MCQ in Computer Science
MCQ in Computer Science
SUCCESS
COMPUTER SCIENCE
BOOST YOUR KNOWLEDGE
6 + S
1 O N
S
73 STI ER
E W
QU NS
A
USEFUL FOR
4STUDENTS 4
□ □TEACHERS 4
□PARENTS 4□KIDS 4
□QUIZ TEST
□EXAM 4
4 □TRIVIA TEST 4
□COMPETITIVE EXAM 4
□OTHERS
2
Preface:
This book has undergone rigorous scrutiny to ensure its accuracy. I eagerly invite constructive
feedback on its content. Feel free to reach out to me via Facebook at https://www.facebook.
com/narayanchangder. Additionally, you can access all of my books on Google Play Books at
https://play.google.com/store/books/author?id=Narayan+Changder.
NARAYAN CHANGDER
This E-book is dedicated to the loving memory of my mother:
NARAYAN CHANGDER
may have found their way into this PDF
booklet.
Due care has been taken to ensure that
the information provided in this book
is correct. Author is not responsible
for any errors, omissions or damage
arising out of use of this information.
nt
Importa inter-
s , s e ar ch the de
er to inclu -
i t h t h e answ w a n t
w u au
atisfied . If yo ontact
If not s rrect answers klet, please c t s:
p
net for
co
i n t h is boo F a c e b ook ht
estions on
tact him arayanchangd
er/
new qu a n c o n n
ou c om/
thor. Y acebook.c
. f
//www
CRUCIAL INFORMATION: PLEASE READ BEFORE
CONTINUING:
NARAYAN CHANGDER
7. The money raised from creating the sales of
the book will help to ensure that I’m able to
produce similar books like this at a compara-
ble price.
8. YOU CAN DOWNLOAD 4000+ FREE PRACTICE
SET PDF EBOOK ON VARIOUS SUBJECTS (NURS-
ERY to UNIVERSITY LEVEL) FROM GOOGLE
DRIVE LINK https://drive.google.com/
drive/u/1/folders/19TbUXltOSN5S7FV3sL
PRACTICE BOOK» NOT FOR SALE
Contents
1 Computer Science . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.1 Digital logic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Computer Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
1.3 Computer architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
1.4 Data Structures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
1.5 Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
1.6 Operating system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
1.7 Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
1.8 Database management system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
1.9 SQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
1.10 theory of computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
1.11 compiler design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
1.12 system software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
1.13 Software Engineering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
1.14 Computer networking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 461
1.15 Computer graphics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520
1.16 machine learning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 550
1.17 Cloud computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594
1.18 web technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668
1. Computer Science
NARAYAN CHANGDER
1.1 Digital logic
1. An OR gate has C. Digital counter
A. Two inputs and one input D. Decoder
B. One input and one output 5. On a JK Flip Flop, if both J and K are
C. One input and two outputs left high, what happens to the FF on each
D. Two inputs and two outputs PGT?
A. Changes state
2. How many total gates would be required
to draw this circuit? Use ONLY 2 input B. Invalid
AND and OR gates.F = AB’C + B’C + A’ C. No change
A. 3 D. none of above
B. 5
6. In Binary 1 + 1 =?
C. 7
A. 1
D. 8
B. 10
3. A NAND gate is the combination of which C. 11
two gates?
D. 2
A. OR and AND
B. AND and NOT 7. What is a Flip-Flop?
1. A 2. C 3. B 4. A 5. A 6. B 7. A
1.1 Digital logic 3
8. The time interval immediately following 13. Find out the write option associated with
the active transition of the CKL signal dur- XOR Gate
ing which the synchronous control input
D. 2 B. 4
C. 8
10. What is a negative to asynchronous sys-
D. 10
tems?
A. Difficult to design 16. The Output of two input AND gate is high
8. B 9. C 10. A 11. D 12. B 13. C 14. A 15. C 16. A 17. A 18. D 19. C
1.1 Digital logic 4
19. How many logic gates are used in a half C. 6 input MUX
adder?
D. 4 input MUX
A. none
B. 1 25. When a flip flop is designed to be clocked
by a logic HIGH1 or Logic LOW 0 level, it
C. 2 is said to be?
D. 3 A. Level Triggered
NARAYAN CHANGDER
20. A “universal” basic memory device used B. Edge Triggered
in banks called registers
C. Clock Signals
A. J-K Flip-Flop
D. none of above
B. D-Type Flip-Flop
C. S-R Flip-Flop 26. Convert 43 to binary
D. NOR A. Addition
B. OR operation
23. An AND gate has 7 inputs.How many input
words are in its truth table? C. Subtraction
A. 16 D. none of above
B. 32
29. How many clock pulses will be required to
C. 64 completely load serially a 5-bit shift regis-
D. 128 ter?
A. 1
24. If 4 input MUXes drive a 4 input multi-
plexer, it results a B. 5
A. 16 input MUX C. 7
B. 8 input MUX D. 6
20. A 21. D 22. C 23. D 24. A 25. A 26. B 27. C 28. B 29. B 30. C
1.1 Digital logic 5
31. B 32. D 33. A 34. C 35. B 36. B 37. C 38. B 39. A 40. A 41. A
1.1 Digital logic 6
41. If you design the following circuit using 4:1 C. XOR function
multiplexer, then what will be the first in-
D. NAND function
put to the MUX. (Take A, B as selection
line)F(A, B, C)=minterm(1, 3, 4, 7) 47. to 1 MUX would have
A. C
A. 2 inputs
B. C’
B. 3 inputs
C. 1
C. 4 inputs
NARAYAN CHANGDER
D. A
D. 1 inputs
42. AND-OR realisation is equivalent to
A. SOP 48. A gate gives the output as 1 only if all
the inputs signals are 1.
B. POS
A. AND
C. K-map
B. OR
D. None of these
C. EXOR
43. is an electronic circuit which makes log-
ical decisions based on the combination of D. NOR
digital signals present on its inputs.
49. What is a single ended device which has a
A. Digital Logic Gate gain of 1, mirroring the input at the output
B. Boolean Algebra called?
C. Digital Circuit A. Buffer
D. None of these B. Inverter
44. Which among the below stated boolean ex- C. Flip Flops
pressions do not obey De-Morgan’s theo- D. none of above
rem?
