. Client / Server
B. It is useful for large companies D. Peer to peer

C. You can pick people up 606. Bonus:When I was 6, my sister was half
D. Anyone can join my age, now that I’m 60 How old is my
sister?
601. It is a set of networks, using the Inter- A. 57
net Protocol and IP-based tools such as
B. 30
web browsers and file transfer applica-
tions, that is under the control of a single C. 27
administrative entity? D. 42
A. Externet
607. The translates internet domain and
B. Intranet host names to IP address.
C. Internet A. routing information protocol
D. Extranet B. domain name system

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 518

C. network time protocol 613. Which cable is not affected by magnetic


D. internet relay chat interference?
A. Coaxial
608. Transfers data packets between comput-
ers and networks by finding the most ef- B. Twisted Pair
fective route C. Fibre Optic
A. Hub D. none of above
B. Switch

NARAYAN CHANGDER
614. What is Latency?
C. Router
A. Distance from sender to reciever
D. none of above
B. Speed of the processor in your com-
609. These are key elements of protocol, ex- puter
cept
C. Delay between action and result
A. Syntax
D. Speed of character being put on the
B. Data screen from the keyboard
C. Timing
615. Connection among devices within these
D. Semantic
type of networks can be choose the
610. Data transmission can be in the forms of Best answer!
A. up or down.
A. Parallel and perpendicular B. wireless or wired.
B. Parallel and Serial C. horizontal or vertical.
C. Serial and continuous
D. responsive or non-responsive.
D. Serial, parallel and continuous
616. This is built-in to your router to prevent
611. Which of the following networks is LEAST unauthorized users from accessing the net-
likely to be a WAN? work.
A. The Internet A. Firewall
B. A school network
B. Router
C. A network of bank cash dispensers
C. Switch
D. none of above
D. Hub
612. You deploy a server running Window
Server 2016 and install the Remote Ac- 617. a combination of normal HTTP inter-
cess server role. You need to configure the actions, but with a different default
router to enable intranet access internet TCP port and an additional encryp-
and navigate to multiple website Which tion/authentication layer between the
should you configure? HTTP and TCP
A. WAP A. HTTPS
B. DHCP B. HTML
C. VPN C. FTPS
D. NAT D. USPS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.14 Computer networking 519

618. Which network size covers small areas 623. artificial body placed in orbit around the
such as homes, schools, and buildings? earth or moon or another planet in order to
collect information or for communication

PRACTICE BOOK» NOT FOR SALE


A. PAN
A. ethernet
B. LAN
B. country
C. MAN
C. client
D. WAN
D. satellite
619. Which of these is an IP address
624. What new number did Arabic numerals
A. 192.101.299.118 bring. Be smart here, just like they were!
B. 212.01.231 A. zero
C. 171.30.80.162 B. not a thing
D. ff.6c.2a.41.2e C. 10 billion
620. Setting up a using a smartphone is D. none of above
also known as creating a “hotspot” and
625. Networks are usually wireless or wired.
makes use of limited Wi-Fi or bluetooth to
What is an advantage of cable network?
connect devices.
A. More expensive
A. LAN
B. Less secure
B. PAN
C. Faster transfer speeds
C. WAN
D. More inconvenient
D. OTHER
626. Which network topology is connected by
621. Which of these is true about ring, star a single network device?
and bus networks?
A. Bus
A. Ring networks use more cable than
B. Ring
star
C. Mesh
B. Star networks fail if even one com-
puter fails D. Star

C. Bus networks can be slow due to colli- 627. What is an advantage of a WiFi net-
sions work?
D. Bus networks cannot use Ethernet ca- A. Slower transfer speeds
ble B. More convenient and easier to set-up
622. Your friend Maria asks you which of the C. Less secure
following are the most secure. What do D. Faster transfer speeds
you tell her?
628. Which of the following device is used to
A. 802.11n
connect two systems if the systems use
B. Infrared different protocols?
C. Cellular A. Hub
D. UTP B. Bridge

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 520

C. Gateway 632. A computer network is defined as


D. Repeater A. 2 computers connected together

629. Which of these normally has a computer B. 2 or more computers connected to-
network? gether

A. Hospital C. A large number of computers con-


nected together
B. Business
D. All the computers connected together

NARAYAN CHANGDER
C. Home
D. none of above 633. This network connects computers and de-
vices in a small geographical area.
630. Every internet user needs an ad- A. local area network
dress.
B. wide area network
A. MAC
C. server
B. DNS
D. protocol
C. VPN
D. IP 634. It is a computer network that covers a
broad area (i.e. any network whose com-
631. Which is more suitable for smaller net- munications links cross metropolitan, re-
works? gional, or national boundaries?
A. LAN Servers A. Local Area Network
B. Peer-to-Peer Servers B. Wide Area Network
C. Client Servers C. GAN Network
D. Minecraft Servers D. Intranetwork

1.15 Computer graphics


1. The sharpness of an image depends on the 3. I want a rectangle to become a square
density of pixels called shape. I can achieve it by using trans-
A. resolution formation.

B. revolution A. Scaling
C. solution B. Mirror Reflection
D. permission C. Rotation

2. Create image files, draw and edit images D. translation


and manipulate graphic files are the tasks
4. these are the repeating visual element on
of graphics software.
an image or layout to create unity in the
A. yes layout or image. It may be in the form of
B. no (Pattern, Repetition, and Rhythm)
C. maybe A. Layout
D. none of above B. Graphics

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 521

C. Balance B. Equal
D. Consistency C. Negative

PRACTICE BOOK» NOT FOR SALE


5. In Breshenham Line Drawing algorithm, D. A and C
the initial decision parameter P0 is
11. To undo the last change made to your
A. 2∆y + ∆x graphic design, the keys must be
B. ∆y − 2∆x used.
C. 2∆y − ∆x A. CTRL+D
D. ∆y − ∆x B. CTRL+Z
C. SHIFT+D
6. TIFF is the example of the
D. SHIFT+Z
A. Vector graphics
B. Bitmap graphics 12. qbasic was relesed in
C. Both a And b A. 1992
D. None B. 1989

7. Resolution is defined as what? ? C. 1944

A. Number of pixels per unit length D. 1991

B. Number of pixels on the screen 13. If point are expressed in homogeneous co-
C. Number of pixels in vertical direction ordinates then the pair of (x, y) is repre-
sented as
D. Number of pixels in horizontal direc-
tion A. (x’, y’, z’)
B. (x, y, z)
8. A is represented by a dot or square on
a computer monitor display screen. C. (x’, y’, w)
A. Vector D. (x’, y’, w)
B. Bitmap 14. Circle is represented using equation
C. Pixel A. f (x, y) = x2 + y2 r2
D. none of above B. f (x, y) = x2 + y2 + r2
9. The matrix representation for scaling in ho- C. f (x, y) = x2 + y2 r
mogeneous coordinates is D. f (x, y) = x2 + y2 + r
A. P’=S*P
15. A ploygon in which the line segment join-
B. P’=R*P ing any two points within the polygon lies
C. P’=dx+dy completely inside the polygon, is called
polygon.
D. P’=S*S
A. Convex
10. In Bresenham’s line algorithm, if the dis-
tances d1 < d2 then decision parameter Pk B. concave
is C. closed
A. Positive D. Complete

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 522

16. The formula for finding initial decision pa- C. line clipping
rameter p0 in Bresenham’s circle generat- D. curve clipping
ing algorithm
A. 1-R 22. RBG setting/mode are used for

B. 3-2R A. Printing

C. x2 + y2-R B. Setting up a print document

D. None of these C. Websites

NARAYAN CHANGDER
D. Red Green and Black monitor colors
17. is a free graphics editor. It is similar to the
Paint application but has some additional 23. path of a point
features such as support for transparency, A. Line
color balance and image rotation.
B. Shape
A. Kolour paint
C. Space
B. Pinta
D. Form
C. Paint
D. none of above 24. Primary colors
A. orange, blue, yellow
18. Which of the following is a technique to
blend two or more images to form a new B. red, violet, orange
image? C. orange, green, violet
A. Modeling D. yellow, red, blue
B. Morphing 25. What is a disadvantage of a bitmapped im-
C. Animation age?
D. Warping A. They don’t look as realistic as vector
graphics.
19. Which one is a photo shop file?
B. They are not as colourful.
A. .pbs
C. They have a small file size
B. .psf
D. They have a large file size because in-
C. .psd formation has to be stored about every
D. .pdx pixel

20. A pixel is 26. Graphics can be-


A. a sprite A. Simulation
B. the colors in an image B. Drawing
C. the smallest point on a digital image C. Movies, photographs
D. a collection of colors D. All of the above

21. Cohen-Sutherland clipping is an example of 27. Refers to the sharpness and clarity of an
image, measured in terms of ppi and dpi.
A. polygon clipping A. Resolution
B. text clipping B. Pixel

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 523

C. Quality 33. Which of this is compulsory for 2D reflec-


D. none of above tion.
A. Origin

PRACTICE BOOK» NOT FOR SALE


28. is a technique “used to determine the
B. Reflection axis
concentration of colored compounds in so-
lution C. Co-ordinate axis.
A. Colorimetry D. Reflection plane.

B. Color space 34. What are the default units for coordinates
in Graphics?
C. Chromatic Adaptation
A. inches
D. None of the above
B. pixels
29. If an image has a height of 2 inches and as- C. centimeters
pect ratio of 1.5, what will be its width
D. millimeters
A. 6
35. represent images through the use of
B. 3 geometric objects (lines, curves, etc)
C. 1.5 A. Fractal graphics
D. 0.75 B. Raster graphics

30. Which file format was designed to produce C. Graffiti


high-resolution vector graphics for print D. Vector graphics
that can be opened in any design editor?
36. A presentation showing the outlines of all
A. PNG edges in a transparent drawing called
B. BMP A. render
C. TIFF B. solid model
D. EPS C. wireframe
D. textured object
31. Typically create vector graphics, which use
mathematical formulas to represent image 37. Which one is the basic input device in GUI
content instead of pixels A. Mouse
A. Painting Program B. Graphics Tablet
B. Drawing Program C. Voice System
C. Image Editing Program D. Touch Panel
D. Audio Capture and Editing Program 38. are used to represent information, statisti-
cal data, or knowledge in a graphical man-
32. Higher number of pixels the image ner usually done in a creative way to at-
quality tract the viewer’s attention.
A. Bad A. Photoshop
B. Better B. Infographic
C. Smaller C. Info commercial
D. None of the above D. Information

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 524

39. Which transformation distorts the shape 44. Images used to enhance the appearance of
of an object such that the transformed a variety of projects, including drawings,
shape appears as if the object were com- photographs, cartoons, charts, and maps.
posed of internal layers that had been A. Graphics
caused to slide over each other?
B. Resolution
A. Scaling down
C. Pixels
B. Shearing
D. All of the above

NARAYAN CHANGDER
C. Scaling up
45. is combining parts of different images
D. Rotation to create a single image.
40. is memory (to save each pixel’s color A. Composite
& position for full image demonstration) B. Slice
A. CPU C. Filter addition
B. GPU D. Retouching
C. Monitor 46. What are the TWO main types of digital
D. Frame buffer graphics?
A. Vector and Graphites
41. If a 1024 x 768 image is to be resized to
one that is 640 pixels wide with the same B. Bitmap (raster) and Vector
aspect ratio, what would be the height of C. Bitmap (raster) and Graphites
resized image in pixels. D. Bits (maps) and Raster
A. 256
47. Which one is an Illustrator file?
B. 480
A. .il
C. 512
B. .ai
D. 856 C. .pdf
42. Which algorithm is a faster method for cal- D. .ia
culating pixel positions?
48. Which of the following is true about the
A. Bresenham’s line algorithm ‘paint’ method?
B. Parallel line algorithm A. can be called directly from your Java
program
C. Mid-point algorithm
B. automatically called in response to cer-
D. DDA line algorithm
tain messages
43. The following are the basic components of C. not the central drawing method for the
OpenGL, EXCEPT: application window
A. GLU D. none of these options are true
B. GLUT 49. GUI means
C. STDIO A. Graphical user Interface
D. GLX B. Graphical user Interaction

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 525

C. Graphical Uniform Interaction 55. Minimum number of vertices to make a


D. None face in polygon meshes is
A. 1

PRACTICE BOOK» NOT FOR SALE


50. We translate a two-dimensional point by
B. 2
adding
C. 3
A. Translation distances
D. 4
B. Translation difference
56. Brandon wants to create a vector graphic
C. X and Y
to use as a logo for his company. What ap-
D. Only a plication/program should Brandon use?

51. Initial decision parameter P0 in Mid Point A. Adobe Photoshop


Circle drawing algorithm is B. MSWord
A. P0=1-R C. Adobe Illustrator
B. P0=1-R2 D. Adobe InDesign

C. P0=1 + R 57. Which is not a type of 3D projection


D. P0= 1+R2 A. Perspective
B. Orthogrpahic
52. In breshnham line drawing algorithm, on a
line having m<1, if current point is (xi, yi) C. Isomorphic
and current decision parameter is <0, then D. Progressive
next point (xi+1, yi+1) will be
58. A bitmap or raster graph image is a grid
A. (Xi+1, yi+1) of individual
B. (Xi+1, yi) A. dots
C. (Xi, yi+1) B. pixels
D. (Xi, yi) C. bytes
D. numbers
53. John took a photo of a beach sunset while
on vacation. He wants to change the color 59. Which of the following is used to reverse
of the sky to a deeper blue. Which tool changes made to an image or shape in
will allow him to do so? graphics editing software?
A. Burn A. Deselect All
B. Color Replace B. History
C. Dodge C. Clear
D. Navigator
D. Clone Stamp
60. jpg is a
54. is used for detecting mouse motion.
A. 4 color high glossy photograph
A. Optical Sensor
B. type of machine language
B. Rollers on the bottom of mouse
C. free online editing tool
C. Both a and b D. file extension for a lossy compression
D. Sensor file

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 526

61. The two-dimensional rotation equation in 67. What do you do to select an icon?
the matrix form is A. Left click
A. P’=R*P B. Right click
B. P’=P+T C. Double click
C. P’=P*P D. Scrolled
D. P’=R+P
68. To set the background color, the following

NARAYAN CHANGDER
62. LCD means command is used:
A. Liquid Crystal Display A. glClearColor(r, g, b, alpha)
B. Liquid Crystal data B. glClear(GL COLOR BUFFER
BIT)
C. Liquid Chrome data
C. glBackColor(r, g, b)
D. None
D. glColor3f(r, g, b)
63. The hardware device contains
69. Drawing or painting programs that are
A. Color printer/Black white printer
specifically designed for touching up or
B. Plotters modifying images, such as original digital
C. Both a & b images and digital photos.

D. None A. Drawing Program


B. Painting Program
64. On raster system, lines are plotted with
C. Image Editing Programs
A. Lines
D. none of above
B. Dots
C. Pixels 70. The disadvantage of lineDDA is

D. None of the mentioned A. Time Consuming


B. Inefficient
65. What is the Photoshop keyboard shortcut
for-Transform C. Slow in execution

A. Ctrl + V D. None of the above

B. Ctrl + T 71. The basic attributes of a straight line seg-


C. Ctrl + D ment are

D. Ctrl + I A. Type
B. Width
66. The algorithm which displays line-type at-
tributes by plotting pixel spans is C. Color

A. Raster line algorithm D. All of these

B. Raster scan algorithm 72. A raster graphic


C. Random line algorithm A. is composed of pixels
D. Random scan algorithm B. looks like a rooster

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 527

C. images that are made of hundreds of C. Variety


thousands of tiny lines and curves (or D. Unity
paths) to create an image

PRACTICE BOOK» NOT FOR SALE


78. I have a rectangle defined by upper left
D. images that are made of hundreds of
corner (10, 12) and lower right corner (20,
thousands of tiny chicken feathers and
18). If I apply a scaling of sx=3 and sy=2
eggs (or yolks) to create a chicken
on the rectangle, the new value of lower
73. We can adjust the shape of the line ends to right corner will be
give them a better appearance by using A. (23, 20)
A. Line spacing B. (30, 24)
B. More dots C. (60, 54)
C. Line caps D. (13, 14)
D. Round cap 79. Which one of these would you use to cre-
ate bitmap graphics?
74. Computer graphics software allows the
A. Photoshop
user to create
B. Audacity
A. Pie graphs
C. Serif Drawplus
B. Bar graphs
D. Word
C. Line graphs
80. The Cartesian slope-intercept equation for
D. All of these a straight line is
75. TIFF files are best used for: A. y = m.x + b
A. Neither web publishing nor print pub- B. y = b.x + m
lishing. C. y = x.x + m
B. Web publishing only. D. y = b + m.m
C. Both Web and print publishing. 81. The is usually placed at the viewing-
D. Print publishing only. coordinate origin and the center of projec-
tion is positioned to obtain the amount of
76. Reflection about the line y=0, the axis, is perspective desired.
accomplished with the transformation ma-
A. view plane
trix with how many elements as ‘0’?
B. CVV
A. 8
C. Viewing Window
B. 9
D. None of the above
C. 4
82. Which image format is commonly used for
D. 6 digital photos, and Web and print publish-
77. refers to distance or closeness between el- ing?
ements that show the connection and con- A. Raster
vey the visual message. B. SVG
A. Emphasis C. Vector
B. Movement D. DRW

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 528

83. Several graphic image file formats that are 89. A positive value of the rotation angle
used by most of the graphic system are A. rotates an object in the clockwise di-
A. GIF rection
B. JPEG B. rotates an object in the counter-
C. TIFF clockwise direction

D. All of the above C. Both of the above


D. None of the above

NARAYAN CHANGDER
84. Which of the following is not a line-type?
A. Dashed line 90. Bitmap graphics is also called

B. Dark line A. Vector graphics

C. Dotted line B. Random graphics

D. Only (C) C. Raster graphics


D. None of these
85. What does GLUT stands for
A. opengl graphics Library 91. The process of repositioning an object
along a circular path is called-
B. opengl utility toolkit
A. Translation
C. opengl utility library toolkit
B. Rotation
D. none of above
C. Scaling
86. Lossy compression D. None of the above
A. is high quality compression of many
types of images 92. The Pen tool is a drawing tool in Illus-
trator. Which one do not belong?
B. pieces of your crushed camera
A. Free hand
C. reduces a file by permanently eliminat-
ing certain information B. Anchor point

D. is when a fat cat sits on a mouse C. Bezier curves


D. Raster
87. The highest RGB value is #FFFFFF, which
represents the colour: 93. What is the name for a picture element?
A. Black A. Pixel
B. White B. Dot
C. Blue C. Image
D. Red D. Colour Space

88. In which system, the Shadow mask meth- 94. Which one of the following is the primarily
ods are commonly used used output device?
A. Raster-scan system A. Video monitor
B. Random-scan system B. Scanner
C. Only b C. Speaker
D. Both a and b D. Printer

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 529

95. Pinta is a simple image editing software C. fillOval


but somehow more advanced when it D. drawPolygon
comes to features.

PRACTICE BOOK» NOT FOR SALE


A. yes 101. opengl function to set the window size
B. no A. glutinitwindowSize()
C. maybe B. gltinitwindowsize()
D. none of above C. glutInitWindowSize()
96. An area on a physical device to which a D. gluInitWIndowSize()
window is mapped is called a
102. What is the point on a path that indicates
A. Window a change of direction?
B. clip
A. Transform
C. Viewport
B. Square
D. Segment
C. Anchor Point
97. To slant an object along its horizontal or D. Handle
vertical axis.
A. Distort 103. What is the Clipping point of a line AB
where A(40, 40) and B is (60, 25) against
B. Skew
a window defined by (wxmin, wymin) as
C. Flip (10, 10) and (wxmax, wymax) as (50,
D. Reverse 50)
A. (50, 50)
98. is the science of measuring visible light
in units that are weighted according to the B. (50, 32.50)
sensitivity of the human eye C. (36.67, 32.50)
A. Colorimetry
D. (36.67, 36.67)
B. Photometry
104. Two successive rotations are
C. Chromatic Adaptation
D. None of the above A. Additive
B. Subtractive
99. The matrix representation for translation
in homogeneous coordinates is C. Inverse
A. P’=T+P D. Multiplicative
B. P’=S*P 105. Presentation graphics is used to
C. P’=R*P
A. create computer-aided designs
D. P’=T*P
B. produce high-quality graphs, charts,
100. Which of the following is NOT a valid and diagrams in order to present facts,
drawing method of the Graphics class? trends and comparisons
A. drawRect C. create animation
B. drawCircle D. all of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 530

106. Images created using a grid of small C. 3


squares called pixels, Also called raster im- D. 2
ages or pixel images. These images may
lose quality when resized larger. 112. Graphic artists designing for printing me-
A. Vector dia use vector-drawn objects because
B. Bitmap A. they can obtain more subtle variations
in shading than bitmap graphics
C. Both Vector and Bitmap
B. printing inks respond better to them

NARAYAN CHANGDER
D. None of the above
C. they can be converted across plat-
107. Which option is used to specify how the forms more easily
canvas is modified?
D. they can be printed in any size
A. Crop
113. Modify an object by either scaling, dis-
B. Anchor
torting, skewing, rotating, or flipping.
C. Cross Process
A. Group
D. Constrain Proportions
B. Fill
108. this uses several design elements to C. Edit
draw a viewer’s attention.
D. Transform
A. Emphasis
114. The device which is used to position the
B. Movement
screen cursor is
C. Variety
A. Mouse
D. Unity
B. Joystick
109. It refers to recording data on a recordable C. Data Glove
or rewritable DVD.
D. Both a and c
A. DVD Authoring Software
B. DVD Burning 115. Pixels are arranged in

C. Video Editing Software A. Rows

D. Audio and Editing Software B. Columns


C. Both rows and columns
110. Line can be represented by
D. They are scattered
A. One points
B. Two points 116. the visual weight of objects, texture, col-
ors, and space is evenly distributed on the
C. Three points screen. It may be in the form (Symmetrical
D. Four points and Asymmetrical)

111. How many methods of text clipping are A. Layout


there? B. Graphics
A. 5 C. Balance
B. 4 D. Consistency

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 531

117. is the rigid body transformation that C. movies


moves object without deformation. D. none of above

PRACTICE BOOK» NOT FOR SALE


A. Translation
123. A rectangular area in the view plane
B. Scaling which controls how much of the scene is
C. Rotation viewed.
D. None of these A. View window
B. Co-ordinate Window
118. Command used to combine multiple ob-
jects into one unit. C. Rectangular window
A. Transform D. Horizontal window
B. Skew 124. The quality or sharpness of an image,
C. Stroke usually measured in pixels per inch or pix-
els per centimeter.
D. Group
A. Resolution
119. Examples of graphics software are paint, B. Vector
Kolour paint and Pinta
C. Bitmap
A. yes
D. Pixels
B. no
C. maybe 125. When you are creating graphical images,
which technique can you use to control and
D. none of above manipulate elements individually?
120. How many megapixels in a 4000 x 3000 A. Opacity
pixel photo? B. Layers
A. 12 C. Shapes
B. 16 D. Transparency
C. 8
126. A bitmap is collection of that de-
D. 5 scribes an image.
121. The 4-bit code of the bottom-right region A. bits
in Cohen-Sutherland algorithm? B. colors
A. 0000 C. algorithms
B. 0010 D. pixels
C. 0110
127. If we translate a point (10, 15) by 4 and
D. 0101 6 respectively, the resultant point will be
122. Geometric patterns that are repeated at
small scales to generate irregular shapes A. (10, 15)
are called B. (16, 19)
A. applets C. (14, 19)
B. fractals D. (40, 90)

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 532

128. All of the following are true EXCEPT 133. Which of the following capabilities is not
A. Line art images are stored in the form supported by the Graphics class?
of data points A. drawing filled rectangles
B. No loss of image quality when resizing B. shifting the origin in the coordinate
a line art image frame
C. The file size of a line-image is bigger C. rotating the coordinate frame
than the same image in a bitmap file D. different font sizes

NARAYAN CHANGDER
D. A line art-image is also known as a 134. Which term is used to describe how solid
vector-drawn an object appears?
129. We want to save an animated logo with a A. Background
very low file size. We used color palette B. Opacity
of 256 colors.Which if the following file C. Clarity
format allows as to do that?
D. Resolution
A. png
135. The area inside a shape.
B. jpg
A. Fill
C. gif
B. Stroke
D. bmp
C. Align
130. When using a graphics editing program, D. Zoom
which option allows you to adjust the
136. If lighting is disabled, which function
space around an image?
specifies the color of the vertex?
A. Anchor points
A. glClearColor()
B. Constrain proportions B. glDisplayfunc()
C. Image Size C. glColor()
D. Canvas size D. None of These
131. The Cohen-Sutherland algorithm divides 137. What does glMaterialf( ) do?
the region into number of spaces. A. Turns material properties on.
A. 8 B. Defines the material properties of a
B. 6 drawn object for visual effects
C. 7 C. Switches to material mode to add vi-
sual effects.
D. 9
D. Gets the current material properties of
132. The object space or the space in which the a drawn object
application model is defined is called 138. What makes up a raster image?
A. World co-ordinate system A. Dots
B. Screen co-ordinate system B. Paint
C. World window C. Pixels
D. Interface window D. Pretzels

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 533

139. The division of the computer screen into B. Vector


rows and columns that define the no. of
C. Pixel
pixel to display a picture is called

PRACTICE BOOK» NOT FOR SALE


D. Kilobyte
A. Persistence
B. Resolution 145. When an object of a class derived from
C. Encapsulated Post script JPanel needs to repaint itself, which
method does it call?
D. None
A. paint(g)
140. Which of the following is the extension
B. repaint( )
of a vector image file obtained from Illus-
trator? C. paintComponent(g)
A. .JPEG D. repaintComponent( )
B. .AI
146. What is the name for an image made up
C. .PSD of calculated paths?
D. .DOC A. Vector
141. What is PPI B. Bitmap
A. Part Pixel Images C. Rasterising
B. Pixels Per Inch D. Pixelation
C. Pixels Per Image
147. What does a grey and white checker-
D. Part Picture Images board background mean?
142. RGB Stands for A. The image is broken.
A. Red, Green, Blue B. The background is gray and white.
B. Blue, Green, Blue C. The background is transparent.
C. Real, Green, Blue D. The image will display a white box
D. Reel, Grill, Blue around it.

143. program or collection of programs that al- 148. GUI stands for
lows computer users to do the following,
A. Graphics uniform interaction
create image files, draw and edit images
and manipulate graphic files B. Graphical user interaction
A. graphic software C. Graphical user interface
B. paint D. None of the above
C. MS paint
149. Circle is a
D. none of above
A. Eight way symmetric
144. A single tiny dot used as a unit of mea-
B. Four way symmetric
sure and to define images on a computer
screen. Short for picture element. C. Both a & b
A. Bitmap D. Either a or b

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 534

150. Which image format is most commonly C. Variety


used for logos, typography, fonts and il- D. Unity
lustrations?
A. Raster 156. what does pset stands for

B. Vector A. pixel set

C. JPEG B. phone set

D. Bitmap C. camera set

NARAYAN CHANGDER
D. none of these
151. According to 8 Octant symmetry rule,
Which of the following will be a point in 157. Types of Computer Graphics are
5th octant corresponding to given point P A. Vector and raster
(a, b) in 1st octant of circle.
B. Scalar and raster
A. (a, -b)
C. Vector and Scalar
B. (-a, -b)
D. None of these
C. (b, a)
158. An area in design that may appear dif-
D. (-a, b)
ferent in size, texture, shape, or color to
152. Following is the Interpolating Curve attract the viewer’s attention.
A. Bezier Curve A. Emphasis
B. Hermite Curve B. Movement
C. Exponential Curve C. Balance

D. Direct Curve D. Consistency

153. The navigator bar allows you to: 159. In which 3D projection, Lines parallel to
the projection plane normal are halved
A. Move around the screen
A. Cavalier
B. Change from color to black and white
B. Cabinet
C. Change the brightness of the screen
C. Isometic
D. Zoom in and out on the image
D. Trimetric
154. What is the Photoshop keyboard shortcut
160. Transformations can be applied on
for-Deselect All
A. Objects
A. Ctrl + A
B. Co-ordinates
B. Ctrl + D
C. Both Objects and Co-ordinates
C. Ctrl + C
D. None of the options
D. Ctrl + V
161. Amir is searching on his computer for a
155. refers to the relative size and scale of the file that he created and saved in Pixlr’s na-
various elements in a design. tive file format. Which type of file should
A. Emphasis he be searching for?
B. Proportion A. PSD

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 535

B. PXD 167. Number of control points in parametric cu-


C. PDF bic curve is

PRACTICE BOOK» NOT FOR SALE


D. EPS A. 6
B. 9
162. is dedicated to producing vector-
C. 12
based line art easily printed to paper at
high resolution. D. 4
A. Drawing software 168. In line clipping, the portion of line which is
B. Word processing software of window is cut and the portion that
is the window is kept.
C. Web Authoring software
A. outside, inside
D. Printing software
B. inside, outside
163. A temporary storage area in your com- C. exact copy, different
puter’s memory where data that has been
cut or copied is stored until it is pasted in D. different, an exact copy
a new location. 169. Viewing in 3D involves the following con-
A. Storage siderations:
B. Hard Disk Drive A. In front of an object
C. Clipboard B. Behind the object
D. Desktop C. In the middle of a group of objects
D. All of the above
164. Inside the frame buffer the image is
stored as a pattern of digital numbers 170. Which vertex of the polygon is clipped
A. Octal first in polygon clipping?
B. Binary A. top right
C. Hexadecimal B. bottom right
D. Decimal C. bottom left
D. top left
165. line(10, 10, 100, 10); produce a line
A. vertical 171. Which term describes the arrangement or
placement of image layers in a graphics
B. slant program?
C. Horizontal A. Layer visibility
D. All the above B. Opacity
166. Mapping the world co-ordinates into C. Transpanency
physical device co-ordinates is called D. Stacking Order
A. Translation
172. There is a coating on the inside of every
B. Homogenous coordinates CRT.
C. Coordinates Transformation A. Nitrogen
D. Viewing Transformation B. Phosphorous

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 536

C. Hydrogen C. JPG
D. Mixture of all three D. TIFF
173. What is another name for Bitmap? 179. In graphical system, the array of pixels
A. Dotmap in the picture are stored in:
B. Vector A. Memory
C. Raster B. Frame buffer

NARAYAN CHANGDER
D. Flat File C. Processor
174. Which one of these is a fact about Vector D. All of the mentionedSHOW ANSWER
graphics?
A. They lose quality as they get larger 180. Computer Graphics displays the informa-
tion in the form of
B. They are made of pixels
A. Charts
C. They are small in file size
B. Graphs
D. They are realistic
C. Diagrams
175. Graphics created using lines and curves
defined by mathematical formulas. D. All of the above
A. Bitmap images 181. Raster Graphics Are Composed Of?
B. Vector images A. Paths
C. Both Bitmap and Vector
B. Palette
D. None of the above
C. Pixels
176. ) is the science of measuring light in D. None Of These
any portion of the electromagnetic spec-
trum. 182. In the initgraph() mode is related to
A. Colorimetry A. path
B. Photometry
B. resolution
C. Chromatic Adaptation
C. Both a and b
D. Radiometry
D. all of the above
177. Display card are
183. John has to create vector graphics that
A. VGA
can be opened by all of his clients, no mat-
B. EGA ter which design editors their companies
C. Both a & b use. Which file format should he use to
make sure they can all open his files?
D. None of the above
A. EPS
178. Which of the following is considered a
vector image file format? B. BMP
A. SVG C. TIFF
B. GIF D. PNG

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 537

184. The point that remains fixed during a ro- 190. Pixlr is
tational transformation is
A. a movie company

PRACTICE BOOK» NOT FOR SALE


A. Lower left corner of an object
B. a free online image editor
B. Origin of the Co-ordinate system
C. a type of drawing
C. All points of the object
D. a unit of compression
D. None of the above

185. An ellipse can also be rotated about its 191. What is the smallest, most basic unit
center coordinates by rotating that nearly all computer graphics are made
from?
A. End points
A. Voxels
B. Major and minor axes
B. Pixies
C. Only A
D. None C. Pixels
D. Blobs
186. With what arguments(s) is the setColor
method of the Graphics class called? 192. When using Photoshop, each new image
A. a Color object is on a separate
B. three integers (red, green, blue com- A. File
ponents of a color)
B. Tool
C. a BasicStroke object
C. Layer
D. a Paint object
D. Filter
187. also known as Microsoft Paint
A. paint 193. What is an advantage of a vector im-
age?
B. Kolour paint
A. Images can be scaled up or down with
C. pinta no loss of quality
D. none of above
B. Individual pixels can be changed,
188. TIFF(Tagged Image File Format) are used which makes very detailed editing pos-
for sible
A. Vector graphics C. They have a large file size
B. Bitmap D. They look real
C. Both a & b
194. Which is the best line algorithm to bal-
D. None of these ance the processing load among the pro-
cessers?
189. A line drawn in the background color is
A. Visible A. Parallel line algorithm

B. Invisible B. DDA line algorithm


C. Visible or Invisible C. Bresenham’s line algorithm
D. Only b D. Position Bresenham’s line algorithm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 538

195. The centre region of the screen and the 201. which opereator are used comparetwo
window can be represented as values at the same time
A. 0000 A. relational
B. 1111 B. logical
C. 0110 C. arthimetic
D. 1001 D. none of the these
202. A line can be represented by

NARAYAN CHANGDER
196. Which program is an example of graphics
editing software? A. One point
A. Google Slides B. Two points
C. Three points
B. Google Docs
D. Four points
C. Microsoft Outlook
D. Adobe Photoshop 203. What happens if the values of scaling fac-
tors sx and sy less than 1 (i.e., sx<1 and
197. A vector image is created using sy<1)?
A. coloured pixels. A. No change in the object’s size
B. dots. B. Reduce the object’s size
C. mathematics formulas. C. Increase the object’s size

D. images. D. None of the above


204. We want to separate different elements
198. Full Form of DDA is of an image. This will allow us to work
A. Data Differential analyzer easily on the selected element without
B. direct differential Analyzer spoiling the other elements. Where should
we put each element?
C. digital differential analyzer
A. Separate layers
D. Data difference analyzer
B. Separate files
199. In midpoint circle generating algorithm, If C. Separate frames
your current decision parameter pk < 0, D. none of above
then pk+1 is
205. What font styles do Java fonts support?
A. pk + 2(xi+1) + 1
A. plain only
B. pk + 2(xi+1) + 1-2(yi+1)
B. plain and bold only
C. pk + 2(yi-1) + 1
C. plain, bold, and italic only
D. pk + 2(xi+1)-1
D. plain, bold, italic, and bold+italic
200. JPEG and GIF are what type of format? 206. To change the size of an object.
A. Raw A. Skew
B. Lossy B. Scale
C. Lossless C. Distort
D. Vector D. Crop

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 539

207. Two successive translations are a) b) 213. A rectangular border around an image,
c) d) shape, or text that you can drag to rotate
or resize.

PRACTICE BOOK» NOT FOR SALE


A. Subtractive
B. Additive A. Bounding Box
C. Inverse B. Square
D. Multiplicative C. Transform
208. Origin for object co-ordinate is D. Clipboard
A. Top Left
214. Which type of image file is constructed by
B. Bottom Left a series of pixels to form an image?
C. Top Right A. Vector
D. Bottom Right
B. PDF
209. The glow given off by the, phosphor C. Raster
during exposure of the electron beam is
known as what? ? D. SVG
A. Fluorescence 215. Which tool is used to rotate and resize an
B. Phosphorescence image or shape in a graphics editing pro-
C. Persistence gram?
D. None of the above A. Move

210. The quantity of an image depends on B. Free Distort

A. No. of pixels used by image C. Crop


B. No. of line used by image D. Free Transform
C. No. of resolution used by image
216. Grey Scale images have maximum color
D. None depth of
211. To reverse an image either horizontally A. 8-bit
or vertically.
B. 16-bit
A. Distort
C. 24-bit
B. Skew
D. 32-bit
C. Flip
D. Rotate 217. Aspect ratio means
212. black and white (binary) image color A. Number of pixels
depth equal B. Ratio of vertical points to horizontal
A. 1 bit points
B. 4 bits C. Ratio of horizontal points to vertical
C. 8 bits points
D. 24 bits D. Both b and c

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 540

218. The electron beam is swept across the C. World window


screen, one row at a time from top to bot- D. Interface window
tom in
A. Random scan system 224. If both codes are 0000, (bitwise OR of
the codes yields 0000) line lies the
B. Both of these
window.
C. Raster scan system
A. completely outside
D. None of these

NARAYAN CHANGDER
B. half inside half outside
219. The graphics can be C. completely inside
A. Drawing D. can’t say anything
B. Photograph, movies
225. To change the height or width of an ob-
C. Simulation ject without retaining the original propor-
D. All of these tions.

220. Virtual reality, CAD, and animations are A. Skew


the application of B. Crop
A. Z Mouse C. Align
B. Digitizers D. Distort
C. Data tablets
226. Which of the following co-ordinates are
D. Image Scanner NOT used in 2d viewing transformation?
221. Which of the following equation is used A. modelling co-ordinates
in 2D translation to move a point(x, y) to B. vector co-ordinates
the new point (x’, y’)?
C. viewing co-ordinates
A. x’ = x + ty and y’ = y + tx
D. device co-ordinates
B. x’ = x-tx and y’ = y-ty
C. x’ = x + tx and y’ = y + ty 227. Which display devices allows us to walk
around an object and view it from differ-
D. x’ = x + tx and y’ = y-ty
ent sides
222. Which of the following is NOT correct? A. Direct view storage tubes
(A, B and C are matrices)
B. Three-dimensional devices
A. 1.A = A.1
C. Flat panel display devices
B. C(A+B) = C.A + C.B
D. Plasma panel display devices
C. A.B.C = (A.B).C = A.(B.C)
D. A.B = B.A 228. what means cls
A. clear screen
223. The object space or the space in which the
application model is defined is called B. tri angle screen
A. World co-ordinate system C. very nice
B. Screen co-ordinate system D. i dont know

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 541

229. What is photo compression? 235. Which image file format is a large raster
A. Reducing a picture’s file size file that is used when saving photographs
for print only?

PRACTICE BOOK» NOT FOR SALE


B. Reducing the height of a picture
A. PNG
C. Cropping a picture
B. TIFF
D. Making the camera smaller
C. JPEG
230. In computer graphics, pictures or graph- D. GIF
ics objects are presented as a collection of
discrete picture elements called 236. Aspect Ratio can be defined as-
A. Dots A. The ratio of the vertical points to hori-
B. Pixels zontal points
C. Coordinates B. of pixels
D. Points C. Both (a) & (b)
D. None of the above
231. The number of pixels stored in the frame
buffer of a graphics system is known as 237. Which one is an image format?
A. Resolution A. .docx
B. Depth B. .html
C. Resalution C. .jpg
D. Only a D. .pdf
232. To pivot an object around its center 238. Clipping in computer graphics is primarily
point. used for
A. Skew A. zooming
B. Flip B. copying
C. Transform C. removing objects and lines
D. Rotate D. All of the above
233. What does the ‘b’ represent in the fol- 239. The process of elimination of parts of a
lowing method call:g.drawOval(a, b, c, d); scene outside a window or a viewport is
A. the x value starting position called
B. the y value starting position A. clipping
C. the width of the rectangle B. editing
D. the height of the rectangle C. plucking
D. cutting
234. To cut or remove unwanted portions of
an image. 240. Paint was released in Novermber 1985.
A. Distort A. yes
B. Crop B. no
C. Skew C. maybe
D. Flip D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 542

241. There are 2 main categories of computer 247. Lighting and shading of the object to
graphics: make it look real called
A. Sharp graphics and fuzzy graphics A. rendering
B. GPEG and GIF B. shadowing
C. Raster graphics and bitmaps C. solid modeling
D. none of above D. texturing

NARAYAN CHANGDER
242. allows screen positions to be selected 248. By default, graphics coordinates in Java
with the touch of a finger. have the origin (0, 0) in the corner of
the drawing area.
A. Touch panels
A. upper-left
B. Image Scanner
B. upper-right
C. Light Pen
C. lower-left
D. Mouse
D. lower-right
243. Expansion of line DDA algorithm is
249. Intensity of the electron beam is con-
A. Digital difference analyzer trolled by setting voltage levels on the
B. Direct differential analyzer A. Control grid
C. Digital differential analyzer B. Focusing system
D. Data differential analyzer C. Deflection system
D. Phosphorous
244. The most commonly used input device is
A. Mouse 250. In mirror reflection transformation from
Y-axis, the point co-ordinate that remains
B. Keyboard same is
C. Scanner A. x-value
D. Printer B. y-value
245. The action of adjusting the magnification C. nothing is fixed
of a file by a percentage of its actual size. D. both are fixed
A. Zoom
251. Which choice lists common tools from
B. Distort graphics programs that are examples of
C. Fill blending tools?

D. Transform A. Spot Heal, Bloat, Pinch


B. Erase, Gradient, Drawing
246. what is Euler’s Formula
C. Magic Wand, Lasso, Marquee
A. V-E-F=2
D. Blur, Dodge, Sharpen
B. V+E-F=2
252. is used for deleting or rearranging
C. V+E+F=0 scenes, adding voice-overs, and adding
D. V-E+F=2 other special effects

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 543

A. Painting Program 258. Name different polygon filling algo-


rithms
B. Drawing Program

PRACTICE BOOK» NOT FOR SALE


A. Flood fill algorithms
C. Image Editing Program
B. Boundary fill algorithms
D. Video Editing Software
C. Both a & b
253. Which devices provides positional infor-
D. None of the above
mation to the graphics system?
A. Input devices 259. What is the Photoshop keyboard shortcut
for-Copy
B. Output devices
A. Ctrl + V
C. Pointing devices
B. Ctrl + D
D. Both a and c
C. Ctrl + B
254. Producing computer-generated drawings D. Ctrl + C
is called
260. CG stands for ?
A. CAD
A. Common Games
B. CAM
B. Computer Graphics
C. CIM
C. Computer GUI
D. GPS
D. Creative GUI
255. Which one of these would you use to cre-
ate vector graphics? 261. Center of Projection is where

A. InDesign A. Projection lines converge


B. Axis lines converge
B. Photoshop
C. Perpendicular line converge
C. Fireworks
D. Parallel line converge
D. Illustrator
262. gd parameter in initgraph() method
256. The components of Interactive computer
means
graphics are-
A. Graphic Display
A. A monitor
B. Graphic Density
B. Display controller
C. Graphic Driver
C. Frame buffer
D. Graphic declaration
D. All of the above
263. The line used to draw an object. The
257. In LCD, the refresh rate of the screen is: outer edge of a shape.
A. 60 frames/sec. A. Fill
B. 80 frames/sec. B. Selection
C. 30 frames/sec. C. Stroke
D. 100 frames/sec. D. All fo the aboe

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 544

264. What does the ‘c’ represent in the follow- 269. is a commonly used method of lossy com-
ing method call:g.fill3DRect(a, b, c, d, e); pression for digital images.
A. the x value starting position A. png
B. the y value starting position B. jpg
C. bmp
C. the width of the rectangle
D. psd
D. the height of the rectangle
270. To design everything from aeroplanes to

NARAYAN CHANGDER
265. The basic geometric transformations are consumer products specialists use
A. Translation A. ACD
B. Rotation B. DAC
C. CAD
C. Scaling
D. CDA
D. All of the mentioned
271. An outcode can have bits for two-
266. What should be done to rotate around a dimensional clipping and bits for three-
point that is not the origin? dimensional clipping.a) b) c) d)
A. Translate to origin, rotate about origin, A. 6, 8
then translate back to original position B. 2, 4
B. Rotations can only be performed C. 4, 6
around the origin. D. 1, 3
C. Perform a glRotate and specify the 272. I want to draw a pattern that has a verti-
point to rotate around cal symmetry, I can use the concept of
D. none of above to draw it in a easy way.
A. Rotation transformation
267. Mary is creating a memory book for her
B. Translation transformation
friend’s birthday. Which file type should
she use to print the pictures? C. Mirror Reflection from X-axis
A. SVG D. Mirror Reflection from Y-axis

B. DRW 273. Which option is used as a filter?

C. Raster A. Resize
B. Crop
D. Vector
C. Dry Brush
268. On a black and white system with one D. Brighten
bit per pixel, the frame buffer is commonly
called as 274. can be used to determine the position
on the data tablet.
A. Pix map
A. Strip microphones
B. Multi map B. Signal strength
C. Bitmap C. Coded pulse
D. All of the mentioned D. Either Signal strength or coded pulse

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 545

275. The most popular file format for exchang- C. DRW


ing vector drawings is D. AI

PRACTICE BOOK» NOT FOR SALE


A. GIF
281. home many columns are there in graphic
B. EPS
mode 7
C. TIF
A. 320
D. GPEG
B. 260
276. What is it called when a picture is C. 90
stretched and the image becomes blurry /
distorted? D. 50

A. Rasterisation 282. are visual images or designs that include


B. Blurring a pictorial representation of data, typeset-
ting, and graphic arts. Images that are
C. Faded generated by a computer are called com-
D. Pixelation puter graphics.

277. The seed fill algorithm for filling polygon A. Layout


is classified as fill algorithm and B. Graphics
fill algorithm.
C. Balance
A. Even, Odd
D. Consistency
B. Boundary, Scan
C. Flood, Boundary 283. simple computer graphics program that
has been included in all versions of Mi-
D. Edge, Flood crosoft Windows.
278. To generate the characters, which are re- A. Paint
quired B. Kolour paint
A. Hardware
C. pinta
B. Software
D. none of above
C. Both a & b
284. CMYK stands for..
D. None of these
A. Cyan, Magenta, Yellow, Blue
279. CRT means
B. Cyan, Magenta, Yellow, Black
A. Cathode Ray Tube
C. Color Makes You Blue
B. Common Ray Tube
D. Cedar, Mustard, Yellow, Black
C. Control Ray Tube
D. None of these 285. What is DPI?
A. Dots Per Image
280. Which image format would be most likely
to be used for web and print publishing? B. Dots Per Inch
A. JPEG C. Digital Picture Image
B. SVG D. Digital Picture Information

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 546

286. In a reflection, by how much angle is the C. Balance


object rotated? D. Consistency
A. 45 degree
292. Which of the following is not transform-
B. 180 degree ing an image?
C. 90 degree A. Scale
D. 360 degree B. Rotate

NARAYAN CHANGDER
287. CAD stands for- C. Flip
A. Computer art design D. Zoom
B. Computer-aided design 293. An accurate and efficient raster line-
C. Car art design generating algorithm is
D. None of the above A. DDA algorithm
B. Mid-point algorithm
288. PNG is a
C. Parallel line algorithm
A. Image format
D. Bresenham’s line algorithm
B. High-level programming language
used to make mobile applications, or apps 294. Technically refers to any application that
contains more than one type of media, but
C. Coding festival is often used to refer to audio and video
content.
D. Internet meme
A. Graphics
289. Which of these file types is best for print- B. Multimedia
ing photographs?
C. Vector
A. TIFF
D. Bitmap
B. PNG
295. which number is green
C. BMP
A. 2
D. EPS
B. 3
290. Which of the following is a computer
C. 4
based presentation technique?
D. 5
A. Slides
B. Tutorial 296. The following are features in a painting
or drawing software EXCEPT
C. Multimedia
A. Support for third-party special-effect
D. Data processing
plug-in
291. It is the process of planning and arrang- B. Lathe and extrude features
ing graphics that deals in the arrangement C. Ability to paint with patterns and cli-
of visual elements on a page. part
A. Layout D. Ability to pour colour, pattern or gradi-
B. Graphics ent into any area

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 547

297. Traditionally create bitmap images, C. maybe


which are created by coloring the individ- D. none of above
ual pixels in an image.

PRACTICE BOOK» NOT FOR SALE


A. Painting Program 303. Drawing of number of copies of the same
image in rows and columns across the in-
B. Drawing Program
terface window so that they cover the en-
C. Image Editing Program tire window is called
D. Audio Capture and Editing Software A. Roaming
298. Center of Projection in Parallel projection B. Panning
A. is at finite distance C. Zooming
B. is at infinite distance D. Tiling
C. is at same distance of actual object 304. Trackball is
D. is near than the actual object
A. Two-dimensional positioning device
299. Computer animation is the art of B. Three-dimensional positioning device
A. creating moving images via the use of C. Pointing device
computers
D. None of the mentioned
B. drawing pictures
C. formatting images 305. When an image is saved as a JPG, all lay-
ers contained in the image are merged. In
D. saving images other words, the image is:
300. Any convenient co-ordinate system or A. ancored
Cartesian co-ordinates which can be used B. imported
to define the picture is called
C. exported
A. spherical co-ordinates
D. flattened
B. vector co-ordinates
C. viewport co-ordinates 306. A heavy line on a video monitor could be
displayed as
D. world co-ordinates
A. Adjacent perpendicular lines
301. A bitmap is a
B. Adjacent parallel lines
A. raster graphic
C. Both a and b
B. a vector graphic
D. Neither a nor b
C. pixel
D. a dot 307. Raw, BMP and PNG are what type of for-
mat?
302. Pinta supports image layers, which is
A. Lossy
a feature of more sophisticated graphics
software. B. Vector
A. yes C. Lossless
B. no D. Raw

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 548

308. You have just completed a course about C. Viewing Window


graphics software and you are excited to D. View Volume
use your new skills. For which task can
you use graphics software? 314. In mid point line algorithm, if current se-
A. Designing a logl lected point is (Xp+1, yp) then what will
be the next mid point
B. Spreadseets
A. (Xp+1, Yp+1/2)
C. Slide show creation
B. (Xp+2, Yp+1/2)

NARAYAN CHANGDER
D. word processing
C. (Xp+2, Yp+3/2)
309. Raster Graphics composed of
D. (Xp+1, Yp+3/2)
A. Pixels
B. Paths 315. To apply the midpoint method, we define

C. Palette A. circle(x, y)= x2+ y2-r2

D. None of these B. circle(x, y)= x+ y2-r2


C. circle(x, y)= x2-y2-r2
310. drawing and editing program that is sim-
ilar to Paint. D. circle(x, y)= x2+ y2-z2
A. pinta 316. Which image files are a lossy format?
B. paint A. GIF
C. Kolour paint B. MPG
D. none of above C. JPG
311. If the boundary is specified in a single D. PNG
color, and if the algorithm proceeds pixel
by pixel until the boundary color is encoun- 317. The screen coordinates start from:
tered is called A. top right
A. Scan Line Algorithm B. bottom right
B. Flood Fill Algorithm C. top left
C. Boundary Fill Algorithm D. bottom left
D. None of the above
318. Vanishing point is where
312. Pixel mask means A. Perpendicular Lines seem to converge
A. A string containing only 1;s
B. A string containing only 0’s B. Parallel lines seem to converge
C. A string containing 1 and 0 C. Origin
D. A string containing 0 and 0 D. Center of Projection

313. formed by the view window and the 319. What is the use of homogeneous coordi-
type of projection to be used. nates and matrix representation?
A. view plane A. To scale
B. CVV B. To rotate

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.15 Computer graphics 549

C. To treat all 3 transformations in a con- C. Viewing Transformation


sistent way D. None of the above

PRACTICE BOOK» NOT FOR SALE


D. To shear the object
325. For a point to be clipped, which of the fol-
320. It is the human visual system’s abil- lowing conditions must be satisfied by the
ity to adjust to changes in illumination in point?
order to preserve the appearance of object
A. ywmin = y = ywmax
colors.
B. xwmin > x > xwmax
A. Colorimetry
B. Color space C. xwmin = x = xwmax

C. Chromatic Adaptation D. xwmin < x < xwmax

D. None of the above 326. cubic bezier curve is example of


321. What is the dimensions of a 3D transfor- A. Approximating Curve
mation matrix B. Interpolating Curve
A. 2x2 C. Smooth Curve
B. 4x4 D. Exponential Curve
C. 3x3
327. Position of an object horizontally or ver-
D. 3x4 tically relative to the top, bottom, left, or
322. Multimedia is right of the publication area.

A. “art” made by a five year old kid A. Scale


B. Facebook, Twitter, and Instagram B. Flip
C. an image extension commonly used C. Align
for combining multiple images together D. Rotate
for presentations and slideshows
328. Clipart is
D. audio, video, and images
A. Any image found on the www(world
323. Small rectangles that are displayed wide web) that look cool.
around the edges of the current or selected
object. B. Art that has been photoshopped and
cropped.
A. Select Tools
C. Lots of images/pictures imported into
B. Selection Handles a document
C. Transform D. black & white line drawings of paper
D. Clipboard clips
324. The system is used in graphics pack- 329. RGB model is used for
ages as a reference for specifying the ob-
A. Computer Display
server viewing position and the position
of the projection plane. B. Printing
A. viewing-coordinate system C. Painting
B. CVV D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 550

330. Which image file format should be used B. TIFF


to save an image with a transparent back-
ground for use on a Web page? C. BMP
A. PNG D. JPEG

1.16 machine learning


1. Single linkage is the process of finding the B. Build problems, learns and understand

NARAYAN CHANGDER
distance between the members of the language.
two clusters. C. Build emotions, language and under-
A. farest stands mathematical problems.
B. closest D. Create a robot friend for every fifth
C. average grader

D. mean 6. It is a device module, or system used in


electronic gadgets and materials to detect
2. Which feature of Amazon SageMaker can events and changes.
you use to learn patterns in data?
A. Electrons
A. SageMaker notebook instances
B. Motor
B. SageMaker training jobs
C. Sensor
C. SageMaker hyperaparameter tuning
D. detector
D. SageMaker endpoints
7. What is the type of Supervised Learning?
3. In Bagging integrated learning, what is the
relationship between each base learner? A. Classification

A. Additive relationship B. Declassification

B. Correlation C. Progression

C. The latter model must be built on top D. Regression


of the previous model 8. list 1 = [2, 3, 4, 5]list 1.insert(2,
D. Independent 12)print(list 1). What is the Output?

4. Which term is defined as:”IT makes the A. [2, 12, 3, 4, 5]


computation of multi-layer neural network B. [12, 2, 3, 4, 5]
feasible” C. [2, 3, 12, 4, 5]
A. Machine Learning D. [2, 3, 12, 4, 5, 6]
B. Deep Learning
9. category
C. Artificial Intelligence
A. text in machine learning.
D. Artificial Narrow Intelligence
B. A group of people or things having
5. The purpose of AI is to something in common
A. Build computer programs that exhibit C. decides whether certain statements
intelligent behavior need to be executed or not

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 551

D. a type of code used with if/else state- A. 1 and 2


ments B. 2 and 3

PRACTICE BOOK» NOT FOR SALE


10. Which ONE of the following are regression C. 1 and 3
tasks
D. 1, 2 and 3
A. Predict the age of a machine
B. Predict the OEM from where the ma- 15. A value that defines the step taken at each
chine has been purchased iteration, before correction?

C. Predict whether a component of the A. Gradient descent


machine will fail in the next 2 weeks B. learning rate
D. Predict whether an operating mode re- C. l2 regularization
lates to a specific machine
D. l1 regularization
11. If we want to create a model of neural net-
work that can identify whether you are 16. Which of these does NOT use machine
wearing a mask or no, what is the ideal learning/AI?
number of output that we should create? A. Self-driving cars
A. 1 B. SIRI/Alexa
B. 2 C. Sonos wireless speakers
C. 3 D. facial recognition on your phone
D. none of above
17. What two types of Neural Networks are
12. What type of Machine Learning Algorithm there
is suitable for predicting the continuous de-
A. Biological Neural network and Artifi-
pendent variable?
cial Neural Network
A. Logistic Regression
B. Chemical Neural Network and Biologi-
B. Linear Regression cal Neural Network
C. Decision Tree Classifier C. Geological Neural Network and Artifi-
D. KNN Classifier cial Neural Network

13. In which phase of the ML pipeline do you D. Chemical Neural Network and Geolog-
analyze the business requirements and ical Neural Network
re-frame that information into a machine
18. It is a type of machine learning where
learning context.
an agent is put in an environment and he
A. Problem formulation learns to behave in this environment by
B. Model training performing certain actions and observing
the rewards which it gets from those ac-
C. Deployment
tions.
D. Data preprocessing
A. Supervised Learning
14. PCA works better if there is? (i) A linear B. Unsupervised Learning
structure in the data(ii) If the data lies on a
curved surface and not on a flat surface(iii) C. Reinforcement Learning
If variables are scaled in the same unit D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 552

19. This is an intermediate layer between in- C. Neuron


put and output layer and place where all D. Neural network
the computation is done.
A. Input 25. what is the technical term for adding up a
process
B. Hidden Layer
C. Output A. linear combination

D. none of above B. combination

NARAYAN CHANGDER
C. variable combination
20. Half ranking can be added in
D. deep learning
A. Feature tree
B. Scoring and Ranking 26. Which term is defined as:”subfield of com-
C. class probability estimation puter science aimed at the development of
computers capable of doing things that are
D. None normally done by people”
21. Which is true about Random Forest (RF) A. Machine Learning
A. RF completely a different machine B. Deep Learning
learning technique
C. Artificial Intelligence
B. RF combines multiple decision trees to
make a decision D. Artificial Narrow Intelligence

C. RF cannot handle continuous data 27. Which of the following does not belong su-
D. none of above pervised learning?
A. Linear Regression
22. Support vector machine may be termed
as: B. Decision Trees
A. Maximum apriori classifier C. Isolation Forest
B. Maximum margin classifier D. Random Forests
C. Minimum apriori classifier
28. Which one of these is not an area of AI?
D. Minimum margin classifier
A. computer vision/image recognition
23. Which of these are not displayed when you B. voice recognition
see the import data result visualization?
C. web design
A. Unique values
D. robotics
B. Missing values
C. Standard deviation 29. When updating your weights using the
D. Mode loss function, what dictates how much
change the weights should have?
24. A basic unit of the brain, a cell designed to
A. Batch size
send information to other nerve cells, mus-
cle, or gland cells. B. Learning rate
A. Algorithm C. Initial weights
B. Machine learning D. Bias term

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 553

30. All data is labeled and the algorithms learn C. nucleus


to predict the output from the input data
D. axon

PRACTICE BOOK» NOT FOR SALE


A. Dataset
B. supervised learning 36. A major benefit of an machine with AI is

C. Classifiers A. it could do a job too dangerous for a


human
D. unsupervised learning
B. it could love you like a brother
31. the process of making the system able to
learn. C. it could chop up your vegetables

A. Training D. none of above


B. Labeling 37. Regression is a case of which type of ML?
C. Testing A. Supervised
D. Classifying
B. Unsupervised
32. Machine Learning has various function rep- C. Reinforced
resentation, which of the following is not
function of symbolic? D. Deep learning
A. Decision Trees 38. someone can use the data to make pre-
B. Rules in propotional Logic dictions, describe some process or solve a
C. Hidden-Markov Models (HMM) problem

D. Rules in first-order predicate logic A. machine learning


B. big data
33. Automatic recognition of patterns in data
(text, handwriting, images, sound and C. usable data
video) D. useful data
A. Recognition
B. Training 39. If I am using all features of my dataset
and I achieve 100% accuracy on my train-
C. Predictive models ing set, but 70% on validation set, what
D. Testing should I look out for?

34. This works like a human’s brain and it’s A. Overfitting


what causes the computer to function like B. Underfitting
a human.
C. Bestfitting
A. facial recognition
D. none of above
B. supervised learning
C. expert system 40. what is overfitting
D. neural network A. creating too little examples

35. The fundamental unit of network is B. creating too many examples


A. brain C. not creating examples
B. neuron D. non of the examples where recognized

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 554

41. Which of these is not one of the three lay- D. recording information in machine
ers used in machine learning models? learning
A. input
47. is responsible for 2D structures
B. hidden
A. Numpy
C. output
D. activation, hidden, and output B. panda
C. matplotlib
42. Accurate Data

NARAYAN CHANGDER
A. information that isn’t always precise D. sklearn
B. information must be precise 48. In a Decision Tree Leaf Node represents
C. an educated guess
D. test the accuracy of your model A. One of the Class Label
43. Machine Learning is a branch of.. B. One of the complete observation
A. AI C. One of the attribute
B. Java D. None of the Mentioned
C. c
D. c++ 49. Which model is the best choice for fraud
detection?
44. is a branch of machine learning that
A. Precision = 0.8, Recall = 0.4
uses data, loads and loads of data, to
teach computers how to do things only hu- B. Precision = 0.4, Recall = 0.8
mans were capable of before.
C. Precision = 0.7, Recall = 0.7
A. Supervised Learning
D. none of above
B. Deep Learning
C. Unsupervised Learning 50. When preparing the dataset for your ma-
D. none of above chine learning model, you should use one-
hot encoding on what type of data
45. What year did Deep Learning break-
A. Continuous
throughs drove A.I. (Artificial Intelligence)
boom? B. Ordinal
A. 2010 C. Nominal
B. 2009 D. Numerical
C. 2001
D. 2008 51. The following is NOT an example of Re-
gression Problem
46. Predict
A. Sentimental Analysis
A. Give an expected result.
B. Customer Churn
B. information must be precise
C. Anomaly Detection
C. decides whether certain statements
need to be executed or not D. Housing Prices

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 555

52. Identify Performance measure P from 57. machine learning holds the advantage
following Traffic Pattern Analysis Algo- of being able to work with unlabeled
rithm. data.

PRACTICE BOOK» NOT FOR SALE


A. Predict traffic patterns at a busy inter- A. Supervised
section B. Unsupervised
B. Tune Model with data about past traffic C. Reinforcement
patterns D. Deep
C. Predict future traffic patterns 58. A.I. stands for?
D. None of the above A. After Incident
B. Alien Invasion
53. What is the correct example of Supervised
learning? C. Artificial Intelligence
A. Face recognition D. none of above

B. Speech Recognition 59. recognizing in machine learning

C. Netflix and YouTube recommendations A. training a computer to recognize spe-


cific data
B. all the data collected
D. All of them
C. measure the accuracy of your model,
54. Ranking is having strong belief that high- create the model
est score treated as D. Give an expected result.
A. -ve 60. ML is a field of AI consisting of learning
B. +ve algorithms that?

C. both A. improve their performance


B. able to execute some task
D. None
C. improve over time with experience
55. he most commonly used measure of simi- D. All of the above
larity is the or its square.
61. Which of these is NOT an example of an
A. euclidean distance AI technology?
B. city-block distance A. Image recognition/Computer vision
C. Chebychev’s distance B. Facial recognition
D. Manhattan distance C. Voice recognition
D. Computing devices that are alive
56. Which of these apps do not use machine
Learning? 62. Which of the following algorithm is not an
example of an ensemble method?
A. Facebook
A. Extra Tree Regressor
B. Amazon B. Random Forest
C. NetFlix C. Gradient Boosting
D. Non Of the Above D. Decision Tree

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 556

63. What is an example of overfitting? 68. Which among these are the elements of
A. Low accuracy in unseen data in job ap- learning System?
plications A. Task
B. Very long and inefficient lines of code B. Experience
C. Error in compiling code
C. Performance Measure
D. All of the above
D. All the above

NARAYAN CHANGDER
64. Which of the following option is / are
correct regarding benefits of ensemble 69. To create an Automated ML run:
model? 1. Better performance 2. Gen- A. We need to select the algorithm first
eralized models 3. Better interpretability
B. We need to select the dataset first
A. 1 and 3
B. 2 and 3 C. We need to select the compute target
first
C. 1 and 2
D. none of above
D. 1, 2 and 3

65. Machine Learning has various search/ op- 70. Factors which affect performance of a
timization algorithms, which of the follow- learner system does not include
ing is not evolutionary computation? A. Representation scheme used
A. Perceptron B. Training scenario
B. Genetic Algorithm (GA)
C. Type of feedback
C. Neuro Evolution
D. Good data structures
D. Genetic Programming (GP)
71. number = [1, 2, 3, 4, 5]num-
66. Which of the following is another term for
ber.pop()print(number). What is the out-
chunk of data that you use to train one or
put?
more machine learning algorithms
A. Training set A. [1, 2, 3, 4, 5]
B. Data set B. [2, 3, 4, 5]
C. Corpus training C. [1, 3, 4, 5]
D. none of above D. [1, 2, 3, 4]
67. A Data Scientist wants to tune the hyper-
72. Data that describes other data. For exam-
parameters of a machine learning model to
ple, a digital image may include metadata
improve the model’s F1 score.Which tech-
that describe the size of the image, num-
nique CANNOT be used in Amazon Sage-
ber of colors, or resolution.
Maker to solve this problem?
A. Heuristic
A. Grid Search
B. Random Search B. Hexadecimal
C. Bayesian optimization C. algorithm
D. none of above D. metadata

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 557

73. How many examples are usually needed 78. Suppose you are working on stock market
to train a neural network? prediction, and you would like to predict
the price of a particular stock tomorrow

PRACTICE BOOK» NOT FOR SALE


A. around a hundred
(measured in dollars). You want to use a
B. Several hundred exmaples learning algorithm for this.
C. A few thousand, ideally tens of thou-
A. Classification
sands.
B. Regression
D. none of above
C. Clustering
74. machine learning for kids can recognize
D. none of above
A. or give an expected result. 79. A variable in a program holds the current
B. text, images, sound or numbers score of a game. Which of the following
C. all the data collected is the most appropriate data type for the
variable?
D. numbers and text only
A. Boolean
75. Which of the following is a supervised
B. String
learning problem?
C. Float
A. Grouping different operating modes of
a machine D. Integer
B. Predicting component failure based on
historical data 80. Which test was designed to see if a com-
puter could think like a human.
C. Predicting quality deviation based on
historical data A. The McCarthy Test
D. All the above B. The STAAR Test
C. The Alan Test
76. Let’s say we have an image of size 45x55.
It is a grayscale image. How many pixels D. The Touring Test
do we need to represent this image in a
numerical format? 81. Which of the following is an example of a
deterministic algorithm?
A. 2045
B. 2475 A. K-Means

C. 2574 B. PCA
D. 2745 C. Both of these

77. Fraud Detection, Image Classification, Di- D. None of these


agnostic, and Customer Retention are ap-
82. Hard Margin
plications in
A. Unsupervised Learning:Clustering A. data points are classified partially

B. Supervised Learning:Classification B. all data points be classified correctly


C. Reinforcement Learning C. data points are misclassified
D. Unsupervised Learning:Regression D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 558

83. Performance metrics use for Regression A. 4, 3, 2, 1


A. Mean squared error (MSE) B. 2, 1, 3, 4
B. Confusion Matrix C. 3, 1, 2, 4
C. Sensitivity, Specificity, Accuracy D. 4, 2, 1, 3
D. Receiver Operating Characteristics
(ROC) Curve 89. What Algorithm is used to solve regres-
sion problems?