A. X+Y = X . Y 50. How many AND gates are required to im-
B. X.Y = X + Y plement the Boolean expression?
C. X.Y = X.Y A. 1
D. None of the above B. 2
C. 3
45. Which of the following combinations can-
not be combined into K-map groups? D. 4
A. Corners in the same row
51. Which of the following memories uses one
B. Corners in the same column transistor and one capacitor as basic mem-
C. Diagonal corners ory unit?
D. Overlapping combinations A. SRAM
42. A 43. A 44. C 45. C 46. D 47. C 48. A 49. A 50. C 51. B 52. A
1.1 Digital logic 7
55. In an SR latch built from NOR gates which 61. What two possible values can you achieve
condition is not allowed? from Boolean constants and variables?
A. S=0, R=0 A. 1 and 0
B. S=0, R=1 B. 1 and 2
C. S=1, R=0 C. Only 1
D. S=1, R=1 D. none of above
56. What is the output of an OR gate if the 62. A flip flop can store
inputs are 1 and 0? A. 1 bit
A. 0 B. 2 bits
B. 1 C. 4 bits
C. OFF D. 8 bits
D. 2
63. What is used to overcome the disadvan-
57. In the toggle mode a JK flip-flop has tage in a RS flip flop where while the HIGH
clock signal is still present, if there is any
A. J = 0, K = 0 changes to the S or R input, the Q output
B. J = 1, K = 1 will change?
53. A 54. B 55. D 56. B 57. B 58. C 59. B 60. B 61. A 62. A 63. A
1.1 Digital logic 8
NARAYAN CHANGDER
70. The NOR gate output will be high if the
B. NOR two inputs are
C. AND A. 00
D. OR B. 01
C. 10
65. How many flip-flops are required to con-
struct a decade counter? D. 11
A. 10 71. How man gates can you fit on IC chip?
B. 8 A. 1
C. 5 B. 4
D. 4 C. 10
66. Which of the following would be consid- D. none of above
ered an output?
72. If P, Q, R are the inputs of a Full Adder
A. switch then the sum is given by
B. lightbulb A. P AND Q AND R
C. button B. P XOR Q OR R
D. enter key
C. P XOR Q AND R
67. An adder where all the bits of the two D. P XOR Q XOR R
operands are added simultaneously
73. is an idealized or physical device imple-
A. Parallel Adder
menting a Boolean function.
B. Half Adder
A. Digital Computer
C. Serial Adder
B. Logic Gate
D. Full Adder
C. Digital Circuit
68. The time interval immediately preceding D. None of these
the active transition of the CLK signal dur-
ing which the control input must be main- 74. Time needed for a gate to change its state
tained at the proper level is what? is called
A. Setup time A. Rise time
B. Hold time B. Decay time
C. Clock time C. Propagation time
D. none of above D. Operating time
64. A 65. D 66. B 67. A 68. A 69. D 70. A 71. B 72. D 73. B 74. C 75. A
1.1 Digital logic 9
76. A 77. B 78. B 79. D 80. C 81. C 82. C 83. A 84. C 85. B 86. A
1.1 Digital logic 10
86. When A and B represent the inputs of an 92. A bi-stable multivibratior circuit within the
Exclusive OR logic gate, its output O will sequential digital logic family of devices
be able to store single bit of binary data is
A. O=AB’+A’B called?
NARAYAN CHANGDER
87. Jhonson Counter is also called D. none of above
91. Which of the following is a combinational 96. In a clocked SR latch the outputs of the
circuits latch change when:
A. Multiplexer A. Clock is 0
B. Demultiplexer B. Clock is 1
C. Encoder C. Does not depend on clock
D. All of them D. None of the above
87. B 88. C 89. D 90. D 91. D 92. A 93. B 94. A 95. A 96. B 97. A
1.1 Digital logic 11
98. A 99. A 100. A 101. C 102. A 103. B 104. A 105. C 106. C 107. C 108. A
1.1 Digital logic 12
108. Total number of outputs in full adder is 114. One that is not the Outcome of magnitude
comparator is
A. 2
A. a+b
B. 3
B. a<b
C. 4
C. a=b
D. 1
D. a>b
109. Why is it considered impossible to obtain 115. Which of the following is a digital switch
NARAYAN CHANGDER
a clean voltage transition from a switch? which selects one of the many inputs to a
A. Contact bounce single output.
B. Intermittent action A. Multiplexer
C. Human error B. Demultiplexer
D. none of above C. Encoder
D. Decoder
110. Multiplexer is also called
116. How many NAND circuits are contained
A. Data Distributor in a 7400 NAND IC?
B. Data Selector A. 6
C. Data Encoder B. 4
D. Data Decoder C. 8
D. 1
111. The Output of two input OR gate is high
A. Only if both inputs are high 117. What is the circuit number of the IC that
contains four two-input AND gates in stan-
B. Only if both inputs are low dard TTL?
C. Only if one input is high and the other A. 7402
is low
B. 7408
D. If at least one of the inputs is low
C. 7432
112. NAND gate means D. 7486
A. Inversion followed by AND gates 118. How many input and output required for
B. AND followed by an Inverter gate multiplexer?
C. AND followed by an OR gate A. Many input and one output
NARAYAN CHANGDER
C. cache memory
called as
D. Main Memory
A. Stalls
10. It is a computer program that combines B. Bubbles
various object files together in order to C. Hazards
make an executable file.
D. Both Stalls and Bubbles
A. Assembler
16. is a:
B. Compiler
A. Quad two input OR Gate IC
C. Linker B. Quad two input AND Gate IC
D. Loader C. Dual four input OR Gate IC
11. separated the programming task from D. Triple three input OR Gate IC
computer operation tasks. 17. When we work on any document on PC, it
A. Algorithms is stored temporarily on-
B. Data processors A. RAM
B. ROM
C. High-level programming languages
C. CPU
D. Operating systems
D. Flash Memory
12. Communication system that transfers data
18. The fetch and execution cycles are inter-
between components inside a computer, or
leaved with the help of
between computers
A. Modification in processor architecture
A. Control Unit (CU)
B. Arithmetic and Logic Unit (ALU) B. Clock
C. Bus C. Special unit
D. Memory D. Control unit
19. use ultraviolet light is used to erase
13. Identify the pointing device
data.
A. Keyboard
A. RAM
B. Mouse B. ROM
C. Light pen C. PROM
D. Touch sensitive screen D. EPROM
20. Which is used to provide result of process- 26. This is a small, very fast, memory that
ing? stores the data from frequently used main
memory addresses. It lies between the
31. Use speech synthesizer software to 37. If a new processor has 85% if the capac-
provide voice output itive load of old processor, it supply volt-
A. Monitor age is reduced by 20% and new proces-
sor results in a 25% shrink in frequency.