NARAYAN CHANGDER
84. A Parent helps the child read a book, A. k-Nearest Neighbours
Which example of ML is this?
B. Decision Trees
A. Supervised
C. Naive Bayes
B. Unsupervised
D. Support Vector Machines
C. Reinforced
D. Deep Learning 90. Exmples of Machine learning

85. The A.I. robot uses the input to find a so- A. All of Them
lution for the given problem which is re- B. Speech to text
ferred to as
C. Google maps
A. output
D. Siri, Uber
B. formula
C. scenario 91. High entropy means that the partitions in
classification are
D. problem solving
A. pure
86. A set of instructions to follow in order to
B. not pure
solve a problem
C. useful
A. Neural network
D. useless
B. Algorithm
C. Neuron 92. Which of the following is ingredients of ML
D. Machine learning model
A. classification
87. What are ANNs used for?
B. Regression
A. Reproduce Human Spinal Functions
C. Grouping and average
B. Reproduce Human Foot Functions
D. Cluster Analysis
C. Reproduce Human Nervous System
D. Reproduce Human Brain Functions 93. How does an AI device learn and think?

88. Convolutional Neural Network (CNN) for A. It hacks our computer


an image classification task has the fol- B. It accepts data and trains itself, then
lowing operations.1. Max Pooling2. Con- creates a model
volution Operation3. Flatten4. Fully con-
C. It hacks our brain
nected layerIdentify the correct sequence
from the option below: D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 559

94. algorithms enable the computers B. when preventive maintenance should


to learn from data, and even improve be performed
themselves, without being explicitly pro-

PRACTICE BOOK» NOT FOR SALE


C. which resources should be maintained
grammed.
via preventive maintenance
A. Artificial Intelligence
D. which resources should be maintained
B. Machine Learning via breakdown maintenance
C. Deep Learning
100. Inductive learning involves finding a
D. Traditional Learning
A. Consistent Hypothesis
95. what does linear mean?
B. Inconsistent Hypothesis
A. increase in input
B. increase in output C. Regular Hypothesis

C. decrease in input D. Irregular Hypothesis


D. decrease in output
101. What type of machine learning algorithm
96. Actual value is 0 but classified as 1 means makes predictions when you have a set of
input data and you know the possible re-
A. FN sponses?
B. TP
A. Unsupervised
C. TN
B. Reinforcement
D. FP
C. Supervised
97. One of the types of problems solved using
machine learning where data points are as- D. Deep Learning
sign into clusters. The main aim is to group
similar items. 102. Which of these is an example of AI?

A. Regression A. Able to burn a movie into DVD


B. Classification B. Able to burn a movie into DVD
C. Clustering C. Able to understand human speech
D. none of above D. Able to show you what is behind your
car on the back up camera
98. For evaluating regression models, which
of the following metrics can not be used?
103. What is common between overfitting and
A. R Squared underfitting?
B. Adjusted R Squared A. They both have the word fitting in them
C. SSE
D. MST B. Both are errors because of too much
simplicity or complexity
99. Predictive maintenance is used to deter-
mine: C. They’re both very common problems in
beginner coding
A. when preventive maintenance was
last performed D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 560

104. Which of the following evaluation indica- B. PyGame


tors belong to the regression algorithm? C. Scikit-learn
A. Recall rate
D. Daru
B. Confusion matrix
110. Which of the below is not supervised
C. Mean square error
learning?
D. Accuracy
A. Spam email identification

NARAYAN CHANGDER
105. What is Recall? B. House price prediction
A. TP/TN-FN C. Speech recognition
B. TP/TP-FN
D. Amazon product suggestions
C. TP/TP+FN
111. Which is an example of Clustering?
D. TP/FN+TP-TN
A. k-means
106. This type of learning to be used when
there is no idea about the class or label B. a-means
of a particular data C. Computer generation
A. Supervised learning algorithm D. Artificial Reality
B. Unsupervised learning algorithm
112. Network connectivity that enables these
C. Semi-supervised learning algorithm objects to collect and exchange data.
D. Reinforcement learning algorithm A. Sensors
107. Type of machine learning algorithm used B. Local Area Network
to infer information from data without in- C. Internet of Things
put from humans. In other words, learning
without a teacher. D. none of above
A. Dataset 113. The most widely used metrics and tools
B. Supervised learning to assess a classification model are:
C. Unsupervised learning A. Confusion matrix
D. Classifiers B. Cost-sensitive accuracy

108. Which of the following is FALSE about Tu- C. Area under the ROC curve
ples in Python? D. All of the above-answer
A. Tuples are immutable
114. After training the ML model, we
B. Tuple items can be deleted using del see how accurately it predicts the an-
keyword swer/responds. For example-does it cry
C. Tuples can be declared as:x, y=1, 2 when I say something mean to it?
D. None of the above A. Recognition
B. Training
109. What is a popular python library used in
data science? C. Predictive models
A. Datatables D. Testing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 561

115. Targetted marketing, Recommended Sys- 121. Specificity is also called as


tems, and Customer Segmentation are ap-
A. TPR
plications in

PRACTICE BOOK» NOT FOR SALE


A. Unsupervised Learning:Clustering B. FPR
B. Supervised Learning:Classification C. FP
C. Reinforcement Learning D. TP
D. Unsupervised Learning:Regression
122. Which of the following is not part of data
116. Students Grades vs Attendance preprocessing step
A. Cluster A. Data Collection
B. Class B. Data cleaning
C. Regression
C. Data Normalization
D. none of above
D. Training sets creation
117. Weather forecasting is an example of
A. Clustering 123. techniques combine individual models
together to improve the stability and pre-
B. Classification
dictive power of the model.
C. Regression
A. SVM
D. none of above
B. ANN
118. Machine Learning is a subset of AI. ML
deals with developing systems which can C. Ensemble
improve their performance with D. KNN
A. Experience
124. It is an interdisciplinary field of scien-
B. Deep Learning
tific methods, processes, algorithms and
C. Neural Networks systems to extract knowledge or insights
D. none of above from data in various forms, either struc-
tured or unstructured.
119. what are the things compute targets is
used for A. Data Science
A. run training scripts B. Machine Learning
B. service deployment C. Deep Learning
C. Both a and b D. none of above
D. None of the above
125. Test in machine learning
120. Dimensionality Reductions is useful be-
cause it: A. all the data collected
A. reduces overfitting B. test the accuracy of your model
B. reduces computation time C. learning new and different skills
C. removes multicollinearity D. training a computer to recognize spe-
D. All of the above cific data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 562

126. MSE stands for C. combined Learning


A. Mode Squared Error D. reinforcement learning
B. Median Squared Error 132. Which form of ML is most advanced?
C. Mean Squared Error A. Supervised
D. Mass Squared Error B. Unsupervised
C. Reinforced
127. What kind of learning algorithm for “Fu-

NARAYAN CHANGDER
ture stock prices or currency exchange D. Deep Learning
rates”? 133. Train in machine learning
A. Recognizing Anomalies A. all the data collected
B. Prediction B. measure the accuracy of your model,
C. Generating Patterns create the model
D. Recognition Patterns C. test the accuracy of your model
D. learning new and different skills
128. TPR stands for
134. Which form of ML depends on the person
A. Traditional Positive Rate
rewarding the AI?
B. True Positive Rate
A. Supervised
C. True Parameter Rate
B. Unsupervised
D. Traditional Parameter Rate C. Reinforced
129. Which of the following methods do we D. Deep Learning
use to find the best fit line for data in Lin-
135. Data set which has d binary features con-
ear Regression?
tains concepts
A. Least Square Error
A. 2d
B. Maximum Likelihood B. 22
d

C. Logarithmic Loss C. 4d
d
D. Both A and B D. 42
130. What type of Machine Learning Algo- 136. Which clustering method takes care of ob-
rithm is suitable for predicting the depen- long dataset?
dent variable with two different values? A. k-mean
A. Logistic Regression B. Gaussian mixture model
B. Linear Regression C. Decision tree
C. Multiple Linear Regression D. All of the answers
D. Polynomial Regression 137. ROC stands for
131. Which among these is not a type of learn- A. Receiver Operating Characteristic
ing? B. Row Operating Characteristic
A. Supervised Learning C. Receiver or Characteristic
B. Unsupervised Learning D. Relational Operating Characteristic

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 563

138. Supervised learning, given: 144. file folder located on the bottom of your
A. desired output only desktop

PRACTICE BOOK» NOT FOR SALE


B. Sequence of actions A. accesses the ram in your computer
C. Training data + desired output B. accesses the hard-drive of your com-
puter
D. Training data only
C. access programs like Google Chrome
139. In which layer does the AI system offer
D. accesses websites like machine learn-
“Purchase Recommendation “?
ing for kids on your computer
A. Sensing
145. In the gradient descent algorithm, which
B. Reasoning
algorithm is the most confusing trajectory
C. Learning on the loss function surface?
D. Acting A. SGD
140. In k-mean algorithm, K stands for B. BGD
A. Number of data C. MGD
B. Number of clusters D. MBGD
C. Number of attributes
146. If the output variable is having only two
D. Number of iterations classifications then it is called
141. Who invented the Perceptron which was A. Linear regression
a very, very simple classifier but when it B. Non linear Regression
was combined in large numbers, in a net-
C. Multi classification
work, it became a powerful monster?
D. Binary Classification
A. Frank Rosemarie
B. Frank Rosenblet 147. In which of the following cases will K-
C. Frank Rosenblatt means clustering fail to give good results?
1) Data points with outliers 2) Data points
D. Frank Rosenbat with different densities 3) Data points
142. Estimating the price of a smartphone is with non convex shapes
an example of A. 1 and 2
A. Clustering B. 2 and 3
B. Classification C. 1, 2, and 3
C. Regression D. 1 and 3
D. none of above
148. is set of algorithms that allows com-
143. data that is organized in some fashion- puters to learn from data without being
uses relatively smaller storage explicitly programmed.
A. big data A. Machine Learning
B. structured data B. Neural Networks
C. unstructured data C. Deep Learning
D. cloud computing D. supervised learning

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 564

149. which is unsupervised learning 155. Unsupervised Learning in Machine learn-


A. learning with a teacher ing means
A. no labelled data
B. learning without a teacher
B. labeled data
C. computer teaching a human
C. great algorithm
D. learning using another computer
D. none of the above
150. A persons BMI
156. Better performance2. Generalized mod-

NARAYAN CHANGDER
A. Cluster els3. Better interpretability
B. Class A. 1 and 3
C. Regression B. 2 and 3
D. none of above C. 1 and 2
D. 1, 2 and 3
151. In which layer does the AI system use
“Situation assessment “? 157. What are friends on social network sites
a part of?
A. Sensing
A. Upstanders
B. Reasoning
B. Citizen
C. Learning
C. Community
D. Acting
D. Bystanders
152. is the subset of objects or events de- 158. Which of the following is not available in
fined over a larger set. Confusion Matrix
A. Entropy A. TP
B. Hierarchy B. TN
C. Concept C. FP
D. Learning D. TF

153. A broad term that refers to computers 159. Appropriate chart for visualizing the lin-
thinking more like humans. ear relationship between two variables is
A. Artificial Intelligence
A. Scatter plot
B. Machine Learning
B. Barchart
C. Deep Learning
C. Histograms
D. none of above
D. None of Mentioned
154. Which of these is not a supervised learn- 160. Machine Learning type uses unla-
ing algorithm? belled data.
A. Representation Learning A. Unsupervised
B. Classification B. Supervised
C. Regression C. Semi-Supervised
D. none of above D. None

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 565

161. name = “Daniella”. name = name[1]. 166. Where did AI begin its journey?
print(name]. what is the output? A. Supervised

PRACTICE BOOK» NOT FOR SALE


A. a B. Unsupervised
B. D C. Reinforced
C. Daniella D. Deep Learning
D. i 167. Error that results from inaccurate as-
162. retraining sumptions in model training (that are made
to simplify the training process)
A. learning new and different skills
A. Variance
B. test the accuracy of your model
B. Overfitting
C. measure the accuracy of your model,
C. Underfitting
create the model
D. Bias
D. uses machine learning technology to
perform many tasks like ordering food or 168. What ML algorithm is example of mix-
creating lists ture of Decision Tree:
A. Random Forest Alogrithm
163. Which of the following is NOT an exam-
ple of machine learning? B. KNN
A. Estimating home prices based on at- C. SVM
tributes of the property D. Naive Bayes Classifier
B. Sorting department store items by bar 169. Which of the algorithms below perform
code unsupervised learning tasks?
C. Identifying objects in an image based A. Decision tree
on training data
B. Linear regression
D. Recommending products based on
C. K-means
users’ buying habits
D. Hierarchical clustering
164. Example of Reinforcement learning
170. is a learning model that is used
A. chess game to identify a relationship between large
B. Weather conditions amounts of information from a data set.
C. object recognition A. Classification
D. price of house B. Multi class classification
C. Association
165. What is the name of the US entrepreneur
who is involved in AI developments D. Unsupervised learning
and is concerned about the future of 171. What was Alan Turing’s profession be-
AI/Superintelligence? fore he worked for the government?
A. Bill Gates A. Mechanic
B. Elon Musk B. Mathematician
C. Sundar Pichai C. Nurse
D. Mark Zuckerberg D. Teacher

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 566

172. The variable is Sunshine is to be used 177. What does Machine Learning means?
to indicate whether or not the weather is
A. Teaching the machine
currently sunny or not. Which of the fol-
lowing is the most appropriate data type B. Learn & adapt
for is Sunshine?
C. Train the data
A. Boolean
D. Make machine like human
B. String

NARAYAN CHANGDER
C. Float 178. Siri, Cortana, and Alexa are examples of
D. Integer

173. How is A.I. different from machine learn- A. chat boxes


ing? B. supervised learning
A. Machine learning is slower. C. virtual assistants
B. Machine learning is smarter.
D. live assistants
C. Machine learning is a technique to
achieve A.I. and provides a machine with 179. Why do we need to set hyper-
the capability to learn from data and expe- parameters?
rience through algorithms.
A. Model configuration
D. none of above
B. Model validation
174. Which one of them finds hidden struc-
tures in data C. Model deployment
A. linear regression D. none of above
B. Supervised learning
180. which of the following is a type of ma-
C. UnSupervised learning chine learning algorithm used to draw in-
D. none of above ferences from datasets consisting of input
data without labeled responses.
175. In Decision Tree, is dividing the root
node into different parts on the basis of A. Supervised Learning
some condition. B. Un supervised Learning
A. pruning
C. None
B. splitting
D. Reinforcement Learning
C. leaf node
D. parent node 181. Which among the following feature
makes unsupervised learning versatile?
176. In hypothesis representation, what is the
meaning of the symbol ‘? ‘ A. creation of some hidden structures
A. No value is acceptable B. Dynamic nature of these hidden struc-
B. Any value is acceptable tures

C. Selected values are acceptable C. Use of unlabeled data


D. None of the above D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 567

182. Which is FALSE about Decision Tree 187. Which type of ML is the oldest?
A. We can extract RULES from the Deci- A. Supervised

PRACTICE BOOK» NOT FOR SALE


sion Tree B. Unsupervised
B. It is good to find relationship of non- C. Reinforced
linearly correlated data
D. Deep Learning
C. it has to formed from a binary tree
188. The Logic function that cannot be imple-
D. The output can be easily understood by mented by a perceptron having two input
a layman is?

183. In this kind of Machine Learning, an AI A. AND


system is presented with data which is la- B. OR
beled, which means that each data tagged C. NOR
with the correct label.
D. XOR
A. Supervised Learning
189. Which of the following is TRUE about
B. Unsupervised Learning Random Forest?
C. Reinforcement Learning A. Random Forest aims to decrease both
D. Learning and Techniques variance and bias
B. Random Forest aims to decrease vari-
184. What is the relationship between model ance not bias
and algorithm?
C. Random Forest aims to decrease bias
A. Algorithm + model = data not variance
B. Algorithm = Model + data D. None of the above
C. Model = Algorithm(data) 190. ANN is related to
D. Data = Algorithm(model) A. ML
B. AI
185. what is supervised learning
C. Deep Learning
A. computer teach humans
D. Java
B. humans teach computers
191. In the regression equation Y = a+bX, the
C. humans watch computers
Y is called:
D. computers watch humans A. Independent variable
186. Among the machine learning algorithms, B. Continuous variable
which of the following are not integrated C. Dependent variable
learning strategies?
D. None of the above
A. Boosting
192. Positive examples of the data set are
B. Stacking called as
C. Bagging A. hypothesis
D. Marking B. Target concept

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 568

C. non members of the concept 198. is a classification algorithm used to


D. members of the concept assign observations to a discrete set of
classes.
193. Sensitivity also called as A. Linear Regression
A. Precision B. Multiple Linear Regression
B. positive Recall C. Logistic Regression
C. Accuracy D. Classification

NARAYAN CHANGDER
D. negative recall
199. What kind of distance metric(s) are suit-
194. KNN algorithm appropriate for able for categorical variables to finding the
closest neighbors
A. Lower number of features
A. Euclidean Distance
B. Large number of features
B. Manhattan distance
C. No such restriction on number of fea-
tures C. Minkowski distance
D. None of the Mentioned D. Hamming distance

195. is the simplest supervised machine 200. What is an example of something that is
learning algorithm used for classification NOT PII?
based on how its neighbors are classified. A. Social Security Number
A. ANN B. Eye color
B. KNN C. Email address
C. SVM D. Student ID
D. Clustering
201. For a fully-connected deep network with
196. A multi-layered perceptron is usually one hidden layer, increasing the number of
trained using: hidden units should have what effect on
bias and variance?
A. Margin maximization algorithm
A. Decrease bias, increase variance
B. Single linkage algorithm
B. Increase bias, increase variance
C. Belief propagation algorithm
C. Increase bias, decrease variance
D. Back-propagation algorithm
D. No change
197. If the given dataset contains 100 obser-
vations out of 50 belongs to class1 and 202. raw data with no connections and/or re-
other 50 belongs to class2. What will be lationships among data detected-usually
the entropy of the given dataset? requires large amounts of storage
A. 0 A. data collection
B. 1 B. structured data
C. -1 C. unstructured data
D. 0.5 D. cloud computing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 569

203. Estimating the price of a house is an ex- B. replace it by?


ample of C. replace it by $

PRACTICE BOOK» NOT FOR SALE


A. Clustering D. re phrase the entire hypothesis
B. Classification
209. A model of language consists of the cate-
C. Regression gories which does not include
D. none of above A. Language units
204. What does lower latency mean? B. Role structure of units
A. Less time spent looking for networks C. System constraints
B. Faster Facebook scrolling D. Structural units

C. Less time for information to travel to 210. The residual is the difference in between
and from your device
D. Enhanced computing performances A. actual value of y and the estimated
value of y
205. Siri, Alexa, and Google Home are all ex-
B. actual value of x and the estimated
amples of:
value of x
A. Robots
C. actual value of y and the estimated
B. Social Media Sites value of x
C. Customer Support Bots D. actual value of x and the estimated
D. Virtual Assistants value of y

206. What doe ENIAC stands for? 211. In supervised learning, the allow
the algorithm to find the exact nature of
A. Electric Number Intersect A Calculator the relationship between any two data
points.
B. Electronic Numerical Integrator and A. classifier
Computer
B. training data
C. Engineering Numbering Into Auto Cor-
C. labels
rect
D. None of the above
D. Enter Number In Auto Correct
212. Which language supports for ML
207. Which of the following clustering algo-
rithms is the most sensitive to outlier? A. Corba

A. K-means clustering algorithm B. Python

B. K-medians clustering algorithm C. Java


D. C
C. K-modes clustering algorithm
D. None of the above 213. Estimate the price of a house
A. Cluster
208. In Find-s algorithm, if the attribute value
is matched with hypothesis value, what ac- B. Class
tion has to be done? C. Regression
A. No action. keep the value as it is. D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 570

214. State whether the statements are True C. Adding more layers
or False.Statement A:When the hypoth-
D. Adding more neurons per layer
esis space is richer, overfitting is more
likely.Statement B:When the feature
219. What kind of table compares classifica-
space is larger, overfitting is more likely.
tions predicted by the model with the ac-
A. False, False tual class labels?
B. True, False A. Chaos table

NARAYAN CHANGDER
C. True, True B. Confusion Matrix
D. False, True
C. Prediction plot
215. How do you reduce both types I and II D. Residual plot
errors from occurring?
A. It can’t be reduced 220. Automation, computers, and electronics
B. Increase the sample size A. Industry 1.0
C. Redo the tests B. Industry 2.0
D. Tamper with the data C. Industry 3.0
216. A machine learning problem involves four D. Industry 4.0
attributes plus a class. The attributes have
3, 2, 2, and 2 possible values each. The 221. The equation of line is
class has 3 possible values. How many
A. y=mx+c
maximum possible different examples are
there? B. m=ab+cf
A. 12 C. p=ann
B. 72 D. AI=DL+ML
C. 24
D. 48 222. I.B.M.’s system beat the world cham-
pion of chess, the grand-master.
217. Which of the following statements is/ A. Deep Sea
are true about the kernel in SVM? 1. Ker-
nel function map low dimensional data to B. Deep Ocean
high dimensional space2. It’s a similarity C. Deep Lake
function
D. Deep Blue
A. 1 is True but 2 is False
B. 1 is False but 2 is True 223. How can you prevent a clustering algo-
C. Both are True rithm from getting stuck in bad local op-
tima?
D. Both are False
A. Set the same seed value for each run
218. Which of the following best improves a
machine learning model? B. Use multiple random initialization
A. Using more training examples C. Both A and B
B. Training the model over more epochs D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 571

224. Which of the following is TRUE about Re- 229. an ML model needs this to generate data
inforcement Learning? to learn from.
A. Recognition

PRACTICE BOOK» NOT FOR SALE


A. It uses rewards and penalty methods
to train a model B. Training
B. It is also known as a semi-supervised C. Predictive models
learning model
D. Testing
C. Chess playing computer is a good ex-
ample of reinforcement learning 230. Which of the following algorithm is called
Lazy Learner?
D. All of the above
A. KNN
225. list 1 = [2, 3, 4, 5]list 1.ap-
B. SVM
pend(6)print(list 1). What is the Out-
put? C. Naive Bayes
A. [6, 2, 3, 4, 5] D. Decision Tree
B. [2, 3, 4, 5] 231. Selecting certain people to be inter-
C. [2, 3, 6, 5, 4] viewed is

D. [2, 3, 4, 5, 6] A. Bias through selection and omission


B. Bias through placement
226. Several sets of data related to each other
C. Bias through source control
used to make decisions in machine learning
algorithms D. Bias through crowd counts
A. unsupervised learning 232. In which layer does the AI system use
B. Classifiers “Evidence-based inference “?
C. supervised learning A. Sensing
D. Dataset B. Reasoning
C. Learning
227. Which among the following concept dis-
covered in 1967 help computers in basic D. Acting
pattern recognition tasks? 233. In machine learning computers don’t have
A. Nearest neighbour algo to be programmed but can change and
B. K means clustering algo improve their algorithms by themselves.

C. Bayesian Decision Theory A. implicity


B. manipulatively
D. Turing Test
C. explicitly
228. is a category of an algorithm that
D. Programmatically
allows software applications to become
more accurate in predicting outcomes with- 234. What 2 subjects are neural networks usu-
out being explicitly programmed. ally associated with?
A. Artificial Intelligence A. Geology & CHemistry
B. Machine Learning B. Geology & Biology
C. Deep Learning C. Chemistry & Artificial-engineering
D. Traditional Learning D. Biology & Artificial-engineering

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 572

235. Machine learning is field 241. Python follows indexing.


A. Inter-disciplinary A. One
B. Single B. Two
C. Multi-disciplinary C. Zero
D. All of the Above D. Five
242. Spam and Ham related
236. KNN Algorithm can be used for

NARAYAN CHANGDER
A. -ve and-ve
A. Only for Classification
B. -ve and +ve
B. Only for Regression
C. +ve and +ve
C. Both Classification and Regression
D. +ve and ve
D. None of the Mentioned
243. What year did Machine Learning began to
237. When would you reduce dimensions in flourish?
your data? A. 1980
A. When data comes from sensor B. 1918
B. When you are using a Linux machine C. 1908
C. When your data set is larger than D. 1890
500GB
244. How many types of machine learning?
D. When you have larger set of features
A. 4
with similar characteristics
B. 3
238. clustering is like C. 2
A. naming things D. 1
B. creating clusters 245. Field of study that gives computers the
C. automatic regression ability to learn without being explicitly
D. automatic classification programmed.
A. Deep Learning
239. This is where we insert the initial data
B. Machine Learning
for the neural network.
C. Data Science
A. Input
D. supervised learning
B. Hidden Layer
246. mushroom.groupby([’gill-size’])[’class’].value
C. Output
counts().to frame()What will this
D. none of above code do?
240. What is Dcostrings Used in Python. A. Group mushroom by Gill Size and Class

A. Coding
B. Group mushroom by Class and Than
B. Comments Gill Size
C. Differentiation C. Will show error
D. Iteration D. Count the types of gill size and class

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 573

247. How can we train a machine? 253. Artificial intellegence


A. Adding more processors A. a subdiscipline of computer science

PRACTICE BOOK» NOT FOR SALE


B. By giving it a lot of data that attempts to simulate human thinking

C. By giving it emotions B. measure the accuracy of your model,


create the model
D. none of above
C. a programming language where you
248. Which of the following equation best ex- drag script blocks together to create a se-
plains the concept of machine learning? ries of commands
A. Algorithm + Program = output D. The same as robotics
B. Data+ output = Program 254. Which of the following is FALSE about
C. Data + Algorithm = Program SVM?
D. Data + program = output A. SVM has inbuilt L2 regularization capa-
bilities
249. Dictionaries is an unordered elements.
B. SVM solves both classification and re-
A. No gression problems
B. Yes C. It does not require any feature scaling
C. Maybe
D. None D. Choosing an appropriate Kernel func-
tion is difficult
250. Regression outputs are
A. Discrete 255. How many things are concerned in the de-
sign of a learning element?
B. Continuous
A. 1
C. Categorical
B. 2
D. Static
C. 3
251. Where a machine’s intelligence is much D. 4
smarter than the best human brains in
practically every field, including scien- 256. The prior goal of unsupervised learning
tific creativity, general wisdom and social model is to determine the .
skills. A. classification task
A. Narrow AI B. regression task
B. General AI C. accuracy of the classified labels
C. Super AI D. data patterns
D. none of above
257. Where the observer rewards the agent
252. What type of Learning is Clustering? for correct responses
A. Unsupervised A. Decision tree learning
B. Supervised B. Reinforcement learning
C. Regression C. Predictive models
D. Nintendo Gameboy D. sentiment analysis

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 574

258. Which of the following is FALSE about 263. KNeighborsClassifier class can be im-
Random Forest and Adaboost? ported as:
A. Random Forest aims to decrease vari- A. from sklearn.ensemble import KNeigh-
ance and not bias borsClassifier
B. Adaboost aims to decrease bias not B. from sklearn.neighbors import KNeigh-
variance borsClassifier
C. Both Adaboost and Random Forest aim C. from sklearn.tree import KNeigh-

NARAYAN CHANGDER
to decrease both bias and variance borsClassifier
D. None of the above D. from sklearn import KNeighborsClassi-
259. which is not a factor that affect show fier
good a result is
264. is the classification Technique based
A. the hardness of the task on Baye’s Theorem.
B. the machine learning method A. Decision Tree
C. the time it took to program it B. SVM
D. the quality of the data C. Naive Bayes
260. A collection of individual models that D. Association
learn to predict a target by combining their
strengths and avoiding the weaknesses of 265. The goal of clustering a set of data is to?
each is called A. choose the best data from the set
A. A Collection B. divide them into groups of data that
B. An Ensemble are near each other
C. A Group C. determine the nearest neighbors of
D. A Fusion each of the data
D. predict the class of data
261. What is the name of the test that Alan
created to check whether something is hu- 266. Why is data cleaning important?
man or a computer?
A. To run proper analysis on the data
A. Test of Turing
B. To ensure the code runs
B. Turner Test
C. To get rid of outliers
C. Turing Machine
D. To fit the data to expectations
D. Turing Test

262. Which feature selection technique uses 267. Targeted marketing, Recommended Sys-
shrinkage estimators to remove redundant tems, and Customer Segmentation are ap-
features from data? plications in
A. Stepwise regression A. Unsupervised Learning:Clustering
B. Sequential feature selection B. Supervised Learning:Classification
C. Neighborhood component selection C. Reinforcement Learning
D. Regularization D. Unsupervised Learning:Regression

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 575

268. Several sets of data related to each other 273. AI that is designed to perform a single
used to make decisions in machine learning task e.g. being able to play chess or drive
algorithms. E.g. comments to make you a car

PRACTICE BOOK» NOT FOR SALE


happy and comments to make you sad A. Narrow AI
A. Dataset B. General AI
B. unsupervised learning C. Super AI
C. supervised learning D. none of above
D. Classifiers 274. A computer program is said to learn from
E with respect to some class of tasks
269. is a metrics used to measure impurity T and performance measure P, if its per-
or randomness in data. formance at tasks in T, as measured by P,
A. Sigmoid improves with E.
B. Entropy A. Training

C. Step function B. Experience


C. Database
D. Categorical data
D. Algorithm
270. In Gaussian mixture model clustering, the
number of Gaussian distribution functions 275. forever code
used is equal to A. decides whether certain statements
A. Number of clusters need to be executed or not
B. used to let one part of the code or
B. Number of attributes
project communicate with another part
C. Number of instances C. starts the program
D. Number of iterations D. repeat a set of statements, never stop-
ping until you click on the red stop
271. building a model that is capable of mak-
ing predictions 276. Which of the following is NOT an exam-
A. Decision tree learning ple of hyper-parameter?
A. Number of nearest neighbors in KNN
B. Reinforcement learning
B. Number of outliers in KNN
C. Predictive models
C. Depth of a Decision Tree
D. sentiment analysis
D. Number of trees in a Random Forest
272. “Calling the web service that host the
277. The margin of a linear classifier as the
model to quickly score against a relatively
width that the boundary could be in-
small set of data” is:
creased by
A. Real-time Inferencing A. before hitting a datapoint.
B. Batch Inferencing B. nearer to data point
C. Both C. after data point
D. None D. middle of data poin

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 576

278. is the fundamental unit of brain. 284. Real-Time decisions, Game AI, Learning
A. Lypcoses Tasks, Skill Aquisition, and Robot Naviga-
tion are applications in
B. Andrite
A. Unsupervised Learning:Clustering
C. Neuron
D. Axon B. Supervised Learning:Classification
C. Reinforcement Learning
279. ‘Convert to CSV’ module is a part of
which section? D. Unsupervised Learning:Regression

NARAYAN CHANGDER
A. Data Input and Output
285. AUC stands for
B. Data Transformation
C. Model Training A. Automatic under curve

D. None of the above B. Area Under Curve

280. type of machine learning which models it- C. Addition under curve
self after the human brain. D. Association under curve
A. Algorithm
286. In which of the following learning the
B. Machine learning
teacher returns reward and punishment to
C. Neuron learner?
D. Neural network A. Active learning
281. Perceptron consist of: B. Reinforcement learning
A. One neuron C. Supervised learning
B. Two neuron
D. Unsupervised learning
C. Three neuron
D. Four neuron 287. regression is like a

282. Which of these libraries are used for ma- A. kid riding a bike
chine learning? B. shopping bill
A. TensorFlow C. treating a dog
B. NumPy
D. teaching a kid how to walk
C. Pyplot
D. Pip 288. Although machine learning is useful, it
can be difficult to implement. Which is NOT
283. Model evaluation metric is calculated as one common obstacle faced by businesses
True Positives / (True Positives + False looking to use machine learning tools?
Negatives). What is the name of this met-
ric? A. Not enough data to perform machine
learning processes.
A. Accuracy
B. Precision B. Lack of necessary skills

C. Recall C. Insufficient Computing Power


D. F1 Score D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 577

289. The neural net models use and 294. is the partition approach of grouping
principles to mimic the processes of the similar datas.
human brain, allowing for more general

PRACTICE BOOK» NOT FOR SALE


A. KNN
learning.
B. K-Means
A. Maths & Science
C. ANN
B. Maths & Computer Science
D. HAC
C. Human Brain & Science
D. none of above 295. Which one in the following is not Machine
Learning disciplines?
290. Which of the following tasks would an
AI be able to perform the LEAST success- A. Information Theory
fully? B. Neurostatistics
A. Suggesting what someone might want C. Optimization + Control
to buy from a shopping website
D. Physics
B. Using traffic data to work out what
cars people are likely to buy 296. You are given reviews of movies marked
as positive, negative, and neutral. Classi-
C. Playing hangman
fying reviews of a new movie is an exam-
D. Writing a joke ple of
291. Which clustering method takes care of A. Supervised Learning
variance in data? B. Reinforcement Learning
A. k-mean C. Unsupervised Learning
B. Gaussian mixture model D. None of these
C. Decision tree
297. what is reinforced learning
D. All of the answers
A. rewarding a computer for doing some-
292. Which of the following is TRUE about thing correct
Random Forest and Adaboost?
B. rewarding a dog for doing something
A. Order of trees matters in Random For- correct
est
C. teaching a computer using force
B. Order of trees matters in Adaboost
D. giving the computer examples
C. Order of trees does not matter in Ran-
dom Forest and Adaboost 298. if-then statement
D. None of the above A. repeat a set of statements, never stop-
ping until you click on the red stop
293. The price of a smartphone
B. used to let one part of the code or
A. Cluster project communicate with another part
B. Class C. decides whether certain statements
C. Regression need to be executed or not
D. none of above D. continuous statement