B. Speaker What is the impact on power consump-
C. Plotter tion?
D. Printer A. 0.408
B. 0.5
NARAYAN CHANGDER
32. Which store data permanently?
A. Storage device C. 0.49
B. Secondary Storage devices D. none of above
C. Auxiliary memory devices 38. In digital logic, a counter is a device which
D. All the above
A. Counts the number of outputs
33. How many types of file organization are
there? B. Stores the number of times a particu-
lar event or process has occurred
A. 3
B. 5 C. Stores the number of times a clock
pulse rises and falls
C. 4
D. Counts the number of inputs
D. 6
39. This is the brains of the computer where
34. The format is usually used to store most calculations take place.
data.
A. Central Processing Unit (CPU)
A. BCD
B. Arithmetic and Logic Unit (ALU)
B. DECIMAL
C. Bus
C. HEXADECIMAL
D. Memory
D. OCTAL
35. The first computing machine to use the idea 40. Which is the simplest type of file organiza-
of storage and programming was called tion?
A. Direct Access
A. the Madeline B. Indexed Sequential
B. EDVAC C. Serial
C. the Babbage machine D. Random
D. the Jacquard loom
41. output device is also called as display
36. is made up of integrated circuit screen.
A. Memory unit A. Monitor
B. Input Unit B. Speaker
C. Output Unit C. Plotter
D. All the above D. Printer
42. Which is most commonly used output de- 48. Data are stored in in hard disk
vice A. Sector
D. CD ROM C. copy-both
D. write-back
45. During the execution of a program which
gets initialized first? 51. What is used to controls the movement of
A. MDR the cursor?
B. IR A. Keyboard
C. PC B. Mouse
D. MAR C. Scanner
D. Joystick
46. holds data and intsruction.
A. Memory unit 52. is the main memory of computer?
NARAYAN CHANGDER
A. Peta D. none of above
B. Yotta 61. To read the control words sequentially
C. tera is used.
A. PC
D. Exa
B. IR
56. The controls the I/O devices and trans-
C. UPC (MPC)
fer of data to and from the primary stor-
age. D. None of the mentioned
A. LU 62. What is information
B. AU A. collection of programs
C. ALU B. collection of instruction
D. CU C. collection of data
D. collection of software
57. In a computer, the subsystem per-
forms calculations and logical opera- 63. The form factor of motherboards that are
tions. commonly used today is
A. ALU A. ABC
B. input/output B. AT
C. memory C. ATX
D. control unit D. Micro ATX
58. How many AND, OR and EXOR gates 64. Which is your school name
are required for the configuration of full A. campion
adder? B. sda
A. 1, 2, 2 C. rajagiri
B. 2, 1, 2 D. matha
C. 3, 1, 2
65. enables the processor to access data
D. 4, 0, 1 quickly whenever they are needed.
59. This is a component of a computer’s CPU A. CU
that directs operation of the processor. B. Cache
A. Control Unit (CU) C. Memory
B. Arithmetic and Logic Unit (ALU) D. Register
66. Interrupts form an important part of 72. is a large multilayered printed circuit
systems. board inside a computer that contains CPU,
BIOS, ROM chip and the CMOS setup infor-
C. Interpreter C. A ← A + B
D. Executable D. A + B → B
71. which bus carries out signals to carry out 76. The register used to store the flags is
operations for communication such as read called as
/write
A. Flag register
A. address
B. control B. Status register
77. Which is not an example of a structured 83. How many select lines will a 16:1 MUX
data base require?
A. oracle A. 2
B. MS access B. 3
C. Mongo DB C. 4
D. Mysql D. None of the above
NARAYAN CHANGDER
78. To increase the speed of memory access in 84. Arithmetic and logic instruction
pipelining, we make use of A. Data storage
A. Special memory locations B. Data Processing
B. Special purpose registers C. Memory access
C. Cache D. none of above
D. Buffers
85. Total number of inputs in a half adder is
79. Which is not a type of file organization?
A. Direct Access A. 2
B. Serial B. 3
C. Random C. 4
D. Relative D. 1
80. is used for backup of hard disk 86. Von Neumann architecture is
A. Hard disk A. SISD
B. Magnetic tapes B. SIMD
C. Floppy disk C. MIMD
D. CD ROM D. MISD
81. The Input devices can send information to 87. One of the first computers based on the
the processor. von Neumann model was called
A. When the SIN status flag is set A. Pascal
B. When the data arrives regardless of B. Pascaline
the SIN flag C. ABC
C. Either of the cases D. EDVAC
D. Neither of the cases
88. Starting from the source code, which of
82. provides visual display of data(Image these will start running the program quick-
and text). est?
A. Monitor A. Interpreter
B. Speaker B. Bytecode on a virtual machine
C. Plotter C. Compiler
D. Printer D. none of above
89. What part of the CPU is being de- 95. This is the part of a CPU that carries out
scribed.Carries out arithmetic operations arithmetic and logic operations.
and performs logical comparisons.
91. Which of the following is lowest in mem- 97. In A or B and C what operation occurs
ory hierarchy? first?
A. Cache memory A. A or B
B. Secondary memory B. B and C
C. Registers C. Both simultaneously
D. RAM D. none of above
92. According to the von Neumann model, 98. is generally used to increase the appar-
are stored in memory. ent size of physical memory.
A. only data A. Secondary memory
B. only programs B. Virtual memory
C. data and programs C. Hard Disks
D. address D. Disks
93. The format of a file can be known from its 99. The model is the basis for today’s com-
file puters
A. extension A. Leibnitz
B. file format B. von Neumann
C. file extension C. Pascal
D. none of above D. Charles Babbage
94. The PC register holds what? 100. If a unit completes its task before the al-
lotted time period, then
A. The data for the next instruction
A. It’ll perform some other task in the re-
B. The address for the next instruction maining time
C. The accumulated memory location B. Its time gets reallocated to a different
D. The instruction for the next instruction task
C. It’ll remain idle for the remaining time 106. What is the part of the CPU called that
performs calculations?