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 578

299. Different learning methods does not in- 305. Which of the following method is not
clude? used in binary classification
A. Memorization A. Decision Tree
B. Analogy B. Neural Networks
C. Deduction C. Database
D. Introduction D. Support Vector Machine
300. Deep learning algorithm for sequential

NARAYAN CHANGDER
306. Which of the following is not type of
problem learning?
A. CNN A. Semi-unsupervised Learning
B. ANN
B. Unsupervised Learning
C. DBN
C. Supervised Learning
D. RNN
D. Reinforcement Learning
301. The predicted category or value of the
data (column to predict). 307. What is an example of PII?
A. Target A. Gender
B. Label B. Employer
C. Sample C. Driver’s License Number
D. none of above D. Age

302. A major benefit of a machine with AI is 308. is the graphical representation of all
possible solutions to a decision.
A. it could do a job too dangerous for a A. K-Means
human
B. KNN
B. it could love you like a brother
C. ANN
C. it could chop up your vegetables
D. Decision Tree
D. none of above
309. How many types are available in machine
303. Machine learning is an application of: learning?
A. Deep learning
A. 1
B. Artificial intelligence
B. 2
C. Expert systems
C. 3
D. Robotics
D. 4
304. Who is the “Father of Artificial Intelli-
gence”? 310. It produces the result for given inputs.
A. Mathew McConaughey A. Input
B. George McCarthy B. Hidden Layer
C. John McCarthy C. Output
D. John Lennon D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 579

311. In which layer does the AI system use 317. Which of the following is ingredients of
“Image processing “? machine learning tasks

PRACTICE BOOK» NOT FOR SALE


A. Sensing A. Grouping and average
B. Reasoning B. Geometric model
C. Learning C. Probabilistic model
D. Acting D. Cluster analysis
312. subcategory 318. You are preprocessing a credit card fraud
A. a sub used to create new code dataset that contains the column ‘Amount’.
B. A group of people or things having You want to determine what the average
something in common amount is for the cases where there is
fraud. Which basic descriptive statistic
C. a smaller part of a category sharing a could you use to achieve this?
common attribute.
A. Mode
D. a larger part of a category sharing a
common attribute. B. Median
C. Standard Deviation
313. What does PII stand for?
A. Primary Information Investigation D. Mean

B. Personal Identifying Information 319. Which of these statements is true about


C. Property Information Institute classical ML vs. deep learning?
D. Public Information Interface A. All deep learning algorithms are ma-
chine learning algorithms
314. Which of the following is not an applica-
B. All machine learning algorithms are
tion of learning?
deep learning algorithms
A. Data mining
C. Classical ML is a subcategory of deep
B. WWW learning algorithms, based on neural net-
C. Speech recognition works
D. None of the mentioned D. none of above
315. Identifying a man 320. One of the types of problems solved us-
A. Cluster ing machine learning where the output is
a categorical quantity and the main aim is
B. Class
to compute the category of the data.
C. Regression
A. Regression
D. none of above
B. Classification
316. What is the fitting surface of linear re- C. Clustering
gression in more than 3 dimensions
D. none of above
A. Surface
B. Plane 321. KNN is algorithm
C. Hyperplane A. Non-parametric and Lazy Learning
D. Hypersurface B. Parametric and Lazy Learning

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 580

C. Parametric and Eager Learning C. semi managed service


D. Non-parametric and Eager Learning D. none of the above

322. Which of the following statements about 327. Change the following datetime “2020,
supervised learning is correct 04, 24” to strftime(’%Y-%d-%B’) in
Python
A. Decision tree is a supervised learning
A. 2020-04-24
B. Supervised learning cannot use cross-
validation for training B. 2020-24-04

NARAYAN CHANGDER
C. Supervised learning is a rule-based al- C. 2020-April-04
gorithm D. 2020-24-April
D. Supervised learning can be trained 328. What is the purpose of restricting hypoth-
without labels esis space in machine learning?
323. It is an application of artificial intelli- A. Can be easier to search
gence (AI) that provides systems the abil- B. May avoid overfit since they are usu-
ity to automatically learn and improve ally simpler (e.g. linear or low order deci-
from experience without being explicitly sion surface)
programmed
C. Both of the above
A. Artificial Intelligence D. None of the above
B. Decision Tree
329. The goal of concept learning is to find
C. Machine Learning
A. hypothesis
D. Linear Regression
B. training data set
324. Which of the following yields discrete cat- C. testing data set
egorical outputs? D. concept
A. Anomaly detection
330. green flag in Scratch
B. Regression
A. allows you to edit the program
C. Classification
B. the output generated when you train
D. Feature Learning your machine learning algorithm with
data.
325. What does the ability to identify objects
that are next to each other and objects C. starts the program
that are far from each other? D. stops the program
A. Visualization 331. It is the training of machine using infor-
B. Representative mation that is unlabeled and allowing the
C. Correlation algorithm to act on that information with-
out guidance.
D. Isolation
A. Supervised Learning
326. A compute instance is a B. Unsupervised Learning
A. Managed service C. Reinforcement Learning
B. Not a managed service D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 581

332. Unsupervised learning has shown a great C. 0


success in..? D. 3

PRACTICE BOOK» NOT FOR SALE


A. Modern AI applications
338. Which of the following is part of the data
B. Face detection science tech stack?
C. Object detection A. Collection
D. All of the above B. Cleaning
333. At what level of accuracy can you stop C. Release
training the machine? D. Storage
A. 50%-60% 339. What is the main reason for overfitting?
B. 60%-70% A. Very low efficiency in coding
C. 70%-80% B. Poor generalization in unseen data
D. 80%-90% C. Overload of information
334. which is not a type of machine learning D. Poor management of code
A. supervised learning 340. Which of these is not a MAL algorithm?
B. unsupervised learning A. QLearning
C. super learning B. stochastic gradient descent
D. reinforcement learning C. linear regression
D. Sin(KD) Learning
335. choose the correct option for the given
statements: S1 → When DevOps applied 341. is the process of identifying unex-
to machine learning, we refer to the au- pected items in datasets, which differ from
tomation of machine learning pipelines as the norm.
MLOps. S2 → DevOps is the part of A. Reinforcement learning
MLOps.
B. Classification
A. Both True
C. Clustering
B. only S1 Ture
D. Anomaly detection
C. Both False
342. Text Recognition
D. only S2 Ture
A. Class
336. ROC curve can be plotted using B. Cluster
A. TP and FP C. Regression
B. TN and FN D. none of above
C. TPR and FPR
343. Which of the following is ingredients of
D. TP and FN machine learning features
337. The Number of coefficients required to es- A. Classification
timate a simple linear regression? B. Binary Splits
A. 1 C. Grouping and average
B. 2 D. Cluster Analysis

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 582

344. Open-source tool that can combine code, 349. Overtime you log onto a website, you
markdown, and visualizations together in leave a mark. Your “stuff” can be seen,
a single document. searched, copied, and forwarded to others.
This permanent mark you leave is known
A. Visual Studio
as what?
B. Visual Studio Code A. Digital Media
C. Jupyter Notebook B. Digital Footprint
D. none of above C. Cyberbullying

NARAYAN CHANGDER
D. Media
345. Which one of these is not an activation
function in a neural network? 350. What will happen when eigenvalues are
A. sigmoid roughly equal in PCA?
A. PCA will perform outstandingly
B. Hyperbolic Tangent
B. PCA will perform badly
C. ReLU
C. Can’t Say
D. cos(x)
D. None of above
346. If 20 is added to the data set below, 351. What would make a robot intelligent?
which statement will be true? 50, 55, 55,
60, 62 A. It responds to the environment.
B. It calculates mathematical problems
A. The median will be 20
faster than human minds.
B. The mode will increase C. It responds to the environment accord-
C. The mean will increase ing to previous experiences.
D. The mean will decrease D. It can jump 1.5 meters higher than hu-
mans.
347. It is a type of machine learning where it
352. AI is (pick best definition)
involves a guide. It is also a technique in
which we teach or train the machine using A. Computers that are robots
data which is well labelled. B. Computers that can talk
A. Supervised Learning C. Computers that mimic a human’s be-
haviour
B. Unsupervised Learning
D. Computers that mimic other comput-
C. Reinforcement Learning ers
D. none of above
353. All data is labeled and the algorithms
learn to predict the output from the in-
348. Do you have to make predefined classes
put data. In other words, giving concrete
for Clustering?
known examples to the computer.
A. Yes
A. Dataset
B. No B. Supervised learning
C. Maybe C. Unsupervised learning
D. Lil uzi vert D. Classifiers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 583

354. broadcast in Scratch 359. In an Unsupervised learning


A. decides whether certain statements A. Specific output values are given

PRACTICE BOOK» NOT FOR SALE


need to be executed or not B. Specific output values are not given
B. the output generated when you train C. No specific Inputs are given
your machine learning algorithm with
D. Both inputs and outputs are given
data.
C. starts the Scratch program 360. Which AI system finds and identifies pat-
terns; for instance; in the words you use?
D. used to let one part of the code or
project communicate with another part A. Intelligent system
B. Neural network
355. What is the full form of NLP?
C. Fuzzy logic
A. Natural Language Parts
D. Intelligent agent
B. Natural Learning Process
361. is the art and science of giving com-
C. Natural Language Processing
puters the ability to learn to make deci-
D. Natural Long Processing sions from data without being explicitly
programmed to do so.
356. A feature in a dataset stores the values
of student grades (A-F). What is the cor- A. Reinforcement Learning
rect data type for this feature? B. Machine Learning
A. Categorical C. Artificial Intelligence
B. Ordinal D. Data Science
C. Numerical 362. Which of these is NOT always an exam-
D. Text ple of AI?
A. GPS navigation
357. To arrive at the answer of Unsupervised
learning questions, the machine would B. Amazon search engine
require to deduce a strategy would be C. Siri or Alexa
very..?
D. none of above
A. 50cm
363. Machine Learning can be classified into
B. Very large the following accept
C. Size of a brick A. Reinforcement Learning
D. Tiny B. Unsupervised Learning
358. A perceptron can correctly classify in- C. Deep Learning
stances into two classes where the classes D. Supervised Learning
are:
364. Which of the following best describes a
A. Overlapping
Type I error?
B. Linearly separable
A. The null is true, but we mistakenly re-
C. Non-linearly separable ject it.
D. None of the above B. The null is false and we reject it.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 584

C. The null is false, but we fail to reject it. 370. Which type of machine learning rewards
the machine for getting the correct an-
D. The null is true but we fail to reject it. swer?
A. Unsupervised Learning
365. A group of baking videos on youtube
B. Reinforcement learning
A. Cluster
C. Supervised Learning
B. Class
D. none of above

NARAYAN CHANGDER
C. Regression
D. none of above 371. Which of this is the laziest technique of
learning?
366. Which term is defined as:” an approach
to teach computers how to make decisions A. k-nearest neighbour
and predictions, by giving them the ability B. k-means
to learn from data.”
C. k-fold
A. Machine Learning
D. k-19
B. Deep Learning
C. Artificial Intelligence 372. Which of the following would not typi-
cally be a consideration in the equipment
D. Artificial Narrow Intelligence
replacement question?
367. data that is capable of being used A. Forecasts of future demand
data that has been processed so that it can
be analyzed or used in its current form B. Expertise workers had on the old
equipment
A. curation of information
C. The cost of the replacement equip-
B. big data ment
C. usable data
D. The cost to maintain the old equipment
D. useful data
373. Which of following is used in the Acting
368. A computer system can use it to perform level?
a task without using instructions from us,
relying on patterns and inference instead. A. Image Recognition
A. Algorithm B. Speech Recognition
B. Machine Learning C. Speech Generation
C. Deep Learning D. All of above
D. Neural Network 374. A boy is riding his bike and is repeat-
369. which of the following is not a perfor- edly falling, but with time he starts to stop
mance metric falling. Which example of ML is this?
A. Precision A. Supervised
B. Recall B. Unsupervised
C. Association rules C. Reinforced
D. Accuracy D. Deep Learning

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 585

375. is the process of dividing datasets 380. What is a way to prevent overfitting?
into different categories or groups by A. Abstraction
adding labels.

PRACTICE BOOK» NOT FOR SALE


B. Decomposition
A. Regression
C. Cross validation
B. Clustering
D. none of above
C. Classification
381. Ms. Taylor needs to send a message to
D. K-means
one of her students to turn his camera on.
376. A retail company wants to deploy a ma- Which would she use to communicate with
chine learning model to predict the demand the student?
for a product using sales data from the A. Send an email
past 5 years.What is the MOST efficient
B. Use the chatbox.
solution that the company should imple-
ment first? C. use the annotation tool
A. Regression D. Type it across the screen on the zoom
call.
B. Multi-class classification
C. Binary class classification 382. What kind of dataset is used for final
testing of Machine Learning Model?
D. none of above
A. Train set
377. Machine learning depends on? B. Validation set
A. how smart the person on the computer C. Test set
is
D. Final set
B. having a good machine
383. Group different cats based on their looks
C. accessing an ever-growing database
of increasingly complex information A. Cluster
D. All option correct B. Class
C. Regression
378. What type of Supervised learning de-
pends on given concrete examples? D. none of above

A. Regression 384. Classification is divided into generative


B. Classification classifier and

C. Decision Tree A. artificial intelligence


B. deep learning
D. none of above
C. discriminative
379. At what stage of the data science lifecy-
D. probability
cle do you optimize the parameters?
A. Training the model 385. To predict which customers are more
likely to purchase BANCA, a machine learn-
B. Evaluating the model
ing needs historical data of customers
C. Deploying the model who:
D. none of above A. bought banca

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 586

B. declined to buy banca 391. How do you choose the root node while
C. both bought banca and who declined constructing a Decision Tree?
to buy banca A. An attribute having high entropy
D. all customers of TCB B. An attribute having largest information
gain
386. If we decrease the input variable by one
unit in a simple linear regression model. C. An attribute having high entropy and
How many units of the output variable will Information gain

NARAYAN CHANGDER
change? D. None of the Mentioned
A. reduced by Intercept 392. What is data? I. Computer readable in-
B. increased by Intercept formation II. Information collected about
the physical world III. Programs that pro-
C. increased by Slope
cess images IV. Graphs and charts
D. reduced by Slope
A. II and IV
387. Artificial Intelligence is superset of & B. I and II
,
C. I, II, and IV
A. Machine Learning & Neural Networks
D. I, II, III, and IV
B. Machine Learning & Deep Learning
393. Which of the following is true about
C. Deep Learning & Neural Networks Lasso and Ridge Regression?
D. none of above A. Ridge regression uses subset selec-
388. Select the correct option for creating real- tion of features
time inferencing environments: B. Lasso regression uses subset selec-
A. Create manually from Azure ML studio tion of features
user interface C. Both uses subset selection of features
B. Create programmatically using code
C. Both D. None of them are used for subset se-
lection of features
D. None
394. Which of the following function is used
389. Which machine learning type is directly by Logistic Regression to convert the prob-
related to labels? ability in between [0, 1]
A. Supervised A. Sigmoid
B. Unsupervised B. polynomial
C. Reinforcement Learning C. square
D. deep-learning D. rbf
390. What is intelligence? 395. The k-means algorithm is a
A. Storing or keeping lots of information A. Supervised learning algorithm
B. The ability to acquire and apply skills B. Unsupervised learning algorithm
C. Being emotional C. Semi-supervised learning algorithm
D. Being heartless D. Weakly supervised learning algorithm

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 587

396. The model learns and updates itself C. It is based on Bayes’ theorem.
through reward/punishment in case of D. It is not used in data mining.

PRACTICE BOOK» NOT FOR SALE


A. Supervised learning algorithm
402. A computer system can use it to perform
B. Unsupervised learning algorithm a task without using instructions from us,
C. Semi-supervised learning algorithm relying on patterns and inference instead.
It is seen as a subset of artificial intelli-
D. Reinforcement learning algorithm
gence
397. Which is the correct structure of a Neural A. Algorithm
Network? B. Machine learning
A. Output, Hidden Layer, Input C. Neuron
B. Hidden Layer, Input, Output D. Neural network
C. Input, Hidden Layer, Output
403. which is not a machine learning applica-
D. none of above tion of linear regression
398. Text Recognition (spam or no-spam) is an A. prediction software cost
example of B. prediction crime rates
A. Classification C. prediction peoples names
B. Clustering D. prediction real estate prices
C. Regression 404. What means was devised to help work
D. none of above out whether or not a computer can think
like a human?
399. Identify coins (what is the coin? 1$, AED,
A. IQ Test
£)
B. AI Test
A. Cluster
C. Turing Test
B. Class
D. Machine Learning
C. Regression
405. is the task of classifying the elements
D. none of above
of a set into more than two groups on the
400. How many elements can provides Confu- basis of a classification rule
sion Matrix A. Linear regression
A. 4 B. Non linear Regression
B. 6 C. Multi classification
C. 8 D. Binary Classification
D. 9 406. Uriel uses a step by step approach to
solve a scientific equation. This also called
401. Which among the following is not true for
a Bayesian classifier?
A. an algorithm
A. A (natural) class is to predict the val-
ues of features for members of that class. B. a problem solving strategy
C. the scientific method
B. It is a probabilistic model. D. UPS check

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 588

407. An example of ‘machine learning’ is C. Neural Network


A. a calculator that can do hard math D. Case-based
problems
412. What is the concept of reinforcement
B. voicemail messages of your favorite
learning?
celebrities
C. installing a new hard drive on a com- A. Learning from labeled data
puter B. Learning from unlabeled data

NARAYAN CHANGDER
D. a machine that improves performance C. Learning from environment
based on watching a human do the same
D. none of above
task

408. What are the different types of machine 413. The ability of a computer to understand
learning? human language is called

A. Supervised, unsupervised and rein- A. NLP


forcement learning B. Computer Vision
B. Algorithms, decomposition and pseu- C. Medical Science
docode
D. none of above
C. Images, labels and rewards
D. none of above 414. What is the term known as on which the
machine learning algorithms build a model
409. One of the types of problems solved us- based on sample data?
ing machine learning where the output
A. Data Training
variable is a continuous quantity and the
main aim is to forecast or predict. B. Training Data
A. Regression C. Transfer Data
B. Classification D. Test Data
C. Clustering
415. Weather forecast
D. none of above
A. Cluster
410. Can the boosting technique be applied to B. Class
regression problem? Can Bagging be ap-
plied to regression problem? C. Regression
A. No, No D. none of above
B. No, Yes 416. data sets
C. Yes, No
A. A group of people or things having
D. Yes, Yes something in common
411. Machine Learning has various function B. a smaller part of a category sharing a
representation, which of the following is common attribute.
not numerical functions? C. all data collected
A. Linear Regression D. used to let one part of the code or
B. Support Vector Machines project communicate with another part

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 589

417. has been used to train vehicles C. linear predictions


to steer correctly and autonomously on D. label predictions
road.

PRACTICE BOOK» NOT FOR SALE


A. Machine Learning 423. KNN algorithm requires
B. Data mining A. More time for training
C. Neural Networks B. More time for testing
D. Robotics C. Equal time for training and testing

418. Agglomerative clustering follows . D. None of the Mentioned

A. top down approach. 424. How do you handle missing or corrupted


B. bottom up approach data in a dataset?
C. partitional clustering A. Drop missing rows or columns
D. model based clustering B. Replace missing values with
mean/median/mode
419. Type of machine learning algorithm used
C. Assign a unique category to missing
to infer information from data without in-
values
put from humans.
D. All of the above
A. Dataset
B. supervised learning 425. In which technique you can depict a rela-
C. unsupervised learning tion between two variable using a straight
line
D. Classifiers
A. Linear regression
420. Who is the Chess grand master beaten in B. Logistic regression
a game by I.B.M.’s system?
C. Gradient Descent
A. Gary Kapov
D. Greedy algorithms
B. Garry Kasper
C. Gary Kasparov 426. In SVM, non linear problem can be solved
by transforming data from dimen-
D. Gary Kerpov
sional space into dimensional space.
421. what is regression in supervised learning A. high, low
A. like teaching a kid how to ride a bike B. low, high
B. helping them till they understand C. low, medium
C. classify things by their features D. medium, high
D. giving concrete known examples to the
computer 427. The cells that make up the nervous sys-
tem are called
422. turning linear regression methods out-
A. Glial
puts into prediction about labels. the tech-
nique for doing this is called: B. Neurons
A. logistic regression C. Myelin
B. linear regression D. Neurocytes

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 590

428. Which machine learning algorithm helps 433. In classification, output can only be
to see the algos graphically:
A. 1
A. Decision Tree
B. 2
B. KNN
C. 3
C. Support Vector Machine
D. 4
D. Random Forest Algorithm
434. Researcher adds a new feature to the lin-

NARAYAN CHANGDER
429. focuses on the development of com- ear regression model. What would be the
puter programs that can access data and impact on R-square?
use it learn for themselves.
A. R-square will not change
A. Deep Learning
B. R-square will increase
B. Data Science
C. R-square will decrease
C. Artificial Intelligence
D. There is not enough information to
D. Machine Learning make conclusions about R-square

430. Suppose there is a basket which is filled 435. Which of the following is also called as
with some fresh fruits, apple, banana, exploratory learning?
cherry, grape. the task is to arrange the
A. Supervised learning
same type of fruits at one place. here the
example of? B. Active learning
A. Supervised Learning C. Unsupervised learning
B. Unsupervised Learning D. Reinforcement learning
C. Reinforcement Learning 436. What is Gini Impurity?
D. Semi-supervised Learning A. Gini Impurity measures the disorder of
a set of elements
431. Machine Learning is a subset of
B. Its an impurity in tree
A. Deep Learning
C. Gini is the name of the person who in-
B. Data Science
vented the decision tree
C. Artificial Intelligence
D. None of the above
D. IoT
437. Many people question whether an AI can
432. Which of the following is a type of learn- make ethical decisions. What do we mean
ing that depends on features to group ob- by ETHICS?
jects?
A. The laws of particular country
A. Supervised Learning
B. The rules of behaviour imposed by a
B. Unsupervised Learning programmer or the AI creator
C. Reinforcement Learning C. A set of moral principles
D. none of above D. Human emotions

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 591

438. A good clustering is one having B. Decision tree


A. Low inter-cluster distance and low C. KNN

PRACTICE BOOK» NOT FOR SALE


intra-cluster distance D. Logistic regression
B. Low inter-cluster distance and high
444. To identify and categorize opinions in
intra-cluster distance
text, in order to work out if the writer’s
C. High inter-cluster distance and low attitude is positive, negative, or neutral.
intra-cluster distance
A. Predictive model
D. High inter-cluster distance and high
B. Reinforcement learning
intra-cluster distance
C. Sentiment analysis
439. A set of instructions to follow in order to D. Decision tree learning
solve a problem
A. Algorithm 445. Which of these is NOT an AI technology
A. Facial recognition
B. Machine Learning
B. Image recognition
C. Neuron
C. Robotics
D. Noural Network
D. Animation
440. The classification of spam mail and nor-
mal mail falls under category. 446. what can also be considered as super-
vised learning
A. Binary Logistic Regression
A. data learning
B. Multinomial Logistic Regression
B. data visualization
C. Ordinal Logistic Regression
C. data algorithims
D. Linear Regression
D. data clustering
441. What year was the E.N.I.A.C. first in-
447. What is meant by the number of estima-
vented?
tors:
A. 1904 A. The number of base estimators in the
B. 1914 ensemble.
C. 1940 B. The number of features
D. 1490 C. The number of accuracies

442. clustering is: D. The number of data rows

A. supervised learning 448. After the data has completed the feature
engineering operation, in the process of
B. unsupervised learning
constructing the model, which of the fol-
C. reinforced learning lowing options is not a step in the decision
D. unreinforced learning tree construction process?
A. Pruning
443. If we didn’t assign a base estimators to
the bagging classifier it will use by de- B. Feature selection
fault: C. Data cleaning
A. Linear regression D. Decision tree generation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 592

449. A field in the dataset used in the machine 454. Random Forest concepts are used to over-
learning algorithm. E.g. happy and sad come
A. Dataset A. over fitting
B. unsupervised learning B. complications in data
C. supervised learning C. complexity in model
D. Classifiers D. data noise
455. What kind of learning algorithm for “Fa-

NARAYAN CHANGDER
450. data has both the input and out-
put parameters in a completely machine- cial identities or facial expressions”?
readable pattern. A. Recognizing Anomalies
A. Supervised B. Prediction
B. Labeled C. Generating Patterns
C. UnLabelled D. Recognition Patterns

D. None of the above 456. The most commonly used cost function for
linear regression is
451. Cross validation is used for
A. Bias
A. Comparing predictors
B. RMSE
B. Selecting parameters in prediction C. Variance
function
D. none of above
C. Selecting variables to include in a
model 457. X1, Y1 X2, Y2. Which type of regression
is this?
D. All of the mentioned
A. Linear Regression
452. Which of these words can define that
B. Logistic Regression
these are spam mails by our previous
records? C. Polynomial Regression
A. Greetings D. Stepwise Regression

B. Lottery 458. what is classification in supervised learn-


ing
C. Cheap
A. like teaching a kid how to ride a bike
D. All of these
B. helping them till they understand
453. What was the meaning of Parch and C. classify things by their features
Sibsp columns in titanic dataset:
D. giving concrete known examples to the
A. Sibsp-Number of Siblings/Spouses computer
AboardParch-Number of Parents/Children
Aboard 459. What is “ML”?
B. Sibsp-Number of special siblings A. Maternity Leave
Parch-To make someone dry B. Mixed Language
C. None of these C. Missing Link
D. These columns were not there D. Machine Language

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.16 machine learning 593

460. which of the following is not a method of 465. Which of the following is the model used
cross validation? for learning?

PRACTICE BOOK» NOT FOR SALE


A. Leave One Out CV A. Decision trees
B. K-Fold CV B. Neural networks
C. Stratified K-Fold CV C. Propositional and FOL rules
D. Timeline CV D. All of the mentioned
461. The Q-learning algorithm is a
466. The entropy of a given dataset is zero.
A. Supervised learning algorithm This statement implies what?
B. Unsupervised learning algorithm A. further splitting is required
C. Semi-supervised learning algorithm B. no further splitting is required
D. Reinforcement learning algorithm C. Need some other information to de-
cide splitting
462. The purpose of simple linear regression
analysis is to: D. None of the Mentioned
A. Replace points on a scatter diagram by
467. To find the minimum or the maximum of
a straight-line
a function, we set the gradient to zero be-
B. Obtain the expected value of the inde- cause:
pendent random variable for a given value
A. The value of the gradient at extrema of
of the dependent variable
a function is always zero
C. Predict one variable from another vari-
able B. Depends on the type of problem

D. none of above C. Both A and B


D. None of the above
463. which is an area of machine learning con-
cerned with how software agents ought 468. is a modeling error that occurs when
to take actions in an environment in order a function is too closely fit to a limited set
to maximize the notion of cumulative re- of data points.
ward.
A. under fitting
A. Super Learning
B. over fitting
B. Un supervised Learning
C. linear fitting
C. Reinforcement Learning
D. logistic fitting
D. None

464. In history of ML which among the follow- 469. ‘6. What year did Artifical Intelligence
ing is a discovered Test as first test of AI? first stirred excitement?

A. Turing test A. 1905


B. Perceptron Test B. 1950
C. Nearest Neighbour test C. 1590
D. None of the above D. 1915

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 594

470. Which of following is TRUE about “ AI A. Machine Learning


agent”? B. Deep Learning
A. Each AI environment contains one
C. Neural Networks
agent.
D. none of above
B. Perceiving its environment through
sensors 473. Measures the percentage of the actual
C. Perceiving its environment through ac- positive class that is correctly predicted. It
tuators. is the capture rate.

NARAYAN CHANGDER
D. All of above. A. Recall
471. Simple regression is a relationship be- B. Specificity
tween 2 or more variables C. F1 Score
A. Linear D. none of above
B. Non Linear
474. Which the following clustering algorithm
C. Categorical uses a dendogram?
D. Systematical
A. Complete linkage clustering
472. This requires computer scientists to B. K-means clustering
formulate general-purpose learning algo-
rithms that help machines learn more than C. DBSCAN
just one task. D. None of the above

1.17 Cloud computing


1. Benefits of Virtualization A. Data Center Processing
A. Isolation B. Cloud Computing
B. Encapsulation C. Networking
C. Hardware Independence, Portability D. Internet Usage
D. Hardware Independence, Portability, 4. The program which provide partitioning,
Encapsulation, Isolation isolation or abstraction is called?
2. According to best practices, how should an A. virtualization hypervisor
application be designed to run in the AWS B. software hypervisor
Cloud?
C. hardware hypervisor
A. Use tightly coupled components.
D. system hypervisor
B. Use loosely coupled components.
C. Use infrequently coupled components. 5. IaaS offer non-standard machine to cus-
tomers.
D. Use frequently coupled components. A. true
B. false
3. What is the process of using third party
servers to store data and run online appli- C. it depends upon use
cations? D. none of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 595

6. diagram displays the relationships of B. OS


entity set stored in a database C. Application stack

PRACTICE BOOK» NOT FOR SALE


A. Entity relationship
D. Access controls
B. Flowchart
12. Cloud Computing offer their services
C. Usecase diagram
through model
D. Data Flow Diagram
A. Standalone application model
7. A disadvantage of cloud computing is B. Console Application
A. You need an internet connection to ac- C. Web-based business model
cess the data or software
D. Framework model
B. You need an internet connection to ac-
cess your LAN 13. Which solution should you choose if you
C. You cannot use a device that is con- need full control over the servers, storage,
nected to the internet OS and applications?
D. You need local storage to manage the A. IaaS
data backups B. PaaS
8. The characteristics of what is now being C. SaaS
called cloud computing. D. On-premise
A. Internet
14. The types of AMI provided by AWS are
B. Software
A. Instance store backed
C. Web Service
D. All of the mentioned B. EBS backed
C. Both 1 & 2
9. Which of the following is essential concept
related to Cloud? D. S3
A. Reliability 15. part of the MapReduce is responsible
B. Productivity for processing one or more chunks of data
and producing the output results.
C. Abstraction
A. Maptask
D. All of the mentioned
B. Mapper
10. Who is believed to have invented cloud
storage? C. Task execution

A. Ada Lovelace D. All the answer are correct


B. J. C. R. Licklider 16. How much storage does Google give a stu-
C. Bill Gates dent user for free in Google Drive?
D. Steve Jobs A. 1GB
B. 5GB
11. SaaS providers manage and secure all the
following except: C. UNLIMITED
A. Infrastructure D. 50GB

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 596

17. Storage classes available with Amazon s3 22. Which of the following service provider
are- provides the highest level of service?
A. Amazon S3 standard A. SaaS
B. Amazon S3 standard-infrequent Ac- B. PaaS
cess C. IaaS
C. Amazon Glacier D. All of the mentioned
D. All of the above

NARAYAN CHANGDER
23. is a free tier eligible instance type
18. hides the limitations of Java behind a A. c5.large
powerful and concise Clojure API for Cas- B. t2.micro
cading.
C. t2.small
A. Scalding
D. m4.xlarge
B. HCatalog
C. Cascalog 24. Which among the following is true for EBS
Snapshort
D. All of the mentioned
A. EBS snapshots fully support EBS en-
19. A is a combination load balancer and cryption.
application server that is a server placed B. EBS snapshots partially only support
between a firewall or router. EBS encryption.
A. ABC C. EBS snapshots doesn’t support Encryp-
tion
B. ACD
D. Encryption doesn’t applicable to EBS
C. ADC
D. All of the mentioned 25. When companies store data using cloud
technologies, to keep things secure, the
20. Which of the following architectural stan- data will be
dards is working with cloud computing in- A. Qualified
dustry?
B. Decrypted
A. Service-oriented architecture
C. Protected
B. Standardized Web services
D. Encrypted
C. Web-application frameworks
26. Which of the following is NOT a Cloud com-
D. All of the mentioned puting challenge?
21. Why web-based business are more popu- A. security and legal risks
lar? B. defining a contract
A. advances in technology C. hiring IT-specialists
B. security D. lock-in risks
C. internet speeds
27. Please choose the advantage of Azure
D. All the above that best matches the description:storage,

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 597

speed or bandwidth can be increased when 32. is a utility which allows users to cre-
necessary ate and run jobs with any executables as
the mapper and/or the reducer.