D. None of the mentioned A. ALU
B. Control Unit
101. In a computer, the subsystem stores
data and programs. C. Program Counter
D. Memory
A. ALU
107. To get the physical address from the log-
NARAYAN CHANGDER
B. input/output
ical address generated by the CPU, is
C. memory used.
D. control A. MAR
102. is a set of instructions in a computer B. MMU
language that tells the computer what to C. TLB
do with data. D. Overlays
A. An operating system
108. Translates low level assembly language
B. An algorithm mnemonic into machine code
C. A data processor A. Assembler
D. A program B. Compiler
C. Interpreter
103. directs and controls the activities of
thecomputer system. D. none of above
C. either hardware or software interrupt 117. read image or text printed on a paper
and translate the information into a form
that the computer can use
123. A counter circuit is usually constructed of 128. The computer used in Intensive care unit
A. Analog Computer
A. A number of latches connected in cas- B. Hybrid Computer
cade form
C. Digital Computer
B. A number of NAND gates connected in
NARAYAN CHANGDER
D. none of above
cascade form
C. A number of flip-flops connected in 129. A computer system is the integration of
cascade A. Hardware
D. A number of NOR gates connected in B. Software
cascade form
C. Both a and b
124. Program is translated line by line as the D. Either a and b
program is running
130. The ALU makes use of to store the
A. Assembler intermediate results.
B. Compiler A. Register
C. Interpreter B. Accumulator
D. none of above C. Stack
125. A MUX with 2 select lines can handle D. Heap
(number) of output line(s)
131. The address of the address of the
A. 2 operand is specified in addressing
B. 4 mode.
C. 8 A. immediate
D. 1 B. direct
C. indirect
126. A 17th-century computing machine that
could perform addition and subtraction D. relative
was the 132. Which of the register/s of the processor
A. Pascaline is/are connected to Memory Bus?
B. Jacquard loom A. PC
C. Analytical Engine B. MAR
D. Babbage machine C. IR
D. BOTH PC & MAR
127. In the addressing mode, the instruction
contains the address of memory which 133. One way to make a four-bit adder to per-
refers the address of the operand form subtraction is by
A. Direct Addressing Mode A. Inverting the output
B. Indirect Addressing Mode B. Inverting the carry-in
C. Inverting the B inputs 140. Which of these is NOT a stage of the FDE
D. Grounding the B inputs cycle?
D. EPROM D. Joystick
139. use laser beam to store and retrieve 145. prints text or images on paper or
data other media
A. Hard disk A. Monitor
B. Magnetic tapes B. Speaker
C. Floppy disk C. Plotter
D. CD ROM D. Printer
146. Re-organises the files by putting the re- 151. The ALU works on the instructions and
lated files next to each other data held in the
A. Encryption A. Notebook
B. Compression B. Registers
NARAYAN CHANGDER
147. Highly encoded schemes that use compact hardware are classified into cate-
codes to specify a small number of func- gories.
tions in each micro instruction is
A. 3
A. Horizontal organisation B. 4
B. Vertical organisation C. 5
C. Diagonal organisation D. 6
D. None of the mentioned 153. can be programmed using PROM pro-
grammer or a PROM burner
148. The names of students in a class arranged
by last name is what type of file organiza- A. RAM
tion B. ROM
A. Indexed Sequential C. PROM
B. Serial D. EPROM
157. Fast-look-ahead carry circuits found in 163. Find the odd one?
most 4-bit full-adder circuits which A. Keyboard
161. Software are called as 167. You can think of it as a one column table
A. Physical entities A. Serial
B. Non physical entities B. Indexed Sequential
C. Set of program C. Direct Access
D. None of the above D. Sequential
162. What type of memory is primarily used 168. Floating point representation is used to
as cache memory? store
A. SRAM A. Boolean Values
B. DRAM B. Whole numbers
C. RAM C. Real Integers
D. ROM D. Integers
169. Division by zero causes an interrupt. 175. Which of following are known as univer-
A. implicit sal gates?
A. NAND & NOR
B. internal
B. AND & OR
C. infinity
C. XOR & OR
D. external
D. EX-NOR & XOR
170. What is used for voice input?
176. The situation wherein the data of
NARAYAN CHANGDER
A. Keyboard operands are not available is called
B. Microphone A. Data hazard
C. Light pen B. Stock
D. Touch sensitive screen C. Deadlock
D. Structural hazard
171. Produce voice output(audio data)
177. Which file organization can easily access
A. Monitor
records
B. Speaker
A. Serial
C. Plotter B. Sequential
D. Printer C. Direct Access
172. The truth table for an S-R flip-flop has D. Indexed Sequential
how many VALID entries? 178. In zero address instruction method, the
A. 1 operands are stored in
B. 2 A. registers
C. 3 B. accumulators
D. 4 C. push down stack
D. cache
173. Which memory device is generally made
of semiconductors? 179. Breaking logical memory into blocks of
the same size is called as:
A. RAM
A. Frames
B. HARD DISK
B. Pages
C. FLOPPY DISK
C. Segments
D. CD DISK
D. Blocks
174. The first automatic electronic digital com- 180. The control unit controls other units by
puter was called generating
A. Pascal A. CONTROL SIGNALS
B. Pascaline B. TIMING SIGNALS
C. ABC C. TRANSFER SIGNALS
D. ENIAC D. COMMAND SIGNALS
B. AND A. Keyboard
C. XOR B. Mouse
D. NAND C. Scanner
D. Joystick
183. In which operation carry is obtained?
A. Subtraction 189. Which register is being described? Holds
the memory address about to be used by
B. Addition the CPU
C. Multiplication A. MAR
D. Both addition and subtraction B. MDR
184. Which register is being described? Holds C. Accumulator
the memory address of the instruction for D. Program Counter
each cycle
A. MAR 190. TB is equivalent to
B. MDR A. 1024 KB
C. Accumulator B. 1024*1024 MB
186. is burnt (pre-recorded) at manufac- 192. Physical entities of the computer is called
turing time. as
A. RAM A. Hardware
B. ROM B. Software
NARAYAN CHANGDER
C. Algorithm development C. Placement Counter
D. Instructional architecture D. Probably Correct
194. On switch off a computer, stored data 200. Which of the following is used to hold
gets erased. ROM, RAM, CPU and expansion cards?
A. RAM
A. Computer Bus
B. ROM
B. Mother Board
C. PROM
C. Cache
D. EPROM
D. None
195. Identify the function of CPU?
201. In S-R flip-flop, if Q = 0 the output is said
A. Perform computation to be
B. Decision making A. Set
C. Control different devices B. Reset
D. All the above
C. Previous state
196. A new switching device was used in sec- D. Current state
ond generation
202. How many AND gates are required to re-
A. Vacuum tubes
alize Y = CD + EF + G?
B. Transistors
A. 4
C. Diodes
B. 5
D. none of above
C. 3
197. In addressing mode, the operand D. 2
value is directly specified.
A. Relative 203. What is a trigger pulse or clock pulse?
B. Direct A. A pulse that starts a cycle of operation
C. Indexed
B. A pulse that reverses the cycle of op-
D. Immediate
eration
198. The functionality of a NAND Gate can be C. A pulse that prevents a cycle of opera-
obtained by cascading ICs 7408 and 7404 tion
A. True D. A pulse that enhances a cycle of oper-
B. False ation
204. The pipelining process is also called as 209. Translates source code from high level
languages into object code and then into
machine code
215. Known as Automatic sequence Con- 221. In a computer, the subsystem accepts
trolled data and programs and sends pro-cessing
results to output devices.
A. Mark III computer
A. ALU
B. Mark I Computer
B. input/output
C. Mark II Computer
C. memory
D. none of above D. control unit
NARAYAN CHANGDER
216. Early Buses 222. Ripple counters are also called
A. ISA A. SSI counters
B. PCI B. Asynchronous counters
C. VLB C. Synchronous counters
D. VLSI counters
D. AGP
223. Element of instruction
217. C, C++, Java languages are
A. Destination operand address
A. High Level Language B. operand address
B. Assembly Language C. memory address
C. Machine Language D. none of above
D. none of above 224. Which register is being described? Holds
the data / instructions that have been
218. A register that keeps track of the next fetched from memory
instruction to be executed is called a
A. MAR
A. Program Counter
B. MDR
B. Instruction Register C. Accumulator
C. Accumulator D. Program Counter
D. Data Register 225. What is the name of the register that
stores the instruction that the CPU is exe-
219. memory is made up 1.44MB
cuting at the moment?
A. Hard disk A. Current Instruction Register
B. Magnetic tapes B. Program Counter
C. Floppy disk C. Memory Data Register
D. CD ROM D. Accumulator
1. Why are active RFID tags larger than pas- 7. The register used as a working area in CPU
sive tags? is
A. They contain a battery A. Program Counter
B. THey are a better design B. Instruction Register
C. They requrie a larger ariel C. Instruction Decoder
D. They are older technology D. Accumualtor
2. Half Adder is an combinational circuit that 8. Read the statement below and select the
NARAYAN CHANGDER
performs the arithematic addition of correct response.This is used as extra stor-
number of bits age when the main memory ( RAM ) is
A. 3 full.
B. 2 A. Level 1 Cache
C. 1 B. ROM
D. Any C. Level 2 Cache
D. Virtual Memory
3. Where do modern PCs store CMOS set-
tings? 9. Connection lines that connect the internal
A. .BIOS parts of the microprocessor chips is called
B. Flash ROM A. Wires
C. NVRAM B. Integrated circuits
D. Southbridge C. Bus
D. Electric signals
4. USB is an example of a unit
A. Input 10. What should I add to increase the perfor-
mance of my computer?
B. Storage
A. a faster battery
C. Display
B. add more ROM
D. Output
C. add more RAM
5. Which register holds the data fetched from D. add a bigger hard drive
the main memory?
A. MAR 11. Dynamic pipeline allows
B. MDR A. .Only stream line connection
C. PC B. function to evaluate
D. CIR C. Multiples functions to evaluate
D. To perform fixed function
6. From what location are the first computer
instruction available on boot up 12. Which one is Primary Memory
A. boot.in A. RAM
B. CPU B. ROM
C. config.sys C. Both
D. ROM BIOS D. none of above
24. Which of the following is FALSE about the 29. In a computer RAM stands for
fetch process? A. Readily available memory
A. PC contains the address of the next in- B. read and more memory
struction.
C. Random Access memory
B. The contents of PC is copied to MDR.
D. remember all memory
C. The address of PC is incremented to 1
to fetch the next instruction. 30. If the instruction, Add R1, R2, R3 is exe-
cuted in a system that is pipe-lined, then
NARAYAN CHANGDER
D. none of above
the value of S is (Where S is a term of the
25. addressing mode is most suitable to Basic performance equation)?
change the normal sequence of execution A. 3
of instructions.
B. 2
A. Relative C. 1
B. Indirect D. 6
C. Index with Offset
31. What is the location of the internal regis-
D. Immediate ters of CPU?
26. This sends signals such as “I/O Read” A. Internal
A. Control Unit B. On-chip
B. Arithmetic Logic Unit C. External
C. Accumulator D. Motherboard
D. Cache 32. Which if the following is not a function of
an operating system?
27. Consider a direct mapped cache with block
size 4 KB. The size of main memory is 16 A. interface between the user and the ma-
GB and there are 10 bits in the tag. Find chine
the number of bits in physical address. B. coordinate software applications
A. 34 bits C. coordinate hardware components
B. 32 bits D. monitor system health
C. 16 bits 33. ROM has the capability to perform
D. 8 bits A. Write operation only
28. Consider a direct mapped cache of size B. Read operation only
32KB with block size 32 bytes. The CPU C. Both write and read operation
generates 32 bit addresses. The number
D. Erase operation
of bits needed for cache indexing and the
number of tag bits respectively are .( 34. What component holds the address of the
GATE 2005 ) next instruction (7-9)
A. 10, 17 A. Memory Address Register
B. 10, 22 B. Memory Data Register
C. 15, 17 C. Program Counter
D. 5, 15 D. Accumulator
35. In general, the have the smallest bit A. Improving the IC technology of the
size and the have the largest. logic circuits
D. it holds the data to be decoded in the 51. The register that points to the next instruc-
next cycle tion in the fetch execute cycle
46. Which Register would be first to be ac- A. MAR
cessed during the Fetch-Decode-Execute B. PC
cycle? C. MDR
A. PC D. Accumulator
B. MAR
52. What are the utilities is an OS called that
NARAYAN CHANGDER
C. MDR enable programs such as a screen reader?
D. CIR A. Accessibility options
47. control unit determines the address of the B. Reading options
next instruction be executed and loads it C. User options
into the program counter.
D. User account settings
A. Instruction Interpretation
53. Which one is a difference between Cache
B. Instruction regulation
and RAM?
C. Instruction composition
A. Cache is nearer to the CPU than RAM
D. Instruction sequencing
B. Cache is slower than RAM
48. What is the name of the unit that store C. Cache is cheaper than RAM than RAM
instructions and data during the Fetch-
D. None of the above
Execute Cycle?
A. Control unit 54. Magnetic disks contained on a hard drive
are called:
B. Registers
A. blocks
C. Arithmetic unit
B. platters
D. Logic unit
C. cylinders
49. All the arithematic and logical operations
D. none of above
in CPU are performed by
A. ALU 55. Which of the following is a component of
the CPU?