PRACTICE BOOK» NOT FOR SALE


A. Security
B. Availability A. Hadoop Strdata

C. Scalability B. Hadoop Streaming


D. Development environment C. Hadoop Stream
D. None of the mentioned
28. Which of the following type of virtualiza-
tion is also characteristic of cloud comput-
33. is the basis for Web services
ing?
A. XML
A. Storage
B. CSS
B. Application
C. CPU C. CGI

D. All of the mentioned D. PHP

29. A in VPC contains a set of rules, called 34. This is a logical unit of storage in Ama-
routes, that are used to determine where zon Web Services (AWS) object storage
network traffic is directed. service, Simple Storage Solution S3. Buck-
ets are used to store objects, which con-
A. Gateway table
sist of data and metadata that describes
B. Switch the data.
C. Router A. Caching
D. Route table B. Databases
30. WHICH OF THE FOLLOWING IS NOT AN C. Bucket Storage
AUTHENTICATION MECHANISM D. Virtual machine
A. OTP
35. Secondary storage is used for
B. OAuth
C. SSO A. Storing data being used by the com-
puter
D. SAML-TOKEN
B. Storing programs to be used immedi-
31. Cloud computing architecture is a combina- ately by the arithmetic and logic unit
tion of? C. Long-term storage of data
A. a) service-oriented architecture and
D. Storing programs being executed
grid computing
B. b) service-oriented architecture and 36. Amazon cloud services does not include
event-driven architecture. A. Elastic Compute Cloud
C. c) virtualization and event-driven archi-
B. Simple Queue Service (SQS)
tecture.
C. SimpleDB
D. utility computing and event-driven ar-
chitecture. D. Live Services

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 598

37. Cloud Computing refers to 43. Cloud computing has its root back in
A. Accessing the Hardware A. 1970s
B. Configuring the Hardware B. 1960s
C. Manipulating the Hardware C. 1950s
D. All of the above D. 2000s
38. Microsoft’s Hyper-V is a 44. The allows systems and services to be

NARAYAN CHANGDER
A. Application accessible within an organization.
B. Component A. Public Cloud
C. hardware B. Private Cloud
D. client C. Community Cloud

39. Default size of EC2 instance created with D. Hybrid Cloud


Windows AMI is 45. Amazon’s EC2, Google App Engine and
A. 8GB BOINC are example for
B. 16GB A. Cloud applications
C. 30GB B. compute clouds
D. 50 GB C. Web applications
40. A system is an application that is ac- D. SaaS
cessed via HTTP
46. Which of the architectural layer is used as
A. distributed a front end in cloud computing?
B. web-based A. client
C. parallel B. cloud
D. grid C. soft
41. In Virtualization, which architecture pro- D. all of the mentioned
vides the virtual isolation between the
several tenants? 47. IBM Cloud offers &
A. IT architecture A. SaaS & PaaS
B. Business architecture B. SaaS & IaaS
C. Multitenant C. PaaS & IaaS
D. Deployment D. SaaS, Paas & IaaS

42. enables the migration of the virtual im- 48. is the largest Chinese cloud computing
age from one physical machine to another. company
A. visualization A. Alibaba
B. virtualization B. Rackspace
C. migration C. DigtialOcean
D. virtual transfer D. VMware

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 599

49. What is the term for delivering an applica- 55. When architecting cloud applications,
tion over the internet called? which of the following are a key design
principle?

PRACTICE BOOK» NOT FOR SALE


A. PaaS
B. Faas A. Use the largest instance possible
C. SaaS B. Provision capacity for peak load
D. laaS C. Use the Scrum development process
50. . Which of the following is a billing and D. Implement elasticity
account management service?
A. Amazon Elastic MapReduce 56. The technology used to distribute service
requests to resources is referred to as
B. Amazon Mechanical Turk
C. Amazon DevPay A. load performing

D. Multi-Factor Authentication B. load scheduling

51. Below is a list of cloud infrastructure com- C. load balancing


ponents except D. all of the mentioned
A. Storage components
57. Although the Hadoop framework is imple-
B. Physical server
mented in Java, MapReduce applications
C. Private cloud need not be written in:
D. Network components A. apple
52. Which of the following is another name for B. Java interface
the system virtual machine?
C. c$
A. hardware virtual machine
D. C
B. software virtual machine
C. real machine 58. The default permission for bucket and ob-
D. none of the mentioned jects in S3 is

53. Cloud computing is a system and it is A. Block public access


necessarily unidirectional in nature. B. Anyone can access
A. Stateless C. Read only
B. Stateful
D. R/W
C. Reliable
D. All of the above 59. Which of the following is the machinery
for interacting with Amazon’s vast prod-
54. What second programming language did uct data and eCommerce catalog function?
Google add for App Engine development?
A. Amazon Elastic Compute Cloud
A. C++
B. Flash B. Amazon Associates Web Services

C. Visual basic C. Alexa Web Information Service


D. java D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 600

60. Which of the following refers to the client C. cloud computing


part of cloud computing system? D. collaborative computing
A. Front end
66. Which of the following services in AWS en-
B. Back end ables end to end tracing of requests
C. Infrastructure A. Cloudwatch
D. Management B. Cloudtrail

NARAYAN CHANGDER
61. I have local network and data centre, But C. X-Ray
i like to integrate them into cloud account. D. none of above
What type of solution you will prefer for
it? 67. USB stands for
A. Hybrid A. Universal Serial Bus
B. Private B. Unified Serial Bus
C. Public C. Universal Signal Bus
D. Local network D. Unified Signal Bus

62. is a general, collective term that refers 68. Cloud computing is also a good option
to the delivery of anything as a service when the cost of infrastructure and man-
agement is
A. SaaS
A. low
B. PaaS
B. high
C. IaaS
C. moderate
D. XaaS
D. none of the mentioned
63. Which is not an advantage of Grid?
69. Which among the following is Edge Com-
A. Scalable puting Service of AWS
B. uses unused computing power A. AWS RDS
C. provide standard and high cpu B. AWS EBS
D. multi-tenancy C. AWS EC2
D. AWS Snow family
64. A is a party that can perform an inde-
pendent examination of cloud service con- 70. Amazon Web Services is an example of
trols
A. Infrastructure as a Service
A. Cloud service providers
B. Software as a Service
B. Cloud Broker
C. Platform as a Service
C. Cloud Consumer
D. None of these
D. cloud auditor
71. Which of these files can be created in
65. Cellular network is an example of Google Drive?
A. P2P computing A. Google Docs
B. Distributed computing B. Google Forms

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 601

C. Google Sites 77. SWIGGY.IN formed a cloud for its all


branches but due to its limited resources it
D. All of these
obtained theservices of AWS for extended

PRACTICE BOOK» NOT FOR SALE


provisioning and thus modified its cloud ;
72. computing refers to applications and
The cloud so formed is the example of
services that run on a distributed network
using virtualized resources A. Private cloud
A. Distributed B. Public cloud

B. Cloud C. Hybrid cloud


D. community cloud
C. Soft
D. Parallel 78. Which computing refers to applications
and services that run on a distributed net-
73. Which of the following is not an actor in work using virtualized resources?
cloud computing? A. Distributed
A. cloud consumer B. Cloud
B. cloud provider C. Soft
C. cloud carrier D. Parallel

D. cloud monitor 79. Which of the following is not an examples


of Type 1 hypervisors?
74. How many types of Cloud are there in De- A. VMware ESXi
ployment Models?
B. Citrix XenServer
A. 3
C. VMware Player
B. 2
D. Microsoft Hyper-V hypervisor
C. 4
80. Live & Regular migration are the tech-
D. 5 niques of

75. SaaS does not necessarily mean that the A. Virtual Machine
software is? B. Virtual Machine Migration
A. dynamic C. Security Isolation

B. static D. Resource Isolation

C. sololithic 81. Name the two types of low level clouds


D. diolithic A. Altostratus and Altocumulus
B. Cirrus and Cumulus
76. Example of Platform as a service(PaaS)
C. Cirrocumulus and Cumulonimbus
A. Gmail D. Stratus and Nimbostratus
B. Hotmail
82. is a general term used to describecom-
C. Microsoft Azure puting that takesplace over the Internet
D. Amazon EC2 A. Cloud Computing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 602

B. Network Computing 88. Which tool is used for messuring I/O of


C. Storage Computing systems transaction costs
D. None of the choices A. EBS
B. IOSTAT
83. Which of the following is a benefit of cloud
computing? C. cloud watch

A. The ability to make a backup copy of D. Nagios


your cloud computing software 89. Cloud technology has improved educa-

NARAYAN CHANGDER
B. The reliability of locally installed appli- tional scenery except
cations A. Lower cost
C. Scalable storage capacity B. Creation of virtual classroom
D. Needs to be installed on the computer. C. Increase learning time
84. What is the pricing model that enables the D. Better access to education and train-
cloud customers to pay for the resources ing
on a as-needed basis 90. Which of the following is the deployment
A. pay as you buy model?
B. pay as you go A. public
C. pay as you reserve B. private
D. pay as you decommision C. hybrid
85. When we create a Virtual Machine in D. all of the mentioned
Cloud, it called as which model? 91. has many of the characteristics of
A. Platform as a Service what is now being called cloud computing.
B. Infrastructure as a Service A. Internet
C. Software as a Service B. Softwares
D. Container as a Service C. Web Service

86. Which of the following provides commands D. All of the mentioned


for defining logic using conditional state- 92. Which of the following is NOT a key char-
ments? acteristic of Cloud Computing?
A. XML A. external provider
B. WS-BPEL B. virtualization
C. JSON C. scalability
D. None of the mentioned D. utility
87. Which one of the following is not protected 93. data represents more than 50 percent
by Data Protection. of the data created every day.
A. A person’s address. A. Shadow
B. A person’s date of date birth. B. Light
C. A person’s first name. C. Dark
D. A person’s dental history. D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 603

94. ensures that your group has this many 99. Simple Storage Service use for?
instance at any given time A. It allows the users to store and re-

PRACTICE BOOK» NOT FOR SALE


A. Minimum capacity trieve various types of data using API
calls.
B. Desired Capacity
B. It does contain computing element.
C. Mazimum Capacity
C. Both A and B
D. Autoscaling Group
D. None of the above
95. What is/are the risks in cloud? 100. Long form of SOAP is
A. Confidentiality A. Secure Object Access Protocol
B. Lack of control over performance B. Simplified Object Arbitary Protocol
C. Lack of control over quality C. Simple Object Access Protocol
D. None of these
D. All the above
101. Which of the following is a type of cloud
96. The number of maps is usually driven by computing service?
the total size of
A. Service-as-a-Software (SaaS)
A. inputs
B. Software-and-a-Server (SaaS)
B. outputs C. Software-as-a-Service (SaaS)
C. tasks D. Software-as-a-Server (SaaS)
D. None of the mentioned 102. An IT department for a large trucking
company needs this type of scalable cloud-
97. Example of Infrastructure as a ser- based service that will provide storage,
vice(IaaS) virtual network services and software.
A. Gmail A. IaaS
B. Rackspace B. PaaS
C. Hotmail C. SaaS
D. Microsoft Azure D. ITaaS

103. According to research by Nasuni in 2013,


98. How can a student with a Windows 10
how much data is stored in the cloud?
laptop work with a Windows 2000 only
application? A. 1 exabyte
A. Run the application with administrator B. 1 petabyte
permissions. C. 500 petabytes
B. Use the Windows Compatibility mode. D. 1 yottabyte
C. Use safe mode when Installing the ap- 104. Compared with SAN, which of the follow-
plication. ing is not an advantage of NAS?
D. Create a Windows 2000 virtual ma- A. The file system of NAS supports a sin-
chine. gle file with higher specifications.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 604

B. NAS supports more files. 110. Which of the following behaves like the
entry point of the monitor and reroutes the
C. Block data transmission is optimized.
instructions of the virtual machine?
D. File sharing is optimized.
A. Dispatcher
105. Which of the following is highest degree B. Allocator
of integration in cloud computing?
C. Interpreter
A. IaaS
D. Both A and B

NARAYAN CHANGDER
B. Caas
C. Paas 111. What are clouds made out of?

D. SaaS A. Molecules of pure oxygen


B. ozone and carbon dioxide
106. is a pay-as-you-go model matches re-
sources to need on an ongoing basis. C. water droplets, dust, and smoke parti-
cles
A. Utility
D. 78% nitrogen, 21% oxygen, and 1%
B. Elasticity other gases
C. Low barrier to entry
112. A third-party provider hosts applications
D. All of the mentioned
and makes them available to customers
107. Utility computing is based on? over the Internet.

A. Grid Computing Model A. SaaS

B. Pay-per-Use model B. IaaS

C. virtual isolation Model C. Paas

D. SOA Model D. Traditional model

108. enables batch processing, which 113. When you add a software stack, such as
greatly speeds up high-processing applica- an operating system and applications to
tions. the service, the model shifts to model

A. Scalability A. IAAS

B. Reliability B. PAAS
C. Elasticity C. SAAS
D. Utility D. CAAS

109. Which of the following belongs to the 114. is the central application in the AWS
SaaS mode of Apple CLOUD? portfolio.
A. Elastic Volume Service (EVS) A. Amazon Simple Queue Service
B. Elastic cloud server (ECS) B. Amazon Elastic Compute Cloud
C. Object Storage Service (OBS) C. Amazon Simple Notification Service
D. Facial recognition D. Amazon S3

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 605

115. Which of the following risks is actually in- B. It is safer


creased by cloud-specific security technolo-
C. Can access files anywhere you have in-
gies?

PRACTICE BOOK» NOT FOR SALE


ternet
A. Increased/shared attack surface
D. Expensive
B. Configuration and vulnerability man-
agement
121. is a cloud services provided on a net-
C. Identity management work for public use.
D. Administrative access control A. Private cloud
116. Essential componets of cloud auditor B. Public cloud
A. security, Privacy impact, performance C. Hybrid cloud
D. Community cloud
B. Privacy impact, performance
C. security, 122. What is the main feature of a private
D. Privacy impact cloud?

117. Simple Cloud, jclouds and Libcloud are all A. Customers, or tenants, maybe differ-
examples of: ent individuals or groups within a single
company
A. Vendor-specific cloud APIs
B. Customers, or tenants, maybe differ-
B. Cross-platform APIs
ent individuals or groups from different
C. IaaS APIs companies.
D. Apache APIs C. Customers, or tenants within a single
118. A is a standard unit of software that company on a PC
packages up code and all its dependencies D. none of above
A. Docker
123. What is pay-as-you-go model?
B. NGINX
C. Container A. You need to pay everything upfront
D. Virtual Machine B. No need to pay, until you use it

119. In personal computing, a platform is the C. Use and pay sometime later
and on which software applica- D. After use some functions in cloud, you
tions can be run. need to pay immediately
A. basic hardware & software
B. computer & operating system 124. AWS S3 supports to get the previous
version of the data
C. computer & user
A. Data versioning
D. computer & software
B. Previous Version
120. What is an advantage of Cloud Comput-
ing? C. Snapshot
A. Can access you files anywhere D. Backup

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 606

125. as a Service is a cloud computing in- 130. A hybrid cloud combines multiple clouds
frastructure that creates a development where those clouds retain their unique
environment upon which applications may identities but are bound together as a
be built. unit.
A. Software A. Public
B. Platform B. Private
C. Infrastructure C. Community

NARAYAN CHANGDER
D. Hardware D. Hybrid

131. Which of the following entity is responsi-


126. contains more than one computer-
ble for making a service available to inter-
which communicates with others through
ested parties?
an interconnected network.
A. Cloud Monitor
A. Client server computing
B. Cloud Broker
B. Peer to Peer Computing
C. Cloud Provider
C. Distributed Computing
D. Cloud Auditor
D. None of these
132. Operating System is an interface be-
127. Which of the following is considered an tween and
essential element in cloud computing by
A. Hardware & Software
CSA?
B. Computer & User
A. Multi-tenancy
C. Hardware & Applications
B. Identity and access management
D. All of the above
C. Virtualization
D. All of the mentioned 133. Encrypted means what?
A. Online data for all to see
128. Which of the architectural layer is used
B. Online data isn’t available until the
as backend in cloud computing?
user clicks a button
A. client C. Online data is hidden, with a way to
B. cloud see it if one has the network/encryption
key
C. software
D. Online data is hidden, with no way of
D. Network
seeing it
129. Which of the following system does not 134. The construction of multiple web services,
provision storage to most users? sometimes called
A. PaaS A. mashups.
B. IaaS B. splash
C. CaaS C. failover
D. SaaS D. security

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 607

135. Cloud Computing has below layers C. Accessibility


A. User, Software, Platform, Infrastruc- D. Pay as you go

PRACTICE BOOK» NOT FOR SALE


ture, Server
140. The output of the is not sorted in the
B. Client, Application, Platform, Infras-
Mapreduce framework for Hadoop.
tructure, Server
C. Software, Application, Platform, In- A. Mapper
frastructure, Server B. Cascader
D. none of above C. Scalding
136. Which of the following are levels of ac- D. None of the mentioned
cess you can set for files that you share
on Google Drive? 141. Cloud resources could be accessed from

A. Can edit, Can comment, and Can view


A. Desktop Computer
B. Can delete, Can edit, and Can comment
B. Mobile Phone
C. Can share, Can edit, and Can view C. Laptop
D. Can copy, Can download, and Can com- D. All the above
ment
142. refers to the creation of a virtual re-
137. which of the following could be consid- source such as a server, desktop, operat-
ered a drawback of cloud computing espe- ing systems, file, storage or network
cially in OUR SCHOOL
A. Virtualization
A. the need for high speed internet
B. Distributed Computing
B. management of data
C. Cloud Computing
C. absence of hardware
D. Grid Computing
D. wide connection of networks
143. Running a program involves running
138. Which of the following subject area deals
mapping tasks on many or all of the nodes
with pay-as-you-go usage model?
in our cluster.
A. Accounting Management
A. MapReduce
B. Compliance
B. Map
C. Data Privacy
C. Reducer
D. All of the mentioned
D. All of the mentioned
139. When a company needs more bandwidth
than usual, a cloud-based service can 144. Which of the following is not the correct
instantly meet the demand because of benefit of distributed computing.
the vast capacity of the service’s remote
A. performance
servers. This is which advantage of cloud
computing? B. High Availability
A. Flexibility C. Security
B. On Demand Self Service D. Resource sharing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 608

145. provides the run time environment B. Amazon Elastic Compute Cloud
for applications, development and deploy- C. Amazon Simple Notification Service
ment tools, etc.
D. Amazon Simple Storage System
A. IaaS
151. Distributing workloads across multiple
B. PaaS
Availability Zones supports which cloud ar-
C. SaaS chitecture design principle?
D. IDaaS A. Implement automation.

NARAYAN CHANGDER
146. What is the default maximum number of B. Design for agility.
VPCs allowed per region? C. Design for failure.
A. 5 D. Implement elasticity.
B. 10 152. Amazon Web Services, Microsoft Azure,
C. 15 Google Compute Engine are
D. 30 A. IaaS
B. PaaS
147. Which of these options is not a PaaS of-
fering? C. SaaS
A. IBM App Mix D. All of the above
B. Azure App Service 153. is a cloud-based customer relation-
C. AWS Elastic Beanstalk ship management (CRM) platform

D. Google App Engine A. Salesforce


B. Amazon Web Services
148. Which component of the AWS Global In-
C. Google Cloud Platform
frastructure does Amazon Cloudfront use
to ensure low-latency delivery? D. Azure
A. AWS Regions 154. What is the drawback of cloud computing
B. AWS edge locations in education system?
C. AWS Availability Zones A. The need for high speed internet ac-
cess
D. Amazon Virtual Private Cloud (Amazon
VPC) B. The management of data and products

149. Rapid elasticity C. The absence of hardware


A. Resources are provisioned and re- D. The wide connection of networks
leased on-demand
155. A large International company needs a
B. Resources are stretched to capacity
cloud service that will provide functions
C. Resources are paid for by use similar to Google Suite or Office 365.
D. Resources are scalable A. IaaS
150. Which of the following is an online B. PaaS
backup and storage system? C. SaaS
A. Amazon Simple Queue Service D. ITaaS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 609

156. . Which of the following is built on top 161. is the on-demand availability of com-
of a Hadoop framework using the Elastic puter system resources, especially data
Compute Cloud? storage and computing power, without di-

PRACTICE BOOK» NOT FOR SALE


rect active management by the user
A. Amazon Elastic MapReduce
A. Cloud computing
B. Amazon Mechanical Turk
B. Grid computing
C. Amazon DevPay
C. Utility Computing
D. Multi-Factor Authentication
D. Distributed Computing
157. A web server accepts incoming re-
162. Which of the following is not the feature
quests and serves web pages
of Network management systems?
A. HTTP
A. Accounting
B. OSPF
B. Security
C. ICMP C. Performance
D. SMTP D. None of the mentioned
158. Live editing means? 163. Pick the wrong answer from the list
A. Making changes to previous versions A. Cost of EBS volume is less than similler
of the document sized S3 Bucket
B. Multiple users can work on the same B. EBS volume can be used as an instance
document at once. boot partition
C. Adding a sound track to your work C. EBS boot partition can be start and
stop
D. Saving an updated version of the docu-
ment on your local device. D. EBS volume object store

159. How many types of hypervisor are 164. What service distributes incoming traffic
there? across multiple instances?

A. 2 A. Amazon EFS
B. Amazon S3
B. 3
C. Amazon ELB
C. 4
D. Amazon EBS
D. 5
165. Which of the following is an example of
160. Which of the following is not a Kernel- cloud computing?
based Virtual Machine (KVM) manage-
ment tool? A. Using your laptop on an airplane

A. Virsh command set B. Using Wi-Fi to connect to a network


printer
B. QEMU
C. Using Google Drive
C. Virt-Manager
D. All of the options are examples of
D. Libvirt cloud computing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 610

166. which of the following does NOT rely on C. Communication


cloud technologies? D. Thread Management
A. google drive
172. Point out the wrong statement:
B. testout desktop pro
A. All applications benefit from deploy-
C. facebook ment in the cloud
D. microsoft paint B. With cloud computing, you can start
very small and become big very fast

NARAYAN CHANGDER
167. SaaS supports multiple users and pro-
vides a shared data model through model. C. Cloud computing is revolutionary, even
if the technology it is built on is evolution-
A. single-tenancy ary
B. multi-tenancy D. None of the mentioned
C. multiple-instance
173. Downtime may happen due to
D. all of the mentioned
A. loss of power
168. Which of the following is a more sophis- B. low internet connectivity
ticated load balancer? C. data centres going out of service for
A. workload managers maintenance
B. workspace managers D. All the above
C. rackserve managers 174. WHICH OF THE FOLLOWING IS NOT A
D. all of the mentioned PHASE OF KEY MANAGEMENT
A. CREATION
169. What happens to data when you stream
a movie? B. VERIFICATION
A. It gets deleted as you watch it C. MONITORING

B. It is saved on your computer D. DESTRUCTION

C. It is saved on the cloud 175. feature allows you to optimize your


system and capture all possible transac-
D. It gets deleted after you watch the
tions.
whole movie
A. scalability
170. also called as types of cloud.
B. reliability
A. Development model C. elasticity
B. Deployment model D. None of the mentioned
C. Lifecycle model
176. Which of the following are correct tech-
D. None of the above nologies working behind the cloud comput-
ing platforms?
171. A is a network that consists of au-
tonomous computers that are connected A. Virtualization
using a distribution middleware B. SOA
A. Distributed system C. Grid Computing
B. Resource management D. All of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 611

177. is a scalable computer service 183. Which of the following is related to ser-
A. Alibaba vice provided by Cloud?

PRACTICE BOOK» NOT FOR SALE


B. Rackspace A. Sourcing

C. Digitalocean B. Ownership

D. VMware C. Reliability
D. AaaS
178. How close is the closest data center?
A. Dublin, Ireland 184. Select the correct statement.
B. Mountain View, California A. MapReduce tries to place the data and
the compute as close as possible
C. Antartica
D. Tesco Extra New Malden B. Map Task in MapReduce is performed
using the Mapper() function
179. A simple example of SaaS is an online C. Reduce Task in MapReduce is per-
A. Email service formed using the Map() function
B. Server D. All the answer are correct
C. Infrastructure service 185. Which solution should you choose if you
D. Platform service need a pre-built set of applications with
certain business functionality?
180. Cloud Deployment Models
A. IaaS
A. Public Cloud
B. PaaS
B. Private Cloud
C. SaaS
C. Hybrid Cloud, Community Cloud
D. On-premise
D. Hybrid Cloud, Community Cloud, Public
Cloud, Private Cloud 186. NameNode is used when the Primary
NameNode goes down
181. is a cloud computing platform which
is launched by Microsoft A. Rack
A. Windows PowerShell B. Data
B. Azure C. Secondary
C. Windows 10 D. None of the mentioned
D. Windows Server 2019
187. Which cloud is deployed when there is a
182. What is a disadvantages of external budget constraint but business autonomy
hosting? is most essential?
A. Costs less than an external host A. Private cloud
B. Little technical knowledge required B. Public cloud
C. More prone to viruses and hacking C. Hybrid cloud
D. Expensive service D. Community cloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 612

188. Broad network access 193. Amazon S3 is which type of storage ser-
vice?
A. Cloud computing resources are acces-
sible over the network A. Block
B. Resource pooling B. Object
C. Simple
C. Measured service
D. Secure
D. Self-service
194. Which of the following is an example of

NARAYAN CHANGDER
189. The user can scale, through a control an IaaS Cloud service?
panel, the required infrastructure without A. EC2
disrupting operations.
B. S3
A. On demand self service C. DynamoDB
B. Elasticity D. IAM
C. Scalablility 195. Amazon EC2 is an example of
D. Ubiquitous access A. Generic cloud architecture
B. Layered cloud architecture
190. The capability provided to the consumer
is to provision processing, storage, net- C. NIST cloud architecture
works, and other fundamental computing D. all the above
resources is called
196. PAN stands for
A. SaaS
A. Personal Area Network
B. PaaS B. Personal Arena Network
C. IaaS C. Priority Area Network
D. None of the above D. Priority Arena Network

191. Which of the following should be replaced 197. Which Cloud computing service would
with the question mark in the following fig- work well for application development
ure? cloud-computing-questions-answers- companies to develop and test their
virtualization-technologies-q10 apps?
A. SaaS
A. Abstraction
B. IaaS
B. Virtualization
C. PaaS
C. Mobility Pattern
D. ITaaS
D. All of the mentioned
198. applies the resources of numerous
192. Google Apps computers in a network to work on a sin-
gle problem at the same time.
A. SaaS
A. cloud computing
B. PaaS B. grid computing
C. IaaS C. soft computing
D. None of these D. virtual computing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 613

199. Which of the following model allows ven- C. Redundancy


dor to provide security as part of the Ser- D. Security Protocols
vice Level Agreement?

PRACTICE BOOK» NOT FOR SALE


205. is used to convert your application
A. SaaS
into Web-Application.
B. PaaS
A. Browser Action
C. IaaS B. Struts Services
D. none of above C. Java Service
200. What does VPC stand for D. Web Services
A. Virtual Personal Cloud 206. The essential characteristics of cloud com-
B. Virtual Private Cloud puting
C. Virtual Private Compute A. On-demand self service, Broad Net-
work service, Resource pooling, Rapid
D. Virtual Processing Cloud
elasticity, Managed Service
201. EC2 stands for B. Rapid elasticity, Managed Service
A. Elastic Cloud Compute C. Managed Service, On-demand self ser-
B. Elastic Compute Cloud vic
C. Elastic Cloud Computing D. Managed Servic

D. none of above 207. A single instance of a software applica-


tion serves multiple customers.
202. How much monthly is a extra 200Gb for
A. Multi-tenancy
icloud?
B. Tenancy scaling
A. 2.49
C. Elastic tenancy
B. 0.79
D. Multi-scalable
C. 1.49
208. A short range technology that can connect
D. 3.00
multiple devices such as smartphones and
203. These cloud services are of the form of speakers in a small area.
utility computing i.e. the uses these A. Infra-red
services pay-as-you-go model.
B. Wi-Fi
A. Cloud providers C. Drone
B. Clients D. Bluetooth
C. End users
209. Which of the following tool is designed
D. Cloud users for efficiently transferring bulk data be-
tween Apache Hadoop and structured
204. One way third party companies that pro-
datastores such as relational databases.
vide cloud services protect your informa-
tion from being lost because of server fail- A. Apache Sqoop
ure is to use a method called B. Pig
A. Cloud Computing C. Mahout
B. Networking D. Flume

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 614

210. An EBS Snapshort can shared with spe- 216. In how many parts we can broadly divide
cific accounts by making them the architecture of the Cloud?
A. ReadOnly A. 4
B. ReadWrite
B. 2
C. Public
C. 3
D. Private
D. 5
211. Cloud Services have a relationship

NARAYAN CHANGDER
with their customers. 217. Parallels Desktop is an example of?
A. Many-to-many
A. TYPE-1 Hypervisor
B. One-to-many
B. DISPATCHER
C. One-to-one
C. TYPE-2 Hypervisor
D. none of above
D. INTERPRETER
212. Which of the following services that need
to be negotiated in Service Level Agree-
218. Web services can be discovered using
ments?
A. Logging A. UDDII
B. Auditing B. UDII
C. Regulatory compliance C. UDDI
D. All of the mentioned D. UDDDI
213. Cloud computing model that provides vir-
tualized computing resources over the in- 219. . provides virtual machines, virtual stor-
ternet. age, virtual infrastructure, and other hard-
ware assets.
A. IaaS
B. PaaS A. IaaS
C. SaaS B. SaaS
D. RaaS C. PaaS
214. Which type of cloud is lowest in the sky? D. All of the mentioned
A. Cirrus
220. which of the following can be considered
B. Cumulus
an advantage of cloud storage
C. Stratus
A. the user has no control over their data
D. none of above
215. IPV4 Address is B. accessible anywhere with an internet
A. 8 bit connection
B. 16 bit C. portability
C. 32 bit D. many programs can be run at the same
D. 64 bit time

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 615

221. What are the components of ER dia- C. New releases (upgrades)


gram?
D. All the above

PRACTICE BOOK» NOT FOR SALE


A. Entities, Attributes, Relationships
B. Entities, Process, Connection 227. Which of these is not a major type of
cloud computing usage?
C. Entities, Attributes, Process
A. Hardware as a Service
D. None of the above
B. Platform as a Service
222. The term in cloud computing is the
concept of being able to use reusable, fine C. Software as a Service
grained components across a vendor’s net- D. Infrastructure as a Service
work.
A. virtualization 228. A serves as the master and there is
only one NameNode per cluster.
B. services
A. Data Node
C. instances
B. NameNode
D. scalability
C. Data block
223. Which of the following is not part of the
Azure billing options? D. Replication
A. Enterprise Agreement (EA) 229. Cloud computing shifts capital expendi-
B. Pay-As-You-Go tures into expenditures.
C. Cloud Solution Provider A. operating
D. Home Credit B. service
224. A service that concentrates on hardware C. local
follows the as a Service model. D. none of the mentioned
A. IaaS
B. CaaS 230. Private cloud is used for

C. PaaS A. Only Multiple organizations


D. All of the mentioned B. Both multiple and single organization
C. Only single organization
225. is cloud-based infrastructure used by
stand-alone organizations D. none of above
A. Private cloud
231. UDDI Stands for
B. Public cloud
A. Universal Development, Design and In-
C. Hybrid cloud tegration
D. Community cloud
B. None of these
226. What is/are the adoption benfits of C. Universal Description, Discovery and
SaaS? Integration
A. Lower costs D. Universal Description, Development
B. Scalability and integration and Integration

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 616

232. The allows systems and services to A. A secured connection for remote ac-
be accessible by a group of organizations. cess to a local area network
A. Public Cloud B. A secured private cloud for a single
user
B. Private Cloud
C. A virtual network device for private
C. Community Cloud
purposes
D. Hybrid Cloud
D. An operating system for private net-

NARAYAN CHANGDER
233. For the model, the security boundary work systems
may be defined for the vendor to include 238. is another name for Hypervisor.
the software framework and middleware
layer. A. VMM

A. SaaS B. VMC

B. PaaS C. VNM

C. IaaS D. All of the mentioned

D. All of the mentioned 239. is not a disadvantage of Public Cloud


A. Unreliability
234. Which if the following is not an element
of artificial intelligence? B. Susceptible for Hacking
A. Big Data C. Variable broadband Internet Connec-
tion
B. Cognitive Analysis Capability
D. Pay Per Use
C. Computing Power
D. Scenario 240. I have an application to host in cloud
provider. But i don’t want to take any un-
235. Which one of these is not a cloud comput- derlying computing burden.
ing pricing model? A. IAAS
A. Pay Per Use Free B. PAAS
B. Subscription C. SAAS
C. Ladder D. FAAS
D. none of above 241. A cloud computing solution is made up el-
ements , and .
236. Which of the following is used for Web
performance management and load test- A. internet, data and servers
ing? B. clients, the datacenter, and dis-
A. VMware Hyperic tributed servers
B. Web metrics C. network, the data, and servers
C. Univa UD D. computers, organization and servers
D. Tapinsystems 242. Saas stands for?