B. CU
A. Arithmetic and logic unit
C. Both ALU and CU
B. Control Unit
D. none of above
C. Cache memory
50. The device which is used to connect a pe- D. All of the above
ripheral to bus is called . Control register
B. Interface C. Communication protocol D. 56. The simplified form of the expression
None of these AB+ABC’ is
A. Control Register A. AB
B. Interface B. A(B+C)’
C. Communication Protocol C. A(B+C)
D. None of these D. None of these
A. 16, 32 C. Execution
B. 32, 32 D. Instruction Centre
C. 32, 16 64. The address bus is
D. 16, 16
A. Uni-directional and controlled by the
59. Carries the addresses of data between the CPU
processor and memory B. Bi-directional and controlled by the
A. Address bus CPU
B. Data bus C. Uni-directional and controlled by the
C. Control bus memory
B. It controls the input and output of data A. The Program Counter is incremented
so that the signals go to the right place at by 1
the right time B. The value in the Current Instruction
C. It controls and monitors the hardware Register is decoded
attached to the system C. The value in the Accumulator is stored
D. All of the above in memory
61. In which register is the instruction decoded D. The data at the address in the Program
during the decode process? Counter is fetched from memory
A. PC 66. State True or False.1. “MOVE Y, A” is a
B. MDR two address instruction.2. “MUL T, D, E”
is a three address instruction.
C. CIR
D. MAR A. 1-True, 2-False
B. 1-False, 2-True
62. is the highest performance ARM Pro-
cessor C. 1-False, 2-False
A. ARM7TDMI D. 1-True, 2-True
67. During the second stage of FDE cycle car- 72. ROM stands for
ried out by the CPU.Once the instruction A. Read Only Memory
has been fetched, the CPU will need to un-
derstand the instruction to action it.This is B. Read On Memory
called C. Roam On Monday
A. Fetches D. None of these
B. Decodes 73. Amdhal Law says that(software ap-
proach)
NARAYAN CHANGDER
C. Executes
D. Runs A. Speedup is limited by parallel fraction
of the program
68. The Central Processing Unit or CPU con-
B. There are no any speedup limitation
tains two sub-Components which are
C. Speedup increase linearly with the
A. Main memory & Bus number of used proccessors
B. The Arithmetic/Logic Unit (ALU) and D. No correct answer
the control unit (CU)
C. Input & Output Devices 74. Which of the following is not part of the
CPU?
D. none of above
A. ALU
69. Choose the correct word to complete B. CU
this sentence:“Using addressing, the
C. MAR
operand holds the memory address of the
value to be operated on” D. ROM
A. Immediate 75. Which of the following would not be con-
B. Direct sidered metadata for a spreadsheet file?
C. Indexed A. Read-only attribute
D. Indirect B. Calculation inside the file
C. Name of the file
70. Which storage device stores data using
magnetic technology? D. Full size
A. Address of program count 85. One of the dedicated registers in the pro-
B. Address of the next instruction to be cessor that holds the location of where
fetched data will be read or written to as the re-
sult of an operation is called the
C. Program pointer
A. Memory Address Register
D. IR pointer
B. Memory Buffer Register
80. Ways in which addresses gets specified by
instructions, called C. Current Instruction Register
A. 4 bytes C. processor
B. 8 bytes D. interrupt
C. 16 bytes 87. Shields computer from harm
D. 12 bytes A. email virus
82. Computer bus line consists of B. Software virus
A. Registers C. Trojan horse
B. accumulators D. Anti-virus software
C. Set of parallel lines
88. Memory Data Register (MDR)
D. Computer clock
A. Stores the address of the next instruc-
83. Gustafson Law’s (speedup) says that: tion in memory
A. Speedup is limited by sequential frac- B. Stores the address of where the next
tion of the program item will be fetched from
B. There are no any speedup limitation C. Stores data fetched from memory, or
C. Speedup increase linearly with the waiting to be stored in memory
numbers of used processors D. Stores the result of arithmetic calcula-
D. No correct answer tions
89. how many visible register are there C. CPU Soft menu
A. 23 visible register D. Power management Setup
B. 20 invisible register 95. The physical component of a computer
C. 32 visible register which we can see and touch is known as
D. 44 visible register
A. Software
90. If a processor clock is rated as 1250 mil- B. Hardware
NARAYAN CHANGDER
lion cycles per second, then its clock period
is C. Data
B. 1.6 * 10-9 sec 96. When a computer is first powered up, the
initiating programs are loaded into mem-
C. 1.25 * 10-10 sec
ory from the chip.
D. 8 * 10-10 sec
A. RAM
91. Little Endian byte order puts byte having B. ROM
address? x . . . x000? at the C. Cache
A. Least significant position D. none of above
B. Middle significant position
97. What was Von Neumanns first name?
C. Most significant position
A. Terry
D. Both a and b
B. Adam
92. The instructions are transferred from the C. John
main memory and stored temporarily in D. Philip
small memories within the CPU called reg-
isters. 98. In a six-stage pipeline assuming that there
A. Executing of instructions are no branch instructions. If we want to
execute 15 instructions. What is the time
B. Decoding of instructions required to execute these instructions?
C. Storing of results A. 15
D. Fetching of instructions B. 20
93. The decoded instruction is stored in C. 21
A. IR D. 19
NARAYAN CHANGDER
112. The stages required for processing are
B. AC
known as the
C. PC
A. Fetch-Execute-decode
B. Process-decode-fetch D. CIR
NARAYAN CHANGDER
C. execute D. Accumulator
D. none of above 140. Microprocessors can be used to make(SBI
134. The O in ROM stands for Clerk 2009)
A. Computer
A. One
B. digital system
B. Open
C. Calculators
C. Only
D. All of these
D. Often
141. The mathematical calculation component
135. Which is not part of a hard disk drive? internal to the processor is called the
A. Spindle A. Arithmetic Logic Unit
B. Platter B. Calculator
C. Read/write head C. Arithmetic Calculus Module
D. Valve D. Mathematical Logic System
136. Width of object like a double-word will 142. Each instruction in ARM machines is en-
be having a size of coded into Word
A. 2 bytes A. 2 byte
B. 4 bytes B. 3 byte
C. 7 bytes C. 4 byte
D. 8 bytes D. 8 byte
137. This DOESN’T happen during the Fetch 143. Processors have a speed measured in
part of the cycle A. Hertz
A. Address Bus is used B. Bits
B. Program Counter increments by one C. Bytes
C. Arithmetic operations are performed D. Seconds
D. Main Memory is addressed 144. Boot Strap process is
138. The register used as memory for the ALU A. Load system files to RAM
is B. Checks the computer connections
A. Program Counter C. Clean up the computer memory
B. Instruction Register D. Prepare the computer ready
145. In ARM Processor, Operating system 151. Which type of addressing mode is used
runs in inStore R3, SUM
156. The two phases of executing an instruc- 161. The bus used to connect the monitor to
tion are the CPU is
A. Instruction decoding and storage A. PCI bus
B. Instruction fetch and instruction exe- B. SCSI bus
cution C. Memory bus
C. Instruction execution and storage D. Rambus
D. Instruction fetch and Instruction pro- 162. Size of the memory mainly depends
NARAYAN CHANGDER
cessing on the size of the address bus.
A. Main
157. Which of below is not a category in RAID
Levels? B. Virtual
B. Frequently small amount used in cache C. To make sure that the CPU runs prop-
memory for high-speed access used erly.
C. Non Volatile D. To make the CPU faster.
D. none of above
184. When the CPU fetches data it makes use
179. The communication line between CPU of a vital path called?
memory and peripherals is called a A. The Address walk
(UBI Clerk 2011)
NARAYAN CHANGDER
B. The Address Bus
A. Bus
C. The bus
B. line
D. The address plane
C. media
185. The memory on the processor chip is
D. All the above
called:
180. What is the purpose of the accumulator? A. RAM
(4-6)
B. Hard Disk
A. To perform arithmetic operations
C. Cache
B. To hold the results of a calculation
D. Floppy Disk
C. To hold the accumulation of instruc-
tions that have happened 186. What is this process called:The CPU
D. none of above makes sense of the instruction it has just
fetched.
181. means current data or instruction that A. Decode
is being fetched may be needed soon.
B. Execute
A. Temporal Locality
C. Process
B. Spatial Locality
D. Fetch
C. Memory Reference
D. Space Reference 187. In K-MAP the simplified version of F(A, B,
C, D) = Σ (8, 9, 10, 11) is
182. The main advantage of semiconductor
A. A’B’
RAM is its ability to:
B. A’B
A. retain stored data when power is inter-
rupted or turned off C. AB
B. be written to and read from rapidly D. AB’
C. be randomly accessed 188. Which register stores the address which
D. be sequentially accessed data will be fetched from?
A. MAR
183. What are registers used for?
B. MDR
A. To check that students are in school.
B. To temporarily hold bits of data C. PC
needed by the CPU. D. CIR
189. The processor is connected to the main C. A tri-directional path between internal
memory and other internal computer com- components
ponents. They are the
NARAYAN CHANGDER
B. Once the current instruction has been C. Buffers
decoded D. Registers
C. Once the current instruction has been
executed 206. The is software that supports a com-
puter’s basic functions, such as scheduling
D. It doesn’t point to the next instruction tasks and executing applications
201. The instruction, Add Loc, R1 in RTN is A. Operating System
A. Add SetCC Loc+R1 B. Hard Drive
B. R1=Loc+R1 C. RAM
C. Not possible to write in RTN D. ROM
D. R1<-[Loc]+[R1]
207. Define CPU
202. Carries control signals/commands from
A. Ears of the Computer
the CPU (and status signals from other de-
vices) in order to control and coordinate all B. Body of the Computer
the activities within the computer
C. Nose of the Computer
A. Address bus
D. Brain of the Computer
B. Data bus
C. Control bus 208. An address bus contains 16 lines. How
many possible address locations are
D. System bus there?
203. Signal from hardware or software indi- A. 16
cating that an event has occurred or that a
B. 32
process needs attention
C. 65, 536
A. polling
D. 512
B. interrupt
C. buffer 209. are numbers and encoded characters,
D. CIR generally used as operands.
A. Input
204. Which company makes cheap and good
processors B. Data
A. Intel C. Information
B. AMD D. Stored Values
210. How many bits are in a single byte? 216. During the first stage of FDE cycle carried
A. 4 out by the CPU.The CPU an instruction
from main memory (RAM or Cache Mem-
B. Memory-monitor communication 217. The main virtue for using single Bus struc-
C. Pipelining ture is
D. None of these A. Fast data transfers
212. The addressing mode which makes use of B. Cost effective connectivity and speed
in-direction pointers is C. Cost effective connectivity and ease of
A. Indirect addressing mode attaching peripheral devices
B. Index addressing mode D. None of the mentioned
C. Relative addressing mode
218. What is the meaning of Volatile mem-
D. Offset addressing mode ory?
213. VLSI stands for A. If it is powered off, it loses its data
A. Very Large Scale Integration B. It holds its data regardless of power
B. Very Large Stand-alone Integration
C. None of the above
C. Volatile Layer System Interface
D. none of above
D. None of the mentioned
214. Which among the foloowing is/are NOT 219. Which of the following is not a way to
correct open the Start menu on a Windows-based
computer?
A. X + 0 = X
A. Ctrl+S
B. X . 1 = X
B. Ctrl+Esc
C. 1 + X = 1
D. 0 . X = X C. Click the Start button
D. Press the Start key on the keyboard
215. The memory which is used to store the
copy of data or instructions stored in
220. What is a graphics card?
larger memories, inside the CPU is called
A. A monitor
A. Level 1 cache B. Speeds up processor
B. Level 2 cache C. Its a card that shows pixels on a mon-
C. Registers itor
D. TLB D. A piece a junk
221. cWhat part of the CPU is being de- 227. Computers are binary machines, instruc-
scribed.Executes instructions and controls tions are, sequences
the flow of data
A. Decimal
A. ALU
B. Binary
B. Control Unit
C. Images
C. Cache
D. Text
D. none of above
NARAYAN CHANGDER
222. Which one of the bus is bidirectional? 228. What kind of coding will NOT be covered
in this class?
A. Address bus
A. Java Script
B. Data bus
B. Google Apps Script
C. Memory bus
D. All the above C. Python
D. Scratch
223. RAM stands for
A. Rapid Access Memory 229. PCIe provides lower latency and higher
B. Random Awareness Memory data transfer rates than busses such
as PCI and PCI-X.