237. What is a Virtual Private Network A. Software as a service


(VPN)? B. System Software and services

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 617

C. Software as a system C. The cloud is not open to the public


D. System as a service D. You can’t keep the media on your de-

PRACTICE BOOK» NOT FOR SALE


vice
243. Web Services are
A. Application IDE 248. Which one is the cloud service?
B. Application Designing Tool A. SaaS
C. None of these B. PaaS
D. Application Components
C. IaaS
244. Which of these is an advantage of cloud D. All the above
storage?
A. The user has no control over their data 249. are computers used primarily by large
organizations for critical applications
B. Many programs can be run at the same A. Super Computers
time, regardless of the processing power
B. Data centers
of your device
C. Accessible anywhere with an internet C. Mainframe computers
connection D. All the above
D. Portability
250. Which of the following is the application
245. In distributed system, each processor has of cloud computing?
its own
A. Adobe
A. Local memory
B. Paypal
B. Clock
C. Google G Suite
C. Both local memory and clock
D. None of the mentioned D. All of the above

246. The term “Cloud Computing” is a 251. From the standpoint of a it makes
metaphor that originated in what? no sense to offer non-standard machine in-
A. Graphical depiction of computer archi- stances to customers
tecture A. CaaS
B. Meteorological symbolism B. AaaS
C. Worries about an unclear future for C. PaaS
computing architecture
D. IaaS
D. The idea that computer user trust in
magic
252. What is SQL?
247. One problem with streaming movies and A. Structured Query language
music from the cloud is that
B. Structured Querying language
A. Cloud services are expensive
C. Sequential Query language
B. You need internet access to watch or
listen D. SequelQuery language

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 618

253. Which of the following cloud concept is re- B. Cost, Performance, Storage
lated to pooling and sharing of resources? C. Performance, Cost, Security, Storage
A. Polymorphism D. Performance, Storage, Security
B. Abstraction
259. A node acts as the Slave and is re-
C. Virtualization sponsible for executing a Task assigned to
D. None of the mentioned it by the JobTracker.
A. MapReduce

NARAYAN CHANGDER
254. Which of the following benefit is related
to creates resources that are pooled to- B. Mapper
gether in a system that supports multi- C. TaskTracker
tenant usage? D. JobTracker
A. On-demand self-service
260. Key components of Azure Services Plat-
B. Broad network access form are
C. Resource pooling A. Windows Azure
D. All of the mentioned B. Live Services
255. Virtual Machine ware(VMware)is an ex- C. Microsoft SQL Services
ample of D. All the above
A. IAAS 261. Which of the following is the most widely
B. PAAS used technique for abstraction?
C. SAAS A. Load balancing
D. none of above B. Load schedulin
C. Load scaling
256. What is a system of interconnected
computers and other electronic devices D. All of the mentioned
called?
262. is a service provisioning model in
A. Server which a service provider makes computing
B. Network resources and infrastructure management
available to the customer as needed
C. Data Link
A. Grid Computing
D. Cloud Computing
B. Utility Computing
257. If your laptop uses the cloud for every- C. Distributed Computing
thing, your hard drive must be
D. None of the above
A. empty
263. refers to the ability of a company or
B. high tech
product to retain its customers over some
C. fast specified period
D. full A. Customer retention
258. What is the Need of Cloud Computing? B. Outsourcing
A. Maintenance, Cost, Performance, Se- C. Business Continuity
curity D. Disaster Recovery

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 619

264. What is the name of Rackspace’s cloud A. Digital lower class


service? B. Digital middle class

PRACTICE BOOK» NOT FOR SALE


A. Cloud On-Demand C. Digital upper class
B. Cloud Servers D. none of above
C. EC2
270. What is a possible disadvantage of cloud
D. none of above computing?
265. A cloud is a combination of both pri- A. It is vulnerable to hacking
vate and public cloud. B. The storage can be easily expanded
A. Community Cloud C. Portability
B. Private Cloud D. All of the above
C. Hybrid cloud 271. Type of Cloud Deployment beneficial of
D. Public cloud organisation having very sensitive data

266. is an entity that manages the use, A. Public


performance and delivery of cloud ser- B. Private
vices C. Hybrid
A. Cloud service providers D. Any of the above
B. Cloud Broker
272. Testing & monitoring tools are SaaS
C. Cloud Consumer category
D. Cloud Carrier A. Packaged software
267. How many service models in cloud com- B. Collaborative software
puting? C. Enabling and management tools
A. 3 D. All the above
B. 2 273. Cloud computing is a kind of abstraction
C. 4 which is based on the notion of combining
D. 5 physical resources and represents them as
resources to users.
268. Using the cloud to make sure things like A. Real
your photos are automatically matched to
B. Cloud
what is on your Device and vice versa is
known as what? C. Virtual
A. Synchronisation D. Physical
B. Matchification 274. How much storage space is provided to
C. Updating end-user from Google?
D. Backing up A. 5 GB
B. 15 GB
269. The group of people who use digital de-
vices and embrace the newest technology C. 1 GB
is known as? D. 1 TB

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 620

275. serves as a PaaS vendor within 280. Full form of CRM


Google App Engine system.
A. Custom Relationship Management
A. Google
B. Customer Relationship Manager
B. Amazon
C. Customer Relationship Management
C. Microsoft
D. Customer Rating Management
D. All of the mentioned
281. is a mutually shared model between

NARAYAN CHANGDER
276. Which of the following cloud is specifi- organizations that belong to a particular
cally designed to address the needs of the community such as banks, government or-
specific industry? ganizations, or commercial enterprises
A. Public Cloud A. Private cloud
B. Private Cloud B. Public cloud
C. Hybrid Cloud C. Hybrid cloud
D. Community Cloud D. Community cloud

277. In PaaS, you manage? 282. model attempts to categorize a cloud


network based on four dimensional fac-
A. Application
tors.
B. Storage
A. Cloud Square
C. Runtime
B. Cloud Service
D. Security
C. Cloud Cube
278. This refers to applications and services D. All of the mentioned
that run on a distributed network using vir-
tual resources 283. The model in which an application is
hosted as a service to customers who ac-
A. distributed computer
cess it via the Internet.
B. cloud computer
A. Software as a Service
C. soft computer
B. Platform as a Service
D. parallel computer
C. Infrastructure as a Service
279. For which of the following operations is D. Hardware as a Service
NO communication with the NameNode re-
quired? 284. is a subsidiary of Amazon that pro-
vides on-demand cloud computing plat-
A. A client writing a file to HDFS.
forms
B. A client requesting the filename of a
A. Amazon Prime
given block of data.
B. Amazon Video
C. A client reading a block of data from
the cluster. C. Amazon Web Services
D. A client reading a file from the cluster. D. Amazon Art

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 621

285. REFERS TO DIGITALLY SPECIFY B. National Interaction of Science and


THE ACCESS RIGHTS TO PROTECTED RE- Telecom
SOURCES USING ACCESS POLICIES

PRACTICE BOOK» NOT FOR SALE


C. National Institute of Standards and
A. AUTHORIZATION Technology
B. AUTHENTICATION
D. National Institute of Science and
C. SECURITY OF DATA Space
D. AUDITING
291. AWS S3 is designed to provide dura-
286. Which of the following describe Cloud bility
Computing from the user view?
A. 0.9999
A. providing scalable infrastructure
B. ubiquitous access to IT-infrastructure B. 0.99999999999

C. selling IT on pay-per-use basis C. 0.99


D. virtualizing IT infrastrcture D. 1
287. Which of the following functional cloud
292. Which of the following “cloudly” char-
computing hardware/software stack is
acteristics that cloud management service
the Cloud Reference Model?
must have?
A. CAS
A. Billing is on a pay-as-you-go basis
B. CSA
C. SAC B. The management service is extremely
scalable
D. All of the mentioned
C. The management service is ubiquitous
288. A PAN is?
A. A Personal Area Network D. All of the mentioned
B. A Pathetic Attempt at a Network
C. A Propitiatory Network 293. refers to the location and manage-
ment of the cloud’s infrastructure.
D. A Personal Access Network
A. Service
289. What is a possible disadvantage of cloud
computing in education system? B. Deployment
A. The need for high speed internet ac- C. Application
cess
D. None of the mentioned
B. The management of data and products
294. Select the needs of hypervisor is
C. The absence of hardware
A. Robusytness
D. The wide connection of networks
B. scalablity
290. NIST stands for
C. Accountablity
A. National Institute of Science and Tech-
nology D. Powerfull

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 622

295. What are the four classes of clouds based 300. is a computer network in which each
on altitude? computer’s resources are shared with ev-
A. cirrus, nimbus, stratus, cumulus ery other computer in the system

B. low, middle, high, vertically developed A. Distributed computing


B. Grid computing
C. troposphere, stratosphere, meso- C. Client-server computing
sphere, thermosphere D. Utility Computing

NARAYAN CHANGDER
D. classes of clouds are not based on al-
titude 301. In RAID 5 and RAID 6, the number of
faulty disks that can be tolerated is ( ), re-
296. Which one of these statements are incor- spectively.
rect about the cloud? A. 1, 2
A. Rent part of hardware. B. 2, 3
B. Installing and configuring completed C. 2, 1
in house. Need to employ someone.
D. 3, 2
C. 3rd party company automatically will
apply patches and upgrades. 302. function processes a key/value
pair to generate a set of intermediate
D. Owned by 3rd party company.
key/value pairs.
297. The cloud services purchased by a user in- A. Map
clude an application running environment,
B. Reduce
but do not contain any application or re-
latard data. This mode is C. Both Map and Reduce
A. NaaS D. None of the mentioned
B. SaaS 303. Which of the following is owned by an
C. IaaS organization selling cloud services?
D. PaaS A. Public
B. Private
298. What is a disadvantage of cloud comput-
ing? C. Community
A. It is vulnerable to hacking D. Hybrid
B. The storage can be easily expanded 304. Odd one out
C. Portability A. Dropbox
D. All of the above B. Google drive
299. Cloud providers provide cloud services to C. Excel
the cloud users. D. Onedrive
A. true 305. Which of the following is best known ser-
B. false vice model?
C. MAYBE A. SaaS
D. CANT SAY B. IaaS

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 623

C. PaaS 311. Nimbostratus and cumulonimbus clouds


D. All of the mentioned can signal what type of upcoming
weather?

PRACTICE BOOK» NOT FOR SALE


306. is the example for web-based appli- A. fair skies
cation
B. hot, sunny weather
A. Office 365
C. windy weather
B. G-Suite
D. rainy weather
C. WordPress
D. All the above 312. What is Cloud Computing?

307. is a programming model designed for A. Cloud Computing means storing data
processing large volumes of data in paral- in a database
lel by dividing the work into a set of inde- B. Cloud Computing is a tool used to cre-
pendent tasks. ate an application
A. Hive C. Cloud Computing means providing ser-
B. MapReduce vices like storage, servers, database, net-
working, etc
C. Pig
D. Lucene D. Store in Server

308. When a technician installs a Linux VM on 313. IaaS stands for?


a Windows machine, what type of hyper- A. IT-as-a-Service
visor do they use?
B. Internet-as-a-Service
A. type 1
C. Infrastructure-as-a-service
B. virtual machine
D. Interoperability-as-a-service
C. type 2
D. bare metal 314. A cloud combines multiple clouds
where those clouds retain their unique
309. Which of the following software can be identities, but are bound together as a
used to implement load balancing? unit.
A. Apache mod balancer A. Public
B. Apache mod proxy balancer B. Private
C. F6’s BigIP
C. Community
D. All of the mentioned
D. Hybrid
310. What is the front end of cloud comput-
ing? 315. is a file hosting service

A. The third party company A. Dropbox


B. The personal computer user B. OpenStack
C. The internet C. Digitalocean
D. Your personal home server D. Salesforce

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 624

316. How many types of dimensions exists in 322. Amazon cloud-based storage system
Cloud Cube Model? allows you to store data objects ranging
A. 1 in size from 1 byte up to 5GB.
B. 2 A. EBS
C. 3 B. S2
D. 4 C. S3
317. The is something that you can obtain D. Glacier

NARAYAN CHANGDER
under contract from your vendor.
A. PoS 323. Working as a group is a concept of
B. QoS A. Client server computing
C. SoS B. Distributed Computing
D. All of the mentioned C. Collaborative Computing
318. flexibility is D. P2P computing
A. The ability to scale up resources
324. function is responsible for consolidat-
B. The ability to scale down resources
ing the results produced by each of the
C. Both a and b Map() functions/tasks.
D. None of these A. Reduce
319. as a utility is a dream that dates from B. Map
the beginning of the computing industry it-
self. C. Reducer
A. Model D. All the answer are correct
B. Computing
325. A characteristic of edge locations is that
C. Software they:
D. All of the mentioned A. host Amazon EC2 instances closer to
320. When files are held on two devices, are users.
updated to make sure they have the same B. help lower latency and improve perfor-
content mance for users.
A. Uploading C. cache frequently changing data with-
B. Downloading out reaching the origin server.
C. Synchronising D. refresh data changes daily.
D. Streaming
326. Mobile devices include or .
321. IaaS shares issues with?
A. desktop or smartphones
A. PaaS
B. SaaS B. desktop or phones

C. Both a and b C. computers or digital devices


D. None of the above D. PDAs or smartphones

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 625

327. which of the following service models the C. Storage Computing


hardware is virtualized in the cloud? D. None of the choices

PRACTICE BOOK» NOT FOR SALE


A. IaaS
333. The service provider gives the capability
B. PaaS to the consumer to deploy onto the cloud
C. SaaS in
D. DaaS A. Platform as a Service
B. Software as a Service
328. Which of the following was one of the
top 5 cloud applications in 2010? C. Infrastructure as a Service
A. Cloud backup D. None of these
B. Web applications 334. Google Drive was launched in what
C. Business applications year?
D. All of the mentioned A. 1992
B. 2004
329. Which of the following has many features
of that is now known as cloud computing? C. 2008
A. Web Service D. 2012
B. Softwares 335. You can’t count on a cloud provider main-
C. Hardwares taining your in the face of government ac-
tions.
D. Internet
A. scalability
330. Which of the following is NOT a potential B. reliability
advantage of Cloud Computing?
C. privacy
A. Flexibility in payment plans
D. none of the mentioned
B. scalability and flexibility
336. Font size for Resume writing is
C. instant updates and upgrades
A. 12-14
D. full control over data and software
B. 14-16
331. An operating system running on a Type
C. 10-12
VM is a called asfull virtualization.
D. 8-10
A. 1
B. 2 337. BOINC stands for
C. 3 A. Berkeley Open Industry for Network
Clusters
D. All the above
B. Berkeley Open Infrastructure for Net-
332. is a general term used to describe work Computing
a new class of network based computing C. Berkeley Owned Infrastructure for
that takes place over the Internet Network Computing
A. Cloud Computing D. Berkeley Organized Infrastructure for
B. Network Computing Network Computing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 626

338. CaaS stands for as service. 344. Cloud Service consists of


A. Compliance A. Platform, Hardware, Infrastructure
B. Computer
B. Platform, Software, Infrastructure
C. Community
C. Software, Hardware, Infrastructure
D. Communication
D. none of above
339. What are the types of Cloud Computing?

NARAYAN CHANGDER
A. Private cloud, public cloud, hybrid 345. What is/are the advantages of IaaS?
cloud, community cloud
A. Eliminates capital expense and re-
B. Private cloud, public cloud, hybrid duces ongoing cost.
cloud
B. Improves business continuity and dis-
C. public cloud, private cloud aster recovery
D. None of the above
C. Innovate rapidly
340. Cloud computing shifts capital expendi-
D. All the above
tures into expenditures.
A. operating 346. Object storage systems store files in
B. service a flat organization of containers called
what?
C. local
D. none of the mentioned A. Baskets

341. What is the back end of cloud comput- B. Brackets


ing? C. Clusters
A. The third party company
D. Buckets
B. The personal computer user
C. The internet 347. The command to enable web service per-
manently in Amazon Linux is
D. Your personal home server
A. sudo systemctl start httpd
342. What is VMM.
A. Virtual machine monitor B. sudo systemctl enable httpd

B. Virtual machine mentor C. sudo systemctl restart httpd


C. Is a Hypervisor D. sudo systemctl on httpd
D. None of the above
348. What is Ubiquitous Access?
343. Which of the following is used to re-
motely manage multiple file servers from A. Anytime, anywhere, any device cloud
a single window? access
A. Windows PowerShell B. Sometime, somewhere, some devices
cloud access
B. Server manager
C. Root Server C. Anytime, some devices access
D. Remote Desktop Connection D. No access anytime

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 627

349. A is a cloud-based platform that en- 354. Cloud computing is an abstraction based
ables developers to add real-time commu- on the notion of pooling physical resources
nications features (voice, video, and mes- and presenting them as a resource.

PRACTICE BOOK» NOT FOR SALE


saging) in their own applications
A. real
A. Mobile PaaS
B. virtual
B. Communication PaaS
C. cloud
C. Open PaaS
D. none of the mentioned
D. Public PaaS
350. Which of these is an advantage of physi- 355. Which of these describes the parts to
cal storage? cloud computing?

A. The user does not have to worry about A. The front end connects the back end to
physical damage. the internet
B. The user has full control over how their B. The back end connects the front end to
data is stored. the internet
C. It can be vulnerable to hacking. C. The internet connects the front end to
D. It is easy to expand storage. the back end
D. The front end needs no connection to
351. A is a group of technologies that are
the back end
used as a base upon which other applica-
tions, processes or technologies are devel- 356. Which among the following is an open
oped source operating systems?
A. DevOps A. Windows
B. Platform
B. Mac OS
C. Cloud Computing
C. Linux
D. PaaS
D. Unix
352. Which one of the following cloud concepts
is related to sharing and pooling the re- 357. In General, ”Cloud” computing resources
sources? are usually stored
A. Polymorphism A. In a data warehouse
B. Virtualization B. In a complex network of data servers
C. Abstraction C. In a Virtual Library
D. Encapsulation D. none of above
353. Level Agreement (SLA) is the contract
358. What deployment models are not avail-
for performance negotiated between you
able for Cloud?
and a service provider.
A. Service A. Hybrid
B. Application B. Private
C. Deployment C. Enterprise
D. All of the mentioned D. Public

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 628

359. is a incorporates the best of both pri- B. Cloud computing


vate and public clouds, but each can remain C. Data science
as separate entities
D. none of above
A. Private cloud
B. Public cloud 365. A? is a computer that manages lots of
processing requests, delivering data be-
C. Hybrid cloud tween machines that are connected in a lo-
D. Community cloud cal network

NARAYAN CHANGDER
360. When one uses a bank card, they are re- A. Router
quired to enter their PIN. What does PIN B. Bus
stand for?
C. Server
A. Personal Instant Number
D. USB
B. Personal Identification Number
366. Real time data processing in a cloud func-
C. Professional Instant Number
tion does not help in
D. Professional Identification Number
A. Video and image analysis
361. PKI stands for B. File processing
A. Private Key Infrastructure C. Stream processing
B. Public Key Infrastructure D. Event driven extract, transform and
C. Private Key Information load function
D. Public Key Information 367. Which of the following is correct about
URI in RESTful web services?
362. Sharing resources is the main priority of
A. Each resource in REST architecture is
A. Client server computing
identified by its URI
B. P2P Computing
B. Purpose of an URI is to locate a re-
C. Distributed computing source(s) on the server hosting the web
D. collaborative computing service
C. Both of the above
363. Cloud storage can be provided as a ser-
vice by allowing your data to be stored D. None of the above

368. Which of the following is not a type of


A. remotely on the host company’s cloud server?
servers
A. Public Cloud Servers
B. remotely on your local computer
B. Private Cloud Servers
C. locally on your network
C. Dedicated Cloud Servers
D. locally on your remote computer
D. Merged Cloud Servers
364. A network comprised of physical objects
capable of gathering and sharing electronic 369. Google App Engine is PaaS
information. A. Mobile
A. Internet of Things ( IoT) B. Communiation

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 629

C. Open 375. Cloud is


D. Public A. reliable

PRACTICE BOOK» NOT FOR SALE


370. What areas of IT can AIOps tools im- B. scalable
prove
C. avilable
A. Application monitoring
D. All the above
B. Systems maintenance
C. Root cause analysis 376. Storing and accessing data and programs
D. All of the above over the Internet instead of your com-
puter’s hard drive is known as what?
371. I can print to my printer from anywhere
in the building because A. Personal Computing

A. It is a wireless printer B. Modern Computing


B. It has a bluetooth connection C. Bubble Computing
C. It is connected to iCloud D. Cloud Computing
D. It is on a network
377. is a platform for constructing data
372. Azure IoT Central-a fully managed, flows for extract, transform, and load
platform that enables the creation of IoT (ETL) processing and analysis of large
solutions with management and oper- datasets.
ational tools.
A. Pig Latin
A. SaaS, built-in
B. Oozie
B. PaaS, built-in
C. IaaS, Standard C. Pig
D. SaaS, Standard D. Hive

373. What are the advantages of Cloud Com- 378. Which statement about clouds is true?
puting?
A. Cumulus clouds mean a change of
A. Cost efficiency weather is coming in the next 24 hours.
B. Excellent accessibility
B. There is only one kind of cloud in the
C. Back-up and restore data sky at a time.
D. All the above
C. Fog is not a cloud.
374. allows multiple operating systems to D. Cirrus clouds are the highest in the
run on a single hardware device at the sky.
same time by more efficiently using sys-
tem resources, like processors and mem- 379. In which year one drive was launched?
ory.
A. 2010
A. Full virtualization
B. Paravirtualization B. 2007

C. Partial virtualization C. 2008


D. process virtualization D. 2009

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 630

380. Resources such as software, infrastruc- B. Blocks and heartbeat messages


ture or platforms can be deployed quickly
C. Filenames, block locations
A. Rapid deployment
D. Blocks and block locations
B. Fast deployment
C. Self service deployment 386. “The cloud serves businesses of all sizes

D. Quick deployment
A. Markus Persson

NARAYAN CHANGDER
381. What is private cloud?
B. Zhang
A. A cloud architecture maintained within
C. Marc Benioff
an enterprise data center.
B. A cloud service inaccessible to anyone D. daniel a
but the cultural elite
387. This type of hypervisor is usually used in
C. A standard cloud service offered via data centers.
the Internet
A. Type 1
D. none of above
B. Type 2
382. A period of time when a computer or ser-
C. Nexus
vice is unavailable is called
D. Hadoop
A. Geo-Data
B. Downtime 388. Choose the correct relationship of cloud
C. Synchronising services to customers.

D. Downloading A. One-one
B. One-Many
383. A security group acts as a for your
instance to control inbound and outbound C. Many-One
traffic. D. Many-Many
A. virtual network
389. Imported VM from on-premises could be
B. virtual tunnel
stored in cloud using
C. virtual firewall
A. Amazon S3
D. None of the above
B. Amazon EBS
384. What’s the most popular use case for pub-
C. Amazon EFS
lic cloud computing today?
D. Amazon Glacier
A. Website hosting
B. Test and development 390. Facilities that house large collections of
C. Disaster recovery servers are called

D. Business analytics A. Data Centers


B. Computer Processing Plants
385. Which of the following components re-
side on a NameNode? C. Internet Routing Facilities
A. Filenames, blocks and checksums D. Cloud Computing Centers

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 631

391. What is agility? 396. Tim is worried about losing his files
A. Ability to move quickly stored on his personal computer. Tim
should use to eliminate that problem.

PRACTICE BOOK» NOT FOR SALE


B. Dependable on other services
A. Cloud Computing
C. Extending of resources
B. Networking
D. Scaling in/out
C. Storage Space
392. The operating system manages a com- D. A newer computer
puter’s hardware resources, including
397. Cloud computing resources can be provi-
A. Input devices such as a keyboard and sioned from the service provider
mouse
A. without human interaction
B. Output devices such as display moni-
tors, printers and scanners B. with human interaction

C. Network devices such as modems, C. on manual request


routers and network connections D. on email request
D. All of the above 398. What happens when you delete a file in
Google Drive?
393. Ransomware is
A. Nothing, you cannot delete files
A. an attack by a remote computer
B. It is gone forever
B. a form of malware
C. It goes to the Trash
C. spam messages
D. It just hides it from your view, but you
D. A corrupt piece of code that duplicates can still search for it
your data
399. Which of the following are the features
394. What is local/internal hosting? of cloud computing?
A. You pay a company to host your web- A. Security
site
B. Availability
B. Data is saved onto your local computer
for people to access externally C. Large Network Access
D. All of the mentioned
C. More prone to viruses and hacking
D. Data is saved onto an external com- 400. are companies that offer network ser-
puter for people to access externally vices, infrastructure, or business applica-
tions in the cloud
395. Provides a platform allowing customers
A. Cloud service providers (CSP)
to develop, run, and manage applications
without the complexity of building and B. Cloud Broker
maintaining the infrastructure. C. Cloud Consumer
A. PaaS D. Cloud Carrier
B. IaaS
401. provides shared services as opposed
C. SaaS to local servers or storage resources
D. AaaS A. Cloud Computing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 632

B. Network Computing 407. Cloud Computing applications are typi-


cally accessed through
C. Science Computing
A. Hardware on your computer.
D. None of the choices
B. A proxy server.
402. What is the number one concern about C. A web browser.
cloud computing?
D. An offline application.
A. Too expensive
408. Which of the following is a structured

NARAYAN CHANGDER
B. Security concerns data store that supports indexing and data
C. Too many platforms queries to both EC2 and S3?
D. Accessability A. CloudWatch
B. Amazon SimpleDB
403. is the most popular high-level Java
C. Amazon Cloudfront
API in Hadoop Ecosystem
D. All of the mentioned
A. Scalding
B. HCatalog 409. The networking layer which prepares a
message in a form that will be understood
C. Cascalog by the receiving application.
D. Cascading A. Application
B. Transport
404. Why software environment needs virtu-
alization C. Network
A. Enhance the performance D. Data link

B. Limited use of Hardware 410. Usually methods like RAID strategies are
used in cloud computing to maintain in-
C. shortage of space
tegrity. What RAID stands for?
D. All of the mentioned A. Redundant array of independent disks
405. An operating system running on a Type
VM is full virtualization. B. Redundant arrangements of indepen-
dent disks
A. 1
C. Removal of array in independent disks
B. 2
C. 3 D. Remove array for integrity dependent
D. All of the mentioned 411. The property states that the system
must have a mechanism to recover from
406. Which among the following is Linux web
committed transactions should that be nec-
server
essary.
A. Apache A. Atomicity
B. Ngios B. Consistency
C. Hyper-v C. Isolation
D. IIS D. Durability

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 633

412. is The financial gain from an invest- C. Service Level Agreement


ment in cloud divided by the cost of that D. None of the above
investment.

PRACTICE BOOK» NOT FOR SALE


A. Return on investment 418. What is external hosting?
B. Total Cost of ownership A. Data is saved onto your local computer
C. Profit & Loss for people to access externally

D. None of the above B. You pay a company to host your web-


site on a local computer to you
413. The cloud services purchased by a user in-
C. Data is saved onto an external com-
clude an application running environment,
puter for people to access externally
but do not contain any application or re-
lated data. This mode is D. More prone to viruses and hacking
A. IaaS 419. Cloud computing is not
B. PaaS
A. Cost effective
C. SaaS
B. Increases productivity
D. NaaS
C. More reliable
414. “offer services through large-scale In- D. Internet dependent
ternet connectivity”this definition belongs
to: 420. What is the use of Certification Authority
A. Fast-ethernet (CA) in PKI?
B. Disaster recovery A. Issues the certificate
C. Cloud Computing B. Requests a certificate
D. None of the above C. Registration Authority
415. Google Forms allows you to? D. None of the above
A. share document templates 421. Cloud computing is also a good option
B. quickly create surveys when the cost of infrastructure and man-
agement is
C. easily sketch 3D models
D. send mass emails to your contacts A. high
B. low
416. Open source software used in a SaaS is
called SaaS. C. modrate
A. closed D. All of the mentioned
B. free 422. Which is not a challenge of a Multi-Tenant
C. open Data Center:
D. all of the mentioned A. Agility
417. What is SLA? B. Location independent addressing
A. Service Provider Assignment C. Performance uniformity
B. Software level assessment D. Scalability

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 634

423. Who provide GUI (Graphical User Inter- C. Docs


face) to interact with the cloud? D. My Stuff
A. Client
429. Which framework of policies and tech-
B. Application nologies for ensuring that the proper peo-
C. Client Infrastructure ple in an enterprise have the appropriate
access to technology resources?
D. Server
A. Single sign-on
424. Key requirement based on fact that

NARAYAN CHANGDER
B. Identity and Access Management
server workload in non-linear in nature
C. Registration Authority
A. Auto Scale
D. User Management
B. Flexibility
430. This type of solution allows companies
C. Scale-ability
to deploy complete desktop environments,
D. none of above which allows their IT to provide a persis-
tent environment.
425. is the slave/worker node and holds
the user data in the form of Data Blocks A. Office 365
A. DataNode B. Google Drive
B. NameNode C. AutoDesk
C. Data block D. virtual desktop infrastructure

D. Replication 431. In order to participate in cloud-computing,


you can use the following OS .
426. is a secure, durable, and low-cost
A. Windows
storage class for data archiving.
B. Linux
A. S3 Glacier
C. MAC
B. S3 Standard
D. All of the above
C. S3 intelligent tiering
432. What facet of cloud computing helps to
D. S3 Galcier Deep Archive
guard against downtime and determines
427. .... as a Service is a cloud computing costs?
infrastructure that creates a development A. Service-level agreements
environment upon which applications may
B. Application programming interfaces
be built.
C. Bandwidth fees
A. Infrastructure
D. Virtual private networks
B. platform
433. What is it called when you connect up
C. Service
multiple computers together to share print-
D. none of above ers, and resources?
428. By default, this is the area in Google A. Server
Drive that shows your personal files. B. Network
A. My Drive C. Data Link
B. Shared with me D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 635

434. Most recognizable model of cloud comput- 439. A payment method for cloud computing
ing that charges based on usage.

PRACTICE BOOK» NOT FOR SALE


A. Private A. Pay as you grow
B. Public B. Pay on demand
C. Hybrid C. Cash on delivery

D. Community D. Credit scoring

440. Which of the following is an edge-


435. is the on-demand delivery of
storage or content-delivery system that
computingservices-including servers, stor-
caches data in different physical loca-
age, databases, networking, software-
tions?
over the Internet
A. Amazon Relational Database Service
A. Distributed Computing
B. Amazon SimpleDB
B. Peer to peer computing
C. Amazon Cloudfront
C. Cloud Computing
D. Amazon Associates Web Services
D. On demand computing
441. Which of the following services offered
436. A is an organized collection of data, by the HUAWEI CLOUD (public cloud) falls
generally stored and accessed electroni- into the category of SaaS services?
cally from a computer system
A. Elastic Cloud Server (ECS)
A. database B. Facial Recognition
B. storage C. Elastic Volume Service
C. cloud storage D. Object Storage Service (OBS)
D. data
442. To import VM, the is used
437. Which of the following is application and A. AWS CLI
infrastructure management software for B. AWS SDK
hybrid multi-clouds?
C. AWS management console
A. Tapinsystems
D. All of the above
B. Web metrics
443. Managed IT services are based on the
C. VMware Hyperic
concept of which one of the following?
D. Univa UD
A. Virtualization
438. An provides the information required B. Utility Computing
to launch an instance C. Grid Computing
A. Amazon Machine Image (AMI) D. Service Oriented Architecture (SOA)
B. ISO file
444. What is a multi-tenant cloud model?
C. Amazon EC2
A. Only one customer access to comput-
D. Snapshot ing resources in a public cloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 636

B. Customers can share computing re- 450. is a cloud computing service model
sources in a public or private cloud in which hardware is virtualized in the
C. Single customer environment cloud.

D. A model with multiple servers A. Paas


B. Caas
445. Which of the following is an important ar-
chitectural design principle when designing C. Iaas
cloud applications? D. Saas

NARAYAN CHANGDER
A. Use multiple Availability Zones.
451. Which of the following falls in the cate-
B. Use tightly coupled components.
gory of “north-south” traffic?
C. Use open source software.
A. Traffics between VM in data centers
D. Provision extra capacity.
B. Traffic generated when uses access
446. All cloud computing applications suffer the data center through the internet
from the inherent that is intrinsic in
C. Traffic generated during VM live gener-
their WAN connectivity.
ation
A. Propagation
D. Traffic between VMs in different data
B. Latency centers
C. Noise
452. In computing, this is an emulation of a
D. All of the Above computer system. It is based on computer
447. Which type of cloud is provisioned for architectures and provide functionality of
open use by the general public? a physical computer.

A. Private cloud A. Virtual Machine


B. Hybrid cloud B. System Design
C. Community cloud C. Serverless Functions
D. Public cloud D. Databases

448. Cloud computing doesn’t require that 453. A large collection of servers is know as a
and software be composable.
A. cloud A. Network
B. database B. Computer System
C. hardware
C. Server Farm
D. all of the mentioned
D. Database
449. refers to the connectedness of big
data. 454. is an open-source web server

A. Value A. Linux
B. Veracity B. MySQL
C. Velocity C. Perl
D. Valence D. Apache

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 637

455. All hardware and software is in house 460. The option allows you to copy jars
managed by the organisation. locally to the current working directory of
tasks and automatically unjar the files.

PRACTICE BOOK» NOT FOR SALE


A. Traditional on premises
B. SaaS A. archives

C. PaaS B. files

D. IaaS C. task
D. None of the mentioned
456. Chose the most appropriate an-
swer:Cloud technology allows users to 461. Which is not a characteristics od SaaS?
and from anywhere in the world. A. Multi device support
A. Download music (and) movies B. Web Access
B. Collaborate (and) share files C. one to Many
C. Hack (and) plant viruses D. offline Acess
D. Commit cyber crimes (and) break laws
462. A Person, organization, or entity respon-
457. What is Data Protection. sible for making a service available to in-
A. The protection of all terest parties.