C. Rapid Awareness Memory
A. serial
D. Random Access Memory
B. parallel
224. Carries signals relating to addresses be-
tween the processors and the memory. C. integrated
A. FDD A. 1024
B. HDD B. 4096
C. DRAM C. 248
D. None of these D. 16, 777, 216
232. Which bus makes bridge between proces- B. Memory Buffer Register
sor and external peripheral through cache C. Accumulator
controller
237. Which of the following registers holds 242. In the case of, Zero-address instruction
the intermediate arithmetic and logic re- method the operands are stored in
sults. A. Registers
A. Memory Address Register B. Accumulators
NARAYAN CHANGDER
B. Not possible using Add, we’ve to use D. 5.1 times
AddSetCC
249. Memory Address Register (MAR)
C. Not permitted
A. Stores the address of the next instruc-
D. None of the mentioned tion in memory
244. What is the program counters job? B. Stores the address of where the next
item will be fetched from
A. To count the programs
C. Stores data fetched from memory, or
B. It contains the memory address of the waiting to be stored in memory
next instruction to be loaded
D. Stores the result of arithmetic calcula-
C. It stores instructions tions
D. It carries out the calculations 250. What does the control unit do?
245. The time interval between pulses is called A. It controls and monitors communica-
a . tions between the computer and any hard-
ware attached
A. clock cycle
B. It holds the data and programs that
B. clock pulse the CPU currently needs
C. processor interval C. It holds the data and programs that
D. control cycle the CPU currently needs
D. All of the above
246. What doesn’t affect the performance of
the computer 251. Which of the following file systems does
not have a built-in security?
A. Clock Speed
A. ext3
B. Number of Cores
B. ext4
C. The number of instructions in the pro-
gram C. FAT
253. The three steps to processing instructions 258. The time delay between two successive
given by a currently running program initiations of memory operation
A. Memory access time
NARAYAN CHANGDER
A. CISC C. Cache Size
B. ARM is architecture neutral
D. The number of instructions in the pro-
C. RISC gram
D. none of others
271. The function of program counter (PC)
266. Firmware refers to holds
A. Any hardware that can’t easily break A. Temporary
B. A combination of hardware and soft- B. Address for Memory
ware
C. memory Operand
C. A type of software that is updated to
make a computer work better D. Address of Instruction
D. Hardware used in kitchens 272. The transfer between CPU and Cache is
267. What is a collection of wires called that
sends data and addresses around the A. Word transfer
CPU?
B. Block transfer
A. A bus
C. Set transfer
B. A connection
D. Associative transfer
C. A link
D. A cable 273. The main circuit board in a computer is
called the
268. What enables different parts of the CPU
to work on different tasks at the same A. RAM
time B. dongle
A. Hyper Threading C. motherboard
B. Multiplier D. power supply unit
C. Cores
274. This would reduce the number of mem-
D. Bus Speed
ory/processor transfers
269. Microprocessor 8085 is the enhanced ver- A. Arithmetic Logic Unit
sion of with essentially the same con-
struction set B. Control Unit
A. 4800 C. Accumulator
B. 6800 D. Cache
286. What does IPO model stand for? 292. What is the CU
A. Inputs, Processes, Outputs A. Central Unit
B. Ingenuity, Processes, Outputs B. Central Processing Unit
C. Inputs, Protocol, Output
C. Control Unit
D. Information, Processes, Outputs
D. Credit Union
287. The ALU performs what type of opera-
293. The banked registers are used for
NARAYAN CHANGDER
tions
A. Arithmetic A. Switching between supervisor and in-
B. Logical terrupt mode
B. It improves the amount you can store 303. Is this a valid example of the
on the computer. Input-Process-Output Model? In-
C. The higher the clock speed the better put:Scanning picture.Process:Editing the
the performance. picture.Output:Printed poster with pic-
ture.
D. It will make loading program slower
A. Yes.
298. What is the name of the unit in the CPU
that performs arithmetic and logic opera- B. No.
tions? C. I don’t know.
A. ALU
D. none of above
B. CU
C. MAR 304. Which chip contains the system BIOS and
can hold data permanently, even without
D. MDR
electricity?
299. When a processor attempts to read a A. Flash ROM
memory and is present in cache is called
B. NVRAM
A. cache copy
C. RAM
B. cache hit
C. cache miss D. ROM
307. Which architecture is best suited to stor- 312. If the RAM is upgraded from 512MB to
ing a program in read only memory (ROM) 4GB, what will be the biggest benefit?
A. Harvard A. The operating system will be faster
B. Von Neumann B. There will be more hard drive space
C. Both C. More programs and data can be
opened at the same time
D. none of above
D. The computer will be quicker if you
NARAYAN CHANGDER
308. What is the form of the boolean expres- open a document
sions AB+ B’C’ =Y?
313. Define ALU
A. Product-of-sums.
A. Perform anything that we ask the com-
B. Sum-of-products
puter to do
C. Karnaugh map
B. Performs basic arithmetic, logical, or
D. Matrix I/O operations
A. Stores the address of the next instruc- D. Does not perform anything
tion in memory
314. A CPU which is able to carry out a
B. Stores the address of where the next thousand million instructions per seconds
item will be fetched from would have a clock speed of
C. Stores data fetched from memory, or A. 10GHz
waiting to be stored in memory
B. 1GHz
D. Stores the result of arithmetic calcula-
C. 100MHz
tions
D. 1000GHz
310. Solid state drives have no moving parts
and use what memory cells to store the 315. General purpose machines are based on
data? which architecture?
A. NAND A. Harvard
B. AND B. Von Neumann
C. NAN C. They can be either
D. EXOR D. none of above
311. In ROM BIOS, the acronym BIOS stands 316. When Performing a looping operation,
for: the instruction gets stored in the
A. Basic Intuitive Output Set A. Registers
B. Basic Input Organizational System B. Cache
C. Basic Input Output System C. System Heap
D. Basic Industry Operating System D. System stack
317. Which came out first? Intel core 2 duoOr- B. Stores the address of where the next
Intel pentium 4 item will be fetched from
318. The instruction, Add #45, R1 does 323. When using Branching, the usual sequenc-
A. Adds the value of 45 to the address of ing of the PC is altered. A new instruction
R1 and stores 45 in that address is loaded which is called as
B. Adds 45 to the value of R1 and stores A. Branch target
it in R1 B. Loop target
C. Finds the memory location 45 and adds
C. Forward target
that content to that of R1
D. None of the mentioned D. Jump instruction
319. General purpose registers in the proces- 324. Which of the following is NOT one of the
sor are used for control lines?
A. storing data for arithmetic, logical or A. Read
shift operations
B. Amend
B. storing data permanently
C. storing output from the data bus, after C. NMI
being processed D. Reset
D. general purpose processing
325. What register is connected directly to the
320. What does “Secure