B. The protection of a businesses sales A. Cloud Consumer


data. B. Cloud Provider
C. How the government keeps our infor- C. Cloud Broker
mation safe. D. Cloud Carrier
D. The protection of people’s personal in-
formation. 463. Instead of storing files and folders on
your PC or Device, you can store them re-
458. is an instant computing infrastruc- motely. This is known as
ture, provisioned and managed over the A. Bubble Storage
internet
B. Secondary Storage
A. SaaS
C. Cloud Storage
B. PaaS
D. Local Storage
C. IaaS
D. CaaS 464. The command to start any service in Ama-
zon Linux is
459. What is measured service in cloud com- A. Service
puting?
B. System
A. Cloud computing resources usage is
metered, and manufacturing organiza- C. Start
tions pay accordingly for what they have D. Systemctl
used.
465. Which of the following impose additional
B. Pay-as-you-Go overhead on clients and offer faster trans-
C. Pay-Per-USe fer?
D. All the above A. Block storage

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 638

B. File Storage B. Veracity


C. File Server C. Velocity
D. All of the mentioned D. Volume
466. A short-range technology that connects 471. In this type of cloud, an organization
multiple devices, for example mobile rents cloud services from cloud providers
phones to speakers over a short distance on-demand basis.
A. Private

NARAYAN CHANGDER
A. Internet
B. Public
B. Bluetooth
C. Protected
C. WiFi
D. Hybrid
D. 4G
472. Type(s) of Resource Provisioning is/are-
467. Cloud processing could be used as a ser-
vice if A. Static Provisioning or Advanced Provi-
sioning
A. You need more storage space
B. Dynamic Provisioning
B. You need more hardware
C. User Self-provisioning
C. You need to run complicated programs
with many complex mathematical calcula- D. All correct
tions
473. Which of the following is cloud computing
D. You want to stop hackers replacing?
468. What percentage of web application at- A. corporate data centers
tacks were attributed to cloud-based email B. expensive personal computers
servers, according to Verizon’s 2019 Data
Breach Investigations Report (DBIR)? C. expensive software upgrades

A. 20% D. all of the above

B. 40% 474. Essential Cloud Characteristics


C. 60% A. On demant self-service, Broad net-
D. 80% work access
B. Ondement self-service
469. In which type of cloud a group of con-
sumers of different organization share C. Broad network access
same concern D. Network access
A. Public cloud
475. Which of the following dynamically grow
B. Community cloud and shrink the load-balancing capacity to
C. Private cloud adjust to traffic demands
D. Hybrid cloud A. Amazon Cloud-front

470. refers to the biases, noise and abnor- B. Elastic Caches


mality in data, trustworthiness of data. C. Amazon RDS
A. Value D. Elastic Load Balancing

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 639

476. Which of the following is an example of C. It is updated automatically


Cloud Storage?
D. It is only ever stored locally on your

PRACTICE BOOK» NOT FOR SALE


A. Google Drive computer
B. Flash Drive
482. With cloud computing, companies can
C. Hard Drive scale up or scale down the need of com-
D. Network Drive puting resources.This is which feature of
cloud computing?
477. On Amazon Linux, the package which
A. Pay per use
need to install to get web server is
A. ftpd B. One demand self service

B. http C. Elasticity
C. httpd D. Resource Pooling
D. apache 483. A cloud requires virtualized storage
478. Cloud Computing Turns to support the staging and storage of
data.
A. Reduce OPEX and Increase CAPEX
A. soft
B. Reduce CAPEX and Increase OPEX
B. compute
C. Increase CAPEX and OPEX
C. local
D. Reduce CPEX and Small increase in
OPEX D. none of the mentioned

479. Which of the following is not a type of 484. Google Apps Engine is a type of
cloud?
A. SaaS
A. Private
B. PaaS
B. Public
C. IaaS
C. Protected
D. none of the mentioned
D. Hybrid
485. Apache Hadoop YARN stands for:
480. Which of the following network re-
sources can be load balanced? A. Yet Another Reserve Negotiator
A. Connections through intelligent B. Yet Another Resource Network
switches
C. Yet Another Resource Negotiator
B. DNS
D. Yet Another Resource Manager
C. Storage resources
D. All of the mentioned 486. What can be offered as a part of IaaS?
A. application software
481. An advantage of cloud software is that
B. call-center services
A. It is always free C. computing capacity
B. It cannot be hacked D. consulting

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 640

487. Point out the correct statement in context 492. Examples for client-server model
of YARN: A. Email
A. YARN extends the power of Hadoop B. network printing
to incumbent and new technologies found
C. World Wide Web
within the data center
D. All the above
B. YARN is highly scalable
C. YARN enhances a Hadoop compute 493. The most utilized. The software is hosted

NARAYAN CHANGDER
cluster in many ways on the providers’ servers and accessed by
the customer through the web browser.
D. All of the mentioned this concept belongs to:
488. How many types of services Cloud com- A. The PaaS-Platform as a Service model
puting offers?
A. 2 B. The SaaS-Software as a Service cloud
computing model
B. 3
C. The IaaS-Infrastructure as a Service
C. 4 model
D. 5 D. none of above

489. Which of the following is good for the en- 494. What is a possible risk of cloud comput-
vironment? ing?

A. Using less paper A. Lack of Access to Data


B. Full control over the data
B. Working harder
C. Storage of data without control over
C. Getting good grades the location of where the data is stored
D. none of above
D. Lack of the ability to back up data
490. PaaS can be delivered as a
A. As a public cloud service from a 495. Which category of services includes Ama-
provider zon S3?
A. Computing
B. As a private service (software or appli-
ance) behind a firewall B. Security
C. As software deployed on a public in- C. Migration
frastructure as a service D. Storage
D. All the above 496. Although the Hadoop framework is imple-
mented in Java, MapReduce applications
491. which is not an advantage of grid
need not be written in
A. scalable A. Java
B. uses unused computing power B. C
C. provide standard and high cpu C. C++
D. multi-tenancy D. None of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 641

497. is the organization of data according C. Data seeding


to a database model D. Data types

PRACTICE BOOK» NOT FOR SALE


A. Data structure
503. Which one of the following statements is
B. Data management true about the SSO?
C. Database design A. It has multiple authentication servers
D. Data lake B. It manages single accesses to other
systems
498. is an internet based service that helps
users to get shared resources and informa- C. In SSO, User sends the ticket to in-
tion over a network tranet server.
A. Cloud Computing D. All of the above
B. Operating system 504. Which of the following service provider
C. Spreadsheets provides the least amount of built-in secu-
rity?
D. Algorithm
A. SaaS
499. The is the principal stakeholder for
B. PaaS
the cloud computing service
C. IaaS
A. Cloud service providers
D. none of above
B. Cloud Broker
C. Cloud Consumer 505. How can confidentiality of information be
achieved?
D. Cloud Carrier
A. By ensuring enough resources to make
500. How is infrastructure as a service pro- information available for all users
vided? B. By preventing unauthorized changes
A. Virtualization C. By regularly backing up the informa-
B. Virtual Realization tion
C. Cloud Services D. By restricting access to information
D. Hardware service 506. A service provider gets the same ben-
efits from a composable system that a user
501. Automatic backups are not provided au-
does.
tomatically by drupal cloud reseller.
A. CaaS
A. Platform.sh
B. AaaS
B. Amaze.io
C. PaaS
C. Acquia
D. All of the mentioned
D. Pantheon
507. What is a federation Cloud?
502. is an administrative process that in-
cludes acquiring, validating, storing, pro- A. Cloud from a particular country
tecting, and processing required data B. collaboration between Clouds
A. Data warehousing C. military Cloud
B. Data management D. international Cloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 642

508. & used to determine the ROI of 513. “allow organizations to store and man-
an organization age data on off-site file servers instead of
building their own physical data centers “
A. Marginal Cost & Operational Cost
this statement refer to..
B. CAPEX & OPEX
A. virtualization
C. Profit & Loss
B. Storage components
D. None of the above
C. Physical server

NARAYAN CHANGDER
509. Which of the following is a feature found D. Device
in most cloud accounts?
514. A major advantage of Cloud Computing
A. Automatic backup
is the ability to have a resource known as
B. Cloud storage space ‘ ‘-which creates a copy of a file
C. Apps to connect multiple devices to stored in a secure location in case the orig-
your account inal file gets lost / corrupted

D. All of these are features found in most A. Hard Drive


cloud accounts. B. Optical Storage

510. Communication between services is done C. Main Memory


widely using protocol. D. File Backup
A. REST
515. “cloud”in cloud computing represents
B. SOAP what?
C. SOA A. Wireless
D. NONE B. Hard drives

511. Which of the following disk types is rec- C. People


ommended for an archive room that needs D. Internet
to store large amounts of data that will be
accessed infrequently over long period of 516. Computers that do not have internal hard
time? drives
A. SSD A. thick
B. SAS DISK B. thin
C. SATA DISK C. mobile
D. NL-SAS DISK D. none of above

512. Google App Engine (often referred to as 517. An example of a file-sharing platform
GAE or simply App Engine) is that uses the cloud is:
A. Is a Platform as a Service A. Facebook
B. Is a Software as a Service B. Twitter
C. Is a Infrastructure as a Service C. Google Docs
D. All of the above D. Snapchat

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 643

518. CaaS vendor offer guaranteed QOS in cloud storage offerings conform to a
SLA to their clients .what does QOS stands as a Service model.
for? A. None of these

PRACTICE BOOK» NOT FOR SALE


A. Quality operating system B. Software
B. Quality in other services C. Platform
C. c) Quality of service D. Infrastructure
D. d) Quality object oriented service 524. A service provider reselling a may
have the option to offer one module to cus-
519. service also resembles PaaS tomize the information
A. Container A. CaaS
B. Storage B. AaaS
C. Database C. PaaS
D. Compute D. SaaS

520. Which of the following should be used 525. Docker is a


considering factors shown in the fig- A. SaaS
ure? cloud-computing-aws-interview- B. PaaS
questions-answers-q1
C. IaaS
A. SimpleDB
D. CaaS
B. RDS
526. Which of the following describes
C. Amazon EC2d) a message-passing taxonomy for a
D. All of the mentioned component-based architecture that pro-
vides services to clients upon demand?
521. All cloud computing applications suffer A. SOA
from the inherent that is intrinsic in their
WAN connectivity. B. EBS
C. GEC
A. propagation
D. All of the mentioned
B. latency
C. noise 527. Encrypting your data before it is sent to
the service provider ensures
D. None of the mentioned
A. protection to data
522. What is the main reason that companies B. virtualization of data
turn to using the Cloud? C. instance of data
A. cost saving D. transmission of data
B. better performance
528. HDFS works in a fashion.
C. ubiquitous computing A. master-worker
D. flebility B. master-slave
523. The addition of a software package on C. worker/slave
top of a cloud storage volume makes most D. all of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 644

529. Cloud Computing depend on? 535. What is the biggest disadvantage of com-
A. Mother Board munity cloud?

B. Application Software A. Collaboration has to be maintained


with other participants
C. Specific Hardware
B. Less security features
D. Internet and Web Services
C. Cloud is used by many organisation for
530. Virtualization different purposes

NARAYAN CHANGDER
A. multiple operating systems on a single D. Organisation losses business auton-
physical system omy
B. single physical system
C. multiple operating systems on a multi- 536. Which of the following is the operational
ple physical system domain of CSA?

D. Virutual box A. Scalability


B. Portability and interoperability
531. maps input key/value pairs to a set
of intermediate key/value pairs. C. Flexibility
A. Mapper D. none of above
B. Reducer
537. Amazon S3 has how many pricing compo-
C. Both Mapper and Reducer nents?
D. None of the mentioned A. 2
532. What is cloud Computing replacing? B. 3
A. Corporate data centers C. 4
B. Expensive personal computer hard- D. 5
ware
C. Expensive software upgrades 538. Which one of the following can be consid-
D. All of the above ered as the most complete cloud computing
service model?
533. Which of the following is an example of A. PaaS
the cloud?
B. IaaS
A. Amazon Web Services (AWS)
C. CaaS
B. Dropbox
C. Cisco WebEx D. SaaS

D. All of the above 539. command is used to show the manual


of the inputted command
534. What is a benefit of Cloud Computing?
A. Use your computers in any weather A. help

B. Share Files B. man


C. It does your work for you C. man cd
D. Your files can fly D. cd

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 645

540. This cloud-based solution would help a C. Platform as a Service


school district implement a new learning
D. Infrastructure as a Service
management systems.

PRACTICE BOOK» NOT FOR SALE


A. Google Drive 546. Using Amazon EC2 with Windows Server
B. Google Office provides additional services including

C. Virtual Machine A. Amazon Elastic Block Store (EBS)


D. virtual application stream B. Amazon CloudWatch

541. Which of the Windows AMI is NOT sup- C. Elastic Load Balancing
ported in Amazon EC2? D. All of the above
A. Windows server 2008
547. Maximum free storage space in one
B. Windows 10 drive
C. Windows Server 2012 A. 2gb
D. Windows Server 2019
B. 10gb
542. A private cloud is used to provide ser- C. 6gb
vices and applications for
D. 5gb
A. a specific organization
B. a public group 548. The technology used to distribute service
C. the entire YouTube community requests to resources is referred to as:

D. A Facebook Group A. load performing


B. load scheduling
543. Which among the following may affect
the cloud business model C. load balancing
A. Climate D. All of the above
B. Economic down
549. What model do most public cloud
C. Internet and network down providers use for their customers?
D. Client device down A. Single-tenancy
544. Which of the these companies is not a B. Multi-tenancy
leader in cloud computing
C. Distributed-tenancy
A. Google
D. none of above
B. Amazon
C. Raybiz 550. Web-based are of two type &
D. Microsoft A. Market place & Hosting a service

545. is a form of business process out- B. Market place & Selling to consumer
sourcing (BPO) that employs a cloud com- C. Product popularity & Hosting a service
puting service model
A. Business Process as a Service D. Brokering a product & Hosting a ser-
B. Software as a Service vice

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 646

551. What are some open source cloud comput- C. SaaS applications are not customiz-
ing platform databases able
A. MongoDB D. SaaS applications are customizable
B. CouchDB
557. Which of the following CANNOT be of-
C. LucidDB fered as a service via Cloud Computing?
D. all of the mentioned
A. hardware
command is used to create a file

NARAYAN CHANGDER
552. B. software
A. touch C. storage space
B. man
D. data
C. mkdir
D. mv 558. holds the information of the multiple
threads of execution
553. Which among the following is AWS Edge A. Process Control Block
Computing Service model that compute op-
timized and storage optimized B. Process
A. AWS Snowcone C. Thread Control Block
B. AWS Snowball D. Multithreading
C. AWS Snowmobile
559. Which of the following is used to define
D. AWS SnowCloud the service component that performs the
554. allows multiple customers to share service?
the same applications or the same physical A. WSDL
infrastructure while retaining privacy and
B. SCDL
security over their information.
A. Resource Pooling C. XML

B. On-demand Self Service D. None of the mentioned


C. Multi-tenancy 560. How much storage does Google give a
D. Scalability user for free in Google Drive?

555. What branch of Information Technology A. 1GB


protects computer systems? B. 5GB
A. Cybersecurity C. 15GB
B. Hacking D. 50GB
C. Database Management
561. Which term best describes water vapor?
D. none of above
A. Solid
556. Which of the following is a characteristic
of the SaaS applications? B. Liquid
A. SaaS applications are reliable C. Gas
B. Non-reliable D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 647

562. is a technique in which a complete in- 567. A regular computer, using a web browser
stallation of one machine is run on another to connect to the cloud.

PRACTICE BOOK» NOT FOR SALE


A. Full virtualization A. Thick
B. Para virtualization B. thin
C. Services C. mobile
D. instance creation D. data center
563. EC2 stands for?
568. Which among the following service is ref-
A. Elastic Compute Cloud ered to edge computing
B. Elastic Configuration Cloud A. CloudWave
C. Elastic Cloud Configuration B. CloudFront
D. Elastic Cloud Compute C. CloudSpot
564. AWS highly recommends provisioning D. CloudWatch
your compute resources across Avail-
ability Zones. 569. When working in Google Docs, how do
you save your changes?
A. single
A. Click the Save button
B. multiple
C. all B. Press CTRL+S

D. no C. As you work, all your changes are au-


tomatically saved
565. Choose the scenarios that need virtualiza- D. You cannot save documents in Google
tion software. Docs
A. A client needs to run one operating sys-
tem at a time. 570. A cloud computing company (for exam-
ple AWS and Microsoft Azure) usually pro-
B. A company needs an application to re-
vides
duce hardware and electricity costs.
C. A company needs to additional costs A. Storage as a service
and configuration complexities when up- B. Software as a service
grading the hardware.
C. Infrastructure and processing as a
D. none of above service
566. is the process of moving data, ap- D. Storage, software, processing and in-
plications, or other business components frastructure as a service
from an organization’s on-premises infras-
tructure to the cloud 571. Google’s cloud service is called

A. Integration A. Google Cloud


B. Migration B. Google Mail
C. Backup & Restore C. Google Dropbox
D. Uploading D. Google Drive

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 648

572. Identify the capability of a system to C. Sage One


adapt the increased service load is called D. All the above
as.
A. Scalability 578. Which of the following is a type of Ser-
vice Models?
B. Tolerance
A. Public-as-a-Service
C. Capacity
B. Platform-as-a-Service
D. None of the mentioned

NARAYAN CHANGDER
C. Community-as-a-Service
573. In which category of SaaS does CRM soft- D. Public-as-a-Service
ware fall?
579. Not a Service Model.
A. Consumer Services
A. IaaS
B. Communication Services
B. Azure
C. Infrastructure Services
C. PaaS
D. Business Services
D. SaaS
574. Cloud providers ensure that data files are
stored online. 580. Application frameworks provide a means
for creating hosted applications using
A. temporarily IDE.
B. permanently A. PaaS
C. synchronized B. SaaS
D. duplicated C. CaaS
575. A is an instance of a program execu- D. All of the mentioned
tion
581. Highest milestone of MLSA
A. Thread
A. New
B. Process
B. Beta
C. Operating System
C. Gold
D. Block
D. Platinum
576. Which type of cloud is highest in the
582. The need for data replication can arise in
sky?
various scenarios like
A. Cirrus
A. Replication Factor is changed
B. Cumulus
B. DataNode goes down
C. Stratus
C. Data Blocks get corrupted
D. none of above
D. All of the mentioned
577. is the example for accounting soft- 583. The ‘Cloud’ refers to resources and on-
ware in Cloud line storage that can be accessed on a
A. Zoho Books scale.
B. Quick Books A. Local

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 649

B. Global B. Distributed
C. Regional C. Spiral

PRACTICE BOOK» NOT FOR SALE


D. Social Media D. Waterfall
584. on-demand capacity provisioned to a 589. Which of these is not a negative to cloud
cloud is called computing?
A. cloud bursting A. Uses storage space on your PC
B. cloud integration B. Can cost money
C. throughput demand C. There is a risk of your information be-
D. latency maintanence ing hacked

585. One of the disadvantages of the hybrid D. Requires an internet connection


cloud is: 590. Which of these is a drawback of an ad-
A. a) Your security depends on the public hoc network?
cloud service provider. A. More devices can be added at any time
B. B) none, it is perfect.
C. C) Hybrid cloud management makes B. They are flexible in how they can be set
the company dependent on the provider’s up
services
C. They aren’t useful at all
D. the A and C
D. There is no one single device that has
586. Point out wrong statement: overall control, which means it can be-
come unorgainsed
A. A cloud cannot be created within an
organization’s own infrastructure or out- 591. model consists of the particular types
sourced to another datacenter of services that you can access on a cloud
B. A composable component must be computing platform.
modular A. Service
C. A composable component must be B. Deployment
stateless
C. Application
D. None of the above
D. None of the mentioned
587. Compact portable Edge Computing device
of AWS is 592. Which of the following is the most impor-
tant area of concern in cloud computing?
A. AWS Snowcone
A. Security
B. AWS Snowball
B. Storage
C. AWS Snowmobile
C. Scalability
D. AWS SnowCloud
D. All of the mentioned
588. model is a distributed application
structure that partitions the workloads be- 593. Hive also support custom extensions
tween client and server written in
A. Client-server A. C#

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 650

B. Java 599. In KVM, there are two methods for con-


C. C necting VM NICs to a physical network:(
).
D. C++
A. Bridge connection and direct connec-
594. Which of the following is commonly used tion
to describe the service interface, how to B. Address translation and passthrough
bind information, and the nature of the
C. Bridge connection and address trans-
component’s service or endpoint?

NARAYAN CHANGDER
lation
A. WSDL D. Passthrough and bridge connection
B. SCDL
600. The universal storage space unit mapped
C. XML to the host in the disk array is ( ), which is
D. None of the mentioned the logical space created based on RAID.
A. Storage pool
595. How do you access online accounts?
B. Volume
A. Access via internet browser, then en-
ter username and password C. LUN
B. Log into account D. Partition

C. Enter cloud website 601. Which of the following are advantages of


D. none of above cloud computing?
A. lower speeds
596. The rest state and motion of body are
B. local software
A. non relative
C. greater cost
B. not related D. easier collaboration
C. relative
602. provides the flexibility to increase or
D. none of above decrease the computing requirement as per
need.
597. Which of the following is not a NoSQL
database? A. space savings
A. HBase B. cost savings
B. SQL Server C. Accessibility
C. Cassandra D. Scalability

D. None of the mentioned 603. A legacy application needs a proprietary


file system. Which of the following can be
598. Broadly divide the cloud architecture used to store data accessible by an EC2 in-
into? stance?
A. 1 A. AWS EFS
B. 2 B. AWS S3
C. 3 C. AWS Glacier
D. 4 D. AWS CloudFront

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 651

604. Which of the following option describes 610. Which of the following google product
the most common AWS billing model? sends you periodic email alerts based on
your search term?

PRACTICE BOOK» NOT FOR SALE


A. Daily Billing
B. Annual Billing A. Alerts
C. Pay as you go B. Blogger
D. Pay in advance C. Calendar
605. The web server service name in Amazon D. All of the mentioned
Linux is
611. What is a hybrid Cloud?
A. vsftpd
B. httpd A. Cloud serving more than one customer

C. dhcpd
B. Cloud relying on different technologies
D. auditd
606. Which of the following is the correct full C. combination of private and public
form of SaaS? Cloud
A. Storage-as-a-Service
D. Cloud offering IaaS, PaaS, and SaaS
B. Software-as-a-Service
C. Server-as-a-Software 612. The is the collection of servers where
the application to which you subscribe is
D. None of the above housed.
607. HDFS is implemented in programming A. datacenter
language
B. server
A. C++
C. internet
B. Java
C. Scala D. intranet

D. None of the mentioned 613. Font used for resume writing is


608. Web services use to code and to de- A. Times New Roman
code data
B. Italic
A. UDDI
C. Arial
B. XML
D. Sans Serif
C. SOAP
D. None of the mentioned 614. Exabyte-scale data migration device used
to move extremely large amounts of data
609. Which of these is an example of Cloud
to AWS is by Service
Computing?
A. AWS Snowcone
A. USB stick
B. Drop Box B. AWS Snowball
C. SD Card C. AWS Snowmobile
D. none of above D. AWS SnowCloud

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 652

615. What are the challenge in SaaS Implemen- 620. What is it called when you work for a
taion? company from home?
A. Not knowing what they are agreeing to A. Teleconfrencing
B. Commuting
B. Not having a service level agreement C. TeleCommuting
C. Not knowing how their SaaS service D. The Daily Grind
provider performs and what state they are
621. The cloud infrastructure is operated

NARAYAN CHANGDER
in
for the exclusive use of an organization.
D. All the above
A. Public
616. Customer Relation Management is a B. Private
SaaS category C. Community
A. Packaged software D. All of the mentioned
B. Collaborative software
622. . refers to the location and management
C. Enabling and management tools of the cloud’s infrastructure.
D. None of the above A. Service
B. Deployment
617. Purchasing an asset (factory, computer
system, company car) is considered a C. Application

A. capital expenditure D. None of the mentioned

B. operational expenditure 623. What does the term “elasticity” in cloud


computing refer to?
C. petty cash
A. Ability to sccale down
D. floating fund
B. reuse
618. Which type of app generally provides the C. Ability to sccale up
most complete feature set? D. Both A and C
A. Desktop apps
624. Which technology is able to support live
B. Browser apps migration of data centers?
C. Tablet apps A. virtualization
D. Smartphone apps B. local storage
C. RAID
619. In cloud computing, your resources ae
measured, and you only pay for the re- D. Network Optimization
sources and workload you use. This is 625. The basic Web Services platform is com-
which feature of cloud computing? bination of and
A. Pay per use A. CSS + HTTP
B. on demand self service B. CSS + JAVA
C. elasticity C. XML + HTML
D. resource pooling D. XML + HTTP

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 653

626. Gmail is an example of? 632. Which of the following is concerned


A. SaaS with extensions and improvements of dis-
tributed systems?

PRACTICE BOOK» NOT FOR SALE


B. GSuit
A. Heterogeneity
C. PaaS
D. none of above B. Security

627. All of these are types of cloud services C. Concurrency


except D. Openness
A. Public cloud
B. Segregated cloud 633. Name of the Cloud provided by Microsoft

C. Hybrid cloud A. AWS


D. Private cloud B. App Engine
628. A drawback for gamers, when using the C. Azure
cloud, is the possible limited capac-
D. Cloudera
ity which would affect the quality of the
steaming.
634. How many deployment models in cloud
A. broadband computing?
B. internet
A. 4
C. WWW
B. 3
D. Buffering
C. 2
629. AWS S3 upon signup is provided for
customers in standard storage class D. 7
A. 10 GB
635. On a physical network, which of the fol-
B. 5 GB lowing devices supports route forwarding
C. 15 GB requests?
D. Unlimited A. Router
630. What is FE (hex) in binary? B. Layer 2 switch
A. 1101 1111 C. Hub
B. 1110 1111 D. Physical server NIC
C. 1111 0101
D. 1111 1110 636. Which vendor recently launched a cloud-
based test and development service for en-
631. Guess how many services and features terprises?
are there in AWS?
A. HP
A. 1000
B. Cisco
B. 1950
C. 750 C. IBM
D. 2000 D. Oracle

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 654

637. dimension corresponds to two dif- C. A minimum of three


ferent states in the eight possible cloud
D. A minimum of four or more
forms.
A. Physical location of data 643. Can you limit patches to just laptops or
B. Ownership desktops?

C. Security boundary A. Yes


D. None of the mentioned B. No

NARAYAN CHANGDER
638. . offering provides the tools and develop- C. None of these
ment environment to deploy applications D. none of above
on another vendor’s application.
A. PaaS 644. Which of them is not a Cloud Service
Model?
B. IaaS
A. SaaS
C. CaaS
B. DaaS
D. All of the mentioned
C. IaaS
639. Windows Azure and Force.com are exam-
ple of? D. PaaS
A. PaaS 645. allow you to virtualize your servers
B. SaaS so that multiple virtual servers can run on
C. IaaS one physical server

D. All of the above A. Hypervisor Applications


B. cloud applications
640. What is an example of PaaS?
A. Google App Engine C. client solutions

B. Amazon Web Services D. server software


C. SAP Business onDemand 646. Cloud computing is a concept that in-
D. Google Calendar volves pooling physical resources and of-
fering them as which sort of resource?
641. Which of the following can be identified
as cloud? A. cloud
A. Web Applications B. real
B. Intranet C. Virtual
C. Hadoop D. none of the mentioned
D. All of the mentioned
647. Example for web development interfaces
642. How many Availability Zones should com- A. SSL and VPN
pute resources be provisioned across to
achieve high availability? B. mashup or a plugin.
A. A minimum of one C. add-on and mashup
B. A minimum of two D. SOAP and REST

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 655

648. scales up/down the compute re- 653. Which of the following is a repeatable
sources based on the demand task within a business process?

PRACTICE BOOK» NOT FOR SALE


A. Autosacling A. service
B. Security Group B. bus

C. Virtual Private Cloud C. methods


D. all of the mentioned
D. Elastic Load Balancer
654. Which of the following allows you to cre-
649. Which of the following storage devices ate instances of the MySQL database to
exposes its storage to clients as Raw stor- support your Web sites?
age that can be partitioned to create vol-
umes? A. Amazon Elastic Compute Cloud
B. Amazon Simple Queue Service
A. block
C. Amazon Relational Database Service
B. file
D. Amazon Simple Storage System
C. disk
D. all of the mentioned 655. Why cloud computing more essential?
A. Keep the files as organised in cloud
650. A company requires a file system which B. Extend your network on cloud
can be used across a set of instances.
Which of the following storage options C. Reduce the company expenditure
would be ideal for this requirement? D. Secure your application local storage
A. AWS S3 656. The model originally did not require
B. AWS EBS Volumes a cloud to use virtualization to pool re-
sources.
C. AWS EFS
A. NEFT
D. AWS EBS Snapshots
B. NIST
651. Which of the following is one of the C. NIT
unique attributes of Cloud Computing?
D. All of the mentioned
A. utility type of delivery
657. Graphical information that is stored in a
B. elasticity way that it can be used by devices such as
C. low barrier to entry smartphones and tablets to provide data
about your location
D. All of the mentioned
A. Geo-data
652. Which among the following is Windows B. G-data
web server
C. Glob-data
A. Apache D. Global-data
B. http
658. which of the following is specified param-
C. Ngnix eter of SLA
D. IIS A. response times

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 656

B. responsibilities of each party C. Infrastructure as a service (IaaS)


C. warranties D. none of above
D. All of the mentioned 664. How many characteristic of cloud?
659. Which Azure compute resource can be de- A. 5
ployed to manage a set of identical virtual B. 4
machines?
C. 3
A. Virtual machine scale sets

NARAYAN CHANGDER
D. 1
B. Virtual machine availability sets
665. Which of these is not a component of com-
C. Virtual machine availability zones
putational thinking?
D. none of above
A. Abstraction
660. What types of storage services does Mi- B. Memory
crosoft Azure offer?
C. Decomposition
A. Blob, queue & table storage
D. Pattern Recognition
B. Implicit, table storage & blob
666. Resources are centralized amongst the
C. Table storage, semantic & blob various branches of an organization in a
D. Queue, blob & implicit cloud.

661. What does RRS stand for when referring A. Public cloud
to the storage option in Amazon S3 that of- B. Hybrid cloud
fers a lower level of durability at a lower C. Private cloud
storage cost?
D. Community cloud
A. Reduced Reaction Storage
B. Redundant Research Storage 667. How many bits are needed to represent
128 values?
C. Regulatory Resources Storage
A. 6
D. Reduced Redundancy Storage
B. 7
662. An address is a static, public IPv4 ad- C. 8
dress designed for dynamic cloud comput-
D. 9
ing.
A. Public IP 668. is the example for IaaS
B. Private IP A. EBS
C. Automatic IP B. EC2
D. Elastic IP C. RDS
D. Docker
663. Amazon Elastic Compute Cloud (EC2) is
primarily considered which type of cloud 669. Which of the following area of cloud com-
computing model? puting is uniquely troublesome?
A. Software as a service (SaaS) A. Auditing
B. Platform as a service (PaaS) B. Data integrity

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 657

C. e-Discovery for legal compliance 675. Which data may not be suitable for public
D. All of the mentioned clouds?

PRACTICE BOOK» NOT FOR SALE


A. Legacy application data
670. The term refers to a Network or In-
ternet. B. Mission-critical workloads

A. Cloud Computing C. Sensitive data

B. Cloud D. All the answer is correct

C. Computing 676. Distributed system is a collection of


D. Resource A. Parallel Computer

671. Distributing instance across helps for B. Client server computing


reduancy of applications due to failure C. Autonomous computer
A. Region D. Cloud Computing
B. Availability Zone 677. How can you upload content to Google
C. Amazon VPC Drive?
D. Resource Group A. Click New, File upload

672. Can Amazon EC2 have an Amazon Re- B. Click New, Folder upload
source Name (ARN)? C. Drag files into the Drive window
A. No, because EC2 is unrelated to ARN D. You can use any of these methods to
B. No, because you can’t specify a partic- upload files to Google Drive
ular Amazon EC2 resource in an IAM pol- 678. Which types of issues are associated
icy with the SaaS?
C. Yes A. Modest software tools
D. Yes, just for certain kind of EC2 in- B. Multitenant solutions
stances
C. Centralized management and data
673. In which environment do admins have the D. Network dependence
most control over cloud app security?
A. PaaS 679. Mention the categories of SaaS

B. SaaS A. Packaged software

C. IaaS B. Collaborative software

D. SECaaS C. Enabling and management tools


D. All the above
674. You can’t count on a cloud provider main-
taining your in the face of government 680. Which of the following is considered as
actions. Web Service Platform Elements?
A. scalability A. WSDL
B. reliability B. SOAP
C. privacy C. UDDI
D. None of the mentioned D. All of the mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 658

681. is called as the sum of all direct and 686. What is the name of the organization
indirect costs of the organization helping to foster security standards for
cloud computing?
A. Return on investment
A. Cloud Security Standards Working
B. Total Cost of ownership
Group
C. Profit & Loss
B. Cloud Security Alliance
D. None of the above C. Cloud Security WatchDog

NARAYAN CHANGDER
682. Users are able to provision cloud comput- D. Security in the Cloud Alliance
ing resources without requiring human in-
teraction. 687. Which of the following is the most refined
and restrictive cloud service model?
A. On-demand self-service
A. IaaS
B. On demand action
B. PaaS
C. Self service console
C. SaaS
D. Automated service D. XaaS
683. means that when a user makes a 688. cloud is one where the cloud has been
change to a file this change will appear in organized to serve a common function or
the versions used by others purpose.
A. Synchronization A. Public
B. Upload B. Private
C. Real time processing C. Community
D. none of above D. All of the mentioned

684. What is a single-tenant cloud 689. Database marketplace based on SQL


Azure Database is code-named
A. Only one customer is hosted on a
server and is granted access A. Akamai
B. Multiple customers hosted on a server B. Dallas
and is granted access C. Denali
C. None of the above D. none of above
D. none of above 690. Which one of the following can be consid-
ered as the example of the Front-end?
685. Which is/are true regarding cloud com-
puting? A. Web Browser
A. It provides on-demand network ac- B. Google Compute Engine
cess C. Cisco Metapod
B. It does not provide ubiquitous access D. Amazon Web Services
C. Resources can be released with no
691. Which of the below mentioned options is
management effort
not available when an instance is launched
D. None of these by Auto Scaling with EC2 Classic?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 659

A. Private DNS C. 3
B. Private IP D. 4

PRACTICE BOOK» NOT FOR SALE


C. Public IP
697. An application that needed storage
D. Elastic IP
alone might not benefit from a cloud de-
692. We can access our applications and data ployment at all.
anywhere in the world, on any system. A. online
This is which advantage of cloud comput-
ing? B. offline
A. Speed & Scales C. virtual
B. Flexibility D. all of the mentioned
C. Device Diversity
698. what do cloud services provide to help
D. Easier Management
with privacy and security concerns
693. Which of the following dimension is re- A. collaboration
lated to organization’s boundaries?
B. accessibility
A. Physical location of data
B. Ownership C. encryption

C. Security boundary D. backups


D. All of the mentioned
699. A type of wireless network that does not
694. is situated in cloud computing be- rely on fixed hardware such as routers
tween SaaS and infrastructure as a service A. Bus Network
(IaaS).
B. Ad Hoc Network
A. Public PaaS
C. LAN Network
B. Private PaaS
C. Hybrid PaaS D. Ad Hic Network
D. None of the above 700. and are the top issues in this field
695. . cloud is one where the cloud has been A. Security and cost
organized to serve a common function or
purpose by many organisation . B. sharing and implementation
A. Public C. Service and virtualization
B. Private D. resource and hardware
C. Community
701. Example of Software as a service(SaaS)
D. All of the mentioned
A. AT & T-hosting
696. How many types of service model are
mainly present in Cloud? B. Rackspace

A. 1 C. Gmail
B. 2 D. AmazonEC2

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 660

702. Which one of the following is a kind 707. Which is not a cloud computing plat-
of technique that allows sharing the sin- form?
gle physical instance of an application or
A. GCP
the resources among multiple organiza-
tions/customers? B. CloudU
A. Virtualization C. Microsoft Azure
B. Grid Computing
D. AWS
C. SOA

NARAYAN CHANGDER
D. Utility Computing 708. Which type of cloud is owned and used
by single organization over a private net-
703. What does HDFS mean? work?
A. Hadoop Distributed File System ( HDFS
A. Public cloud
)
B. Hide Distributed File System ( HDFS ) B. Private cloud
C. Hadoop Distributed File Software ( C. Both public and private cloud
HDFS )
D. None of the above
D. none of above
709. is newer than Apache, being fast and
704. Having things like photos saved onto
using less memory
your cloud as well as your device is known
as what A. Linux Web Server
A. Synchronisation B. NGINX
B. Matchification
C. TOMCAT
C. Updating
D. IIS
D. Backing up
705. The capability provided to the consumer 710. which of the following do you believe
is to deploy onto the cloud infrastructure would be the number one concern about
consumer-created applications is called cloud computing?
A. too expensive
A. SaaS
B. security concerns
B. PaaS
C. too many platforms
C. IaaS
D. None of the above D. accessibility

706. A type of wireless network that does not 711. What extra things can you do on Cloud
rely on fixed hardware such as routers in Computing?
a wired network is known as a what?
A. Use your computers in any whether
A. A riff raff network
B. Share Files
B. An ad hoc network
C. A Wi-Fi network C. It does your work for you
D. A DIT network D. none of above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 661

712. Amazon S3 offers encryption services for 718. What are the risks of cloud computing?
A. No troubleshooting issues

PRACTICE BOOK» NOT FOR SALE


A. Data in Flight B. Full control over the data
B. Data in Motion C. Storing data without control
C. Data in Rest D. No government intrusion
D. Both 1 & 2
719. “Cloud” in cloud computing represents
713. The executes the Mapper/ Reducer what?
task as a child process in a separate jvm. A. Wireless
A. JobTracker B. Hard drives
B. TaskTracker C. People
C. TaskScheduler D. Internet
D. None of the mentioned
720. What is a disadvantage of cloud stor-
714. Types of cloud age?

A. One A. Files can be modified by multiple users


and kept updated.
B. Two
B. Cloud storage is only for teachers.
C. Three
C. Can only be accessed where there is
D. Four an internet connection.
715. Which of the following is an example of D. Files can be accessed on multiple de-
a PaaS cloud service? vices.
A. Heroku 721. Cloud computing services such as storage
B. AWS Elastic Beanstalk and software
C. Windows Azure A. Can be accessed on any device
D. All of the above B. Are always free
C. Can be accessed by any device that is
716. A hypervisor is sometimes also called a? connected to a LAN
A. VMA D. Can be accessed on any device that is
B. VMM connected to the internet
C. VMR 722. How does Cloud computing change the
D. VMN relationship between provider and cus-
tomer?
717. These are the benefits of cloud computing
A. Increased focus on service level
in education system except
agreements (SLAs)
A. shareable and traceable data
B. less compliance to standards
B. stable technology for everyday use C. less focus on service level agreements
C. Easy access from anywhere (SLAs)
D. Inflexibility in customizing products D. more focus on training

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 662

723. What type of computing technology 728. What type of clouds are called “fair
refers to services and applications that weather clouds” and look like floating cot-
typically run on a distributed network ton?
through virtualized resources? A. Cumulus
A. Distributed Computing B. Stratus
B. Cloud Computing C. Nimbus
C. Soft Computing D. Cumulonimbus

NARAYAN CHANGDER
D. Parallel Computing 729. Why can Cloud Computing sometimes pro-
vide better performance?
724. The term “IDaaS” stands for? A. specialisation of the technology
A. Interoperability-as-a-Service B. less friction on the Internet
B. ID-as-a-Service C. no need to worry about security
C. Intranet-as-a-service D. serving a single user

D. Identity-as-a-Service 730. Which among the following AWS service


create block level storage devices
725. Microsoft health records services are A. Amazone S3
called
B. Amazone EBS
A. HealthVault C. Glacier
B. Health Online D. DynamoDB
C. HealthCare 731. There are how many components of
D. HealthService cloud?
A. One
726. enables batch processing, which greatly
B. Two
speeds up high-processing applications
C. Three
A. Scalability
D. Four
B. Reliability
732. Which of these should a company con-
C. Elasticity sider before implementing cloud computing
D. Utility technology?
A. Employee satisfaction
727. is a resource management plat-
B. Potential cost reduction
form responsible for managing compute re-
sources in the cluster and using them in or- C. Information sensitivity
der to schedule users and applications. D. All of the above
A. Hadoop Common 733. Virtual machines run on top of?
B. Hadoop Distributed File System A. Hardware
(HDFS) B. Software & Hardware
C. Hadoop YARN C. Hypervisor
D. Hadoop MapReduce D. VM Instance

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 663

734. For every additional symbol added to the 739. Which of the following can be referred
length of your password what happens? to the location and management of the
cloud’s infrastructure?

PRACTICE BOOK» NOT FOR SALE


A. Makes password difficult to remember
A. Service
B. Makes password more complex and B. Application
harder to break
C. Deployment
C. Makes password more confusing
D. None of the mentioned
D. none of above
735. is the process that allows video to 740. Servicing multiple customers using the
be viewed straight away on a website, same physical resources.
without having to wait for the full video A. Resource pooling
to download. This technology is very im-
B. Rapid elasticity
portant to platforms such as Netflix and
YouTube. C. Resource elasticity
A. Buffering D. Rapid pooling
B. Virtual Download
741. Which of the following module of
C. Streaming SOA is shown in the following fig-
D. Upload ure? cloud-computing-questions-answers-
service-oriented-architecture-q4
736. A system uses components to assem-
ble services that can be tailored for a spe- A. Description
cific purpose using standard parts. B. Messaging
A. reliable C. Business Process
B. scalable D. QOS
C. composable
742. Which of the following is a means for ac-
D. none of the mentioned
cessing human researchers or consultants
737. Please choose the advantage of Azure to help solve problems on a contractual or
that best matches the description:keeping temporary basis?
uptime at the maximum possible level A. Amazon Elastic MapReduce
A. Security
B. Amazon Mechanical Turk
B. Availability
C. Amazon DevPay
C. Scalability
D. Multi-Factor Authentication
D. Development environment
743. Cloud computing gets its name as a
738. Which of the following SaaS platform is
metaphor for the
with an exposed API?
A. salesforce.com A. Internet
B. amazon.com B. intranet
C. flipkart.com C. extranet
D. all of the mentioned D. network

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 664

744. Which of the following is operational do- 750. How is private cloud hosted
main of Cloud Security Alliance? A. Internally
A. Scalability B. Externally
B. Portability and interoperability C. Both internally and externally
C. Flexibility D. none of above
D. None of the mentioned
751. How cost saving could be done in cloud?

NARAYAN CHANGDER
745. WSDL Stands for A. Storing data online
A. None of these B. Publishing application online
B. Web Services Description Language C. Hosting database online
C. Web Services Design Language D. All the above
D. Web Services Development Language 752. ROI stands for ( in Cloud terms)
746. Which of the following can be considered A. Rate of Interest
PaaS offering? B. Return on Investment
A. Google Maps C. Risk of Incident
B. Gmail D. Response on Incident
C. Google Earth
753. It is made up of a single organization
D. All of the mentioned with its own cloud of servers and software
for use without a public access point. This
747. CSP ensures the seemless delivery of ser-
belongs to:
vices through
A. public cloud
A. Policies
B. private cloud
B. Service Level Agreement
C. cloud hybrid or community
C. Email
D. none of above
D. Payment
754. In private cloud customer control
748. Other catalysts of Cloud Computing are
A. Applications, data, OS, Virtualization,
Servers, Stroage, Networking
A. Distributed computing
B. Applications, data, OS
B. Parallel computing
C. Virtualization, Servers,
C. Ubiquitous computing
D. Networking
D. All the above
755. Which of the following is NOT a potential
749. Managed IT services are based on the risk of Cloud Computing?
concept of?
A. security and legal issues
A. Virtualization B. lock-in
B. SOA C. cross-over risks from other customers
C. Grid Computing
D. Utility Computing D. dependance on physical location

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 665

756. Amazon web service is which type of 761. This is a software distribution model in
cloud computing distribution model? which applications are hosted by a vendor
or service provider and made available to

PRACTICE BOOK» NOT FOR SALE


A. SAAS
customers over a network, typically the In-
B. PAAS ternet.
C. IAAS A. Software as a Service (SaaS).
D. DAAS B. Infrastructure as a Service (IaaS)
C. Platform as a Service (PaaS)
757. The ability to continue to function at a
high level of performance as workflow vol- D. none of above
ume increases.
762. This technology allows data access & pro-
A. Scalability cessing from anywhere on the Internet.
B. Self service A. data analytics
C. Elasticity B. cloud computing
D. Measured service C. virtualization
D. micromarketing
758. A type of network model where all com-
puters on the network share responsibility 763. Which of the following components of
and there is no one central server. the AWS Global Infrastructure consists of
one or more discrete data centers intercon-
A. Peer to peer
nected through low latency links?
B. Client-server
A. Availability Zone
C. Mesh
B. Edge location
D. Virtual network C. Region
759. Which of the following is a correct re- D. Private networking
lationship between regions, Availability
764. Which of the following services should
Zones, and edge locations?
be used when the primary concern is to
A. Data centers contain regions. perform work in response to an event (of-
B. Regions contain Availability Zones. ten via a REST command) that needs a re-
sponse in a few seconds?
C. Availability Zones contain edge loca-
A. Azure Functions
tions.
B. Azure App Service
D. Edge locations contain regions.
C. Azure Container Instances
760. Which of the following is a classic exam- D. none of above
ple of an IaaS service model?
A. AWS 765. Distributed system software enables
computer to coordinate their activities to
B. Azure share the resources of
C. Cloudera A. Data and operating system
D. none B. Hardware, Software and Data

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 666

C. Software and Data B. SOA


D. None of the mentioned C. Virtualization

766. Which of the following Computer Tools D. All the above mentioned
are “Cloud Computing” resources:
772. Most of the cloud architectures are built
A. Google Drive on this type of architecture.
B. Ubuntu One A. skeleton

NARAYAN CHANGDER
C. deviant B. grid
D. microsoft office C. linear
767. Amazon EBS volumes can be maximized D. template
up to?
773. is the default Partitioner for parti-
A. 1TB tioning key space.
B. 2TB A. HashPar
C. 3TB B. Partitioner
D. 4TB C. HashPartitioner
768. Web services communicate using D. None of the mentioned
A. None of these 774. is the U.K government cloud program
B. Open protocols A. G-Cloud
C. Close protocols B. Amazon Web Services
D. Open-Close protocols C. MS Azure
769. Which of the following provide system re- D. G-Guite
source access to virtual machines?
775. A acts as an intermediary that pro-
A. VMM
vides connectivity and transport of cloud
B. VMC services between cloud consumers and
C. VNM cloud providers.
D. All of the mentioned A. cloud carrier
B. cloud provider
770. is a set of solution and products
which includes GCP & G suite C. cloud broker
A. Google Cloud D. cloud auditor
B. VMWARE 776. A computer that stores and shares infor-
C. AZURE mation with other computers on a network
is called a
D. AWS
A. Personal Computer (PC)
771. Which one of the following a technology
works behind the cloud computing plat- B. Network
form? C. Data Center
A. Grid Computing D. Server

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.17 Cloud computing 667

777. Which is not a major cloud computing plat- C. microsoft


form? D. windows

PRACTICE BOOK» NOT FOR SALE


A. Google 101
783. Resource usage is monitored, measured,
B. IBM Deep blue reported and billed based on use.
C. Microsoft Azure A. Measured service
D. Amazon EC2 B. Measured outcomes
C. Pay as you grow
778. Sending data to your device in a con-
tinuios flow whilst you are connected to D. Pay as you measure
the internet, without saving it to the de- 784. Through which one of the following mod-
vice is known as what? els, SaaS supports multiple users and of-
A. Streaming fers a shared data model?
B. Downloading A. Single tenancy
C. Saving B. Multi tenancy
D. Opening C. Multi instance
D. Single instance
779. Putting copies of data on multiple servers
is a process called 785. Which of the following are geographic
areas that host two or more Availability
A. Cloning
Zones?
B. Redundancy A. AWS Origins
C. Data Processing B. AWS Regions
D. Cloud Computing C. Compute zones
780. What is the world’s largest computer net- D. Edge locations
work? 786. Which cloud model would be used for a
A. Facebook cloud solution for a group of collaborat-
ing computer teachers sharing photos, files
B. Google
and materials in their efforts to obfuscate
C. iCloud and confuse their students?
D. Internet A. public
781. What is the name of Apple’s cloud ser- B. hybrid
vice? C. private
A. The Cloud D. community
B. Drive 787. Which one of the following offers the
C. Dropbox control structures and development frame-
works?
D. iCloud
A. IaaS
782. one drive is given by B. SaaS
A. Google C. PaaS
B. apple D. All the above mentioned

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 668

788. What are the main components of 791. AWS Free Usage tier can use up to
Hadoop Ecosystem? per month of t2.micro instances running
Microsoft Windows Server for free
A. MapReduce, HDFS, YARN
A. 750 hours
B. MLlib, GraphX
B. 720 hours
C. Gelly, Table, CEP
C. 700 hours
D. None of the mentioned
D. 780 hours

NARAYAN CHANGDER
789. Which is a characteristic of a Type 1 hy- 792. Which of these companies specializes in
pervisor? cloud computing management tools and
A. works within a host OS services?

B. often used with client-side virtualiza- A. RightScale


tion B. Google
C. best suited for consumers, not busi- C. Salesforce.com
nesses D. Savis
D. often called a bare-metal hypervisor
793. The applications are accessible from var-
ious client devices through either a thin
790. Which of the following technologies or de-
client interface, such as a web browser is
vices cannot isolate broadcast domains?
called
A. Router A. SaaS
B. VLAN B. PaaS
C. Hub C. IaaS
D. Firewall D. CaaS

1.18 web technology


1. pattern is the most common way visitors D. none of above
scan text on a website.
3. If you want to have more than one decla-
A. Rule of Third ration in a CSS rule, what character sepa-
B. F-Shaped rates them?
C. No Correct Answer A. comma,
D. none of above B. semi-colon ;
C. colon:
2. The best way to go when considering the
user experience and the usability of your D. none of above
website.
4. A program that converts text files into ex-
A. Readability ecutableapplications.
B. Useability A. Object
C. Simplicity B. Application

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 669

C. Browser C. Browser detection


D. Compiler D. Compiler

PRACTICE BOOK» NOT FOR SALE


5. The first page that appears when you open 11. How to disply values to the user?
the web browser known as
A. Using Request.form
A. Web page
B. Using Response.write
B. Home page
C. Using Request. Querystring
C. Web site
D. Using Request.Servarvariables
D. Home Button
12. Transferring your HTML code from one ma-
6. is a collection of controls in HTML. chine to server is known as
A. Form A. Indexing
B. Field B. Hosting
C. Table C. Serving
D. Frame D. Sorting
7. is known as father of WWW 13. Web Host
A. Robert Callibiue A. a computer language used to make
B. Sundar Pichai web sites
C. Charls Darwin B. a company that provides space for a
website
D. Tim Berner Lee
C. a word/image that you can click on to
8. Which rule set would change the font size navigate
to 24?
D. a program that lets you look at web
A. font-size:24 pages
B. size:24;
14. A link from a hypertext document to an-
C. font-size:24; other location, activated by clicking on a
D. font size:24; highlighted word or image.
A. Hyper Text
9. In order to upload an HTML file to a web
server, you use B. Hyper Image
A. HTTP C. Hyperlink
B. SMTP D. Hyphen
C. STP 15. style sheet should be saved with a
D. FTP “.css extension”.

10. A style of programming that links data to A. Inline


the processesthat manipulate it. B. Internal
A. Object oriented C. External
B. Offline web application D. Multiple

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 670

16. What is Web 2.0 22. Id selector is defined with


A. personal A. :
B. collaborative B. ;
C. social
C. ?
D. administrative
D. #
17. Which browser has built-in support for ex-

NARAYAN CHANGDER
ecuting VBScript? 23. What is the correct HTML for creating a
A. Internet Explorer hyperlink?
B. Mozilla Firefox A. <a href=”http://www.facebook.com”>Facebook</a>
C. Opera
D. None of these B. <a>http://www.facebook.com</a>

18. An HTML extension that allows Web pro-


grams to functionwhen an Internet connec- C. <a name=”http://www.facebook.com”>Facebook</a>
tion is not available.
A. Compiler D. <a url=http://www.facebook.com>FFacebook</a>
B. FTP
24. files are more compact than the GIF
C. Offline web application files.
D. RTF A. Mp3
19. In the Select Case statement, which case B. Mp4
is used for unknown cases?
C. .JPG and JPEG
A. Else
D. None of the above
B. Default
C. Unknown 25. Which selector will change the font of the
D. Not text?

20. what is web 3.0 A. font-size


A. red B. text-align
B. 3.0 C. font-famiy
C. Semantics D. text-decoration
D. Nothing
26. Which VBScript function returns the day of
21. How do you change the font color with the week for any date?
CSS?
A. Date
A. font-color:green;
B. color:green; B. Day

C. change-font-color:green; C. Weekday
D. fontcolor=green; D. Now

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 671

27. What is missing from this HTML skeleton? A. provides the web browser with secu-
<!DOCTYPE html><html><body></body></html> rity information

PRACTICE BOOK» NOT FOR SALE


B. instructs the browser where to look
A. <head></head> for your CSS files
B. <div></div> C. Allows programmers to link to files in-
line
C. <img></img>
D. Tells the web browser what language
D. <head>
to expect
28. An HTML extension used to provide on- 33. CSS stands for?
the-fly graphics oranimation to a Web
page. A. Common Stylesheets

A. Canvas B. Cascading Stylesheets

B. RTF C. Current Stylesheets

C. Canvo D. None

D. POP 34. Web page editors works on a princi-


ple.
29. A horizontal bar, typically located at the
A. WWW
top of the screen below the title bar, con-
taining drop-down menus. B. HYML
A. Title Bar C. WYSIWYG
B. Tool Bar D. WYGWYSI

C. Menu Bar 35. DHTML is a technology


D. Address Bar A. Server-side
B. Client-side
30. What two VBScript commands can be used
to make decisions? C. Both (a) and (b)
A. if..then..else D. None of the above
B. select..case 36. Our website is very popular on the system
C. A and B are correct. of information that is available on the In-
ternet.
D. None of these.
A. www
31. Where in an HTML document is the correct B. meta tag
place to refer to an external style sheet?
C. hyperlink
A. in the <head> section
D. web host
B. in the <Body> section
37. What is the function of a title tag?
C. at the end of document
A. stores webpage title for browser and
D. None of the above
search engine results
32. What is the purpose of <!DOCTYPE B. show server how to index the website
html>?

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 672

C. shows meta information about the title B. Forward button


C. Back button
D. shows server how to title the website D. Refresh button
38. An HTML extension that allows Web page 43. ASP stands for
elements to bemoved inside and outside
the Web page. A. Active Server Pages
A. Drag-and-drop B. Action Server Pages

NARAYAN CHANGDER
B. FTP C. Active Source Pages
C. DOM D. Active Server Procedure
D. Canvas 44. Where in the HTML document is the cor-
rect location to insert code to link to your
39. tag is used to give heading to the
external CSS?
whole table.
A. In the <head> section
A. Header
B. In the <body> section
B. Meta
C. At the very end of the document
C. Font
D. At the very beginning of the document
D. Caption
45. Type a word into the computer program
40. Which code is correct for creating
that allows people to look for particular
Textbox?
information to find a web site.
A. <input type=”textbox” id=”fname”
A. search engine
name=”fname”>
B. http
B. <input type=”text” id=”fname”
name=”fname”> C. website
C. <input type=”textfield” id=”fname” D. meta tag
name=”fname”>
46. HTML
D. <input type=”textarea” id=”fname”
name=”fname”> A. a word/image that you can click on to
navigate
41. is a program running on the server ma- B. a computer language used to make
chine, which accepts requests from a Web web sites
browser and sends back results in the form
of HTML documents. C. a collection of related Internet pages

A. HTML D. a company that provides space for a


website
B. HTTP
C. Web Server 47. Which method is used when form
is submitted and next file URL look
D. Web browser like https://www.gla.ac.in/next.php?
42. It is used to track backwards from the cur- Sname=Rakesh & Cname=BCA
rent page to the previous pages. A. Post
A. Stop button B. Get

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 673

C. Reset C. Geolocation
D. Submit D. Canvas

PRACTICE BOOK» NOT FOR SALE


48. The primary colors are 54. are used to apply visual effects to
some HTML objects.
A. Red, green, yellow
A. Errors
B. Red, white, yellow
B. Colors
C. Red, green, blue
C. Filters
D. Red, yellow, blue
D. Tags
49. Which of the following is a type of CSS?
55. sets the element to one side of the page
A. Inline Stylesheets
A. margin
B. External Stylesheets
B. width
C. Embedded / internal Stylesheets
C. float
D. All the above
D. height
50. HTML document should begin with the 56. Which of these are string functions avail-
A. <BODY> able in VBScript.
B. <Head> A. CHR
C. <Title> B. INSTR
D. <HTML> C. LCASE
D. ALL OF THE ABOVE
51. is used to create the inverse of an ob-
ject. 57. What is the name of the location address
A. Inverse of the hypertext documents?
B. Inverted A. Web server

C. Invert B. Telnet
C. Uniform Resource Locator
D. Inversed
D. Web Address
52. An effective web design has both great de-
sign and great content. 58. Which is the one of the frame tags at-
tributes?
A. Proximity
A. Longdesc
B. Content
B. Vlink
C. Promotion
C. alink
D. Layout
D. Framespacing
53. A general term used to describe the combi-
59. Where to Put the VBScript code
nation ofHTML, script, styles and the Doc-
ument Object Model(DOM) that provides A. Head section
Web page interactivity. B. Body Section
A. Function C. Both body and head section
B. DHTML D. None of these

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 674

60. Which of the following tag is used to mark 66. Which element is not part of Form tag?
a begining of paragraph? A. <Input>
A. <td> B. <select>
B. <br> C. <textarea>
C. <p> D. <textbox>
D. <tr>
67. The text used in webpage codes that pro-
61. More people are using their phones or vide information to search engines gives

NARAYAN CHANGDER
other devices to browse the web us high search rankings.
A. Mobile Friendly A. hyperlink
B. User Friendly B. meta tag
C. Easy to Use C. web host
D. Device Friendly D. none of above

62. In order to connect to ISP server, you need 68. specifies the distance between the
edge of table cells and their content.
A. Hand Gloves
A. Cellspacing
B. Printer
B. Rowspan
C. User Name and Password
C. Colspan
D. None of the above
D. Cellpadding
63. Class selector is defined with
69. The company’s text and sym-
A. # bols that form a web address is
B. * http://tbbrownincorp.com.
C. . A. meta tag
D. {} B. URL
C. search engine
64. Website
D. web host
A. a computer language used to make
web sites 70. VBScript is an
B. a collection of related Internet pages A. Active Scripting Language
C. a program that lets you look at web B. Passive Scripting Language
pages C. Both Active and Passive Scripting Lan-
D. a word/image that you can click on to guage
navigate D. None
65. What are shared on the Internet and are 71. Which language is used for creating Web
called as Web pages? Pages?
A. Programs A. PASCAL
B. Cables B. C
C. Microwaves C. JAVA
D. Hypertext documents D. HTML

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 675

72. What is the difference between the Sub C. All of the above
procedure and Function procedure? D. None of these

PRACTICE BOOK» NOT FOR SALE


A. Only the Sub procedure can perform
78. VBScript is developed by
actions
A. Netscape
B. Both procedures can take arguments
B. Opera
C. Only the Function procedure can re-
turn a value C. Sun
D. All of the above D. Microsoft

73. Which is not client side scripting lan- 79. An HTML extension used to provide
guage? location-basedservices.

A. Vbscript A. Function
B. DHTML
B. Javascript
C. Geolocation
C. Java
D. Canva
D. None of these
80. Which loop is used to iterate till a condition
74. How to load the webpage without reload- becomes true?
ing the server
A. For Next loop
A. Using jsp
B. For Each Next loop
B. Servelet
C. Do While loop
C. Using Ajax
D. Do Until loop
D. Using javabean
81. A stand-alone, reusable segment of pro-
75. A Procedure can have: gram code that isnot part of an object.
A. a declaration part A. Function
B. an executive part B. DHTML
C. both a & b C. Run file
D. none of the above D. RTF

76. the attribute to specify the number of 82. What is Web 1.0
visible values in listbox A. static
A. option B. still
B. Selected C. Personal
C. Maxvisible D. Nothing
D. size 83. What does a class do?
77. Which of these are math functions avail- A. adds color to words
able in VBScript B. adds style to specific elements
A. Abs C. adds style to a whole page
B. Array D. adds a lot more work

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 676

84. it has the power to communicate messages 90. effect adds a glowy effect around an
and evoke emotional responses. object.
A. Hue A. Glow
B. Color B. Glower
C. Photo C. Glowy
D. none of above D. All the above

NARAYAN CHANGDER
85. Web browser 91. The ability to use the DOM and discover
particularaspects of a user agent.
A. a collection of related Internet pages
A. Object oriented
B. a computer language used to make
web sites B. Web application
C. a program that lets you look at web C. Browser detection
pages D. Compiler
D. a word/image that you can click on to 92. the way finding system used on websites.
navigate
A. Location
86. VBScript was launched in B. Navigation
A. 1995 C. Transportation
B. 1996 D. none of above
C. 1994
93. You can click this button to start reloading
D. 1997 that particular webpage or site.
87. Which of the following is a CSS style rule? A. Stop button
A. Predictor B. Forward button
B. Selector C. Back button
C. Initializer D. Refresh button
D. All of the above 94. are used to determine the style and
layout of web pages.
88. What does CSS stand for?
A. CSS
A. Creative Style Sheets
B. DOM
B. Cascading Style Sheets
C. IRM
C. Colorful Style Spread
D. All of the Above
D. Computer Style Spread
95. A W3C standard that specifies the way ob-
89. HTML document saved with extension jects aremanipulated through script.
A. .http A. DOM
B. .html or .htm B. API
C. .aspx C. POP
D. .asp D. HTML

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 677

96. Choose the correct HTML element for the 102. Which of the following is the correct CSS
largest heading: link tag?

PRACTICE BOOK» NOT FOR SALE


A. <h6> A. <link rel=”styles” href=”stylesheet.css”>
B. <h1>
C. <head> B. <link href=”stylesheet”>
D. <heading> C. <link rel=”stylesheet” src=”styles.css”>
97. defines a standard way for accessing
and manipulating HTML document. D. <link rel=”stylesheet” href=”styles.css”>
A. HTML Events
103. Waiting for a website to load will lose
B. DHTML visitors.
C. HTML DOM A. Bandwith
D. CSS
B. Internet
98. Which of the following is not true about C. Load Time
HTML?
D. Lag
A. <meta> </meta>
B. <meta /> 104. is every visual aspect used within com-
C. <metadata> </metadata> munications.
D. <metadata name=”” /> A. Photography

99. Which attribute is used to specify the loca- B. Imagery


tion where linked document is opened? C. Picturesque
A. Value D. none of above
B. Type
105. What symbol should you use to target a
C. Target
class name in css?
D. Start
A. #
100. Please begin the web address with the
B. ()
part of the web address that allows the
computer to connect to the site. C. .
A. HTML D. class
B. web browser
106. What is the difference between HTML
C. HTTP and CSS?
D. none of above
A. CSS is one type of HTML
101. Extension of ActiveX designers B. HTML gives a webpage structure. CSS
A. .dsr provides styling.
B. .axd C. CSS structures a webpage. HTML
C. .adx strictly provides styling.
D. None D. There is no difference.

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 678

107. Jerry wants to insert a line break into his B. Typefaces


webpage. Which code should he use? C. Typestyle
A. <ul> D. none of above
B. <li>
113. The entire web document is contained
C. <br>
within
D. <h1>
A. comments

NARAYAN CHANGDER
108. Which of these elements are all <table> B. Tags
elements?
C. Web Pages
A. <table><tr><tt>
D. HTML elements
B. <table><td><body>
114. Which program is used by web clients to
C. <table><tr><td>
view the web pages?
D. <table><title><thead>
A. Search Engine
109. Hyperlink B. Protocol
A. a connection of Internet related pages C. Web browser
D. Web server
B. a program that lets you look at web
pages 115. GIF is the abbreviation for
C. a word/image that you can click on to A. Graphics Interchange Format
navigate B. Graphics Instruction Format
D. a computer language used to make
C. Graphics Item Format
web sites
D. Graphics Information Format
110. Which VBScript function can compare two
strings? 116. Choose correct code for creating a pass-
word textbox?
A. StringCompare
A. <input type=“pass” name=“t2”>
B. Compare
B. <input type=“password” name=“t2”>
C. StrComp
D. StrCompare
C. <input type=“Invisible” name=“t2”>
111. Which of the following is a feature of
DHTML? D. <input type=“Hidden” name=“t2”>
A. Real Time Positioning
117. How to return a value from a function in
B. Data Binding VBScript?
C. . Dynamic Fonts A. Using return keyword
D. All the Above B. Assign the value to the function name
112. should be legible and only use a maxi- itself
mum of 3 different fonts on the website. C. Both of the above
A. Typography D. None of the above

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 679

118. The bar that used to open a web site C. A and B are correct
known as D. None of these

PRACTICE BOOK» NOT FOR SALE


A. Title Bar
124. What is the datatype of a variable in VB-
B. Tool Bar Script?
C. Menu Bar A. String
D. Address Bar B. Variant
119. Is an information space where useful re- C. It is the datatype specified when that
sources are identified by a global identifier variable is declared.
called a Uniform Resource Identifier (URI), D. None of the above
is the meaning of?
A. Internet 125. How can you make a numbered list?

B. Web A. <ul>

C. Global network B. <ol>

D. HTML C. <list>
D. <dl>
120. Which of the following transitions are
supported by Internet Explorer 4.0? 126. is used to specify a style for single
A. Reveal transition filter unique element.

B. Blend transition filter A. Id selector

C. Both (a) and (b) B. Class selector

D. None C. Comments
D. None of the above
121. The arrangement of elements is order of
importance. 127. The defines a file-select field and a
A. Composition “Browse” button for file uploads.

B. Images A. <input type=”file upload”>

C. Size B. <input type=”file”>

D. Visual hierarchy C. <input type=”Browse”>


D. <input type=”Button File”>
122. Change the border size of the body or im-
age 128. Which is not related to textbox?
A. border-style A. name
B. border-width B. type
C. border-color C. maxlength
D. width D. max-width

123. The command used in VB Script for writ- 129. This button lets you go back to the home
ing some text on a page is page of the browser window
A. document.write() A. Forward button
B. Msgbox B. Close button

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS


1.18 web technology 680

C. Home button 131. Is the text that you type into your inter-
D. Favorite button net browser when you want to go to a
website
130. What property changes the border for an
image/table? A. URL
A. border: B. RPM
B. border-size:
C. PPM
C. border-color:

NARAYAN CHANGDER
D. none of above D. RUL

CHECK GOOGLE PLAY BOOKS FOR ANSWERS KEYS

You might also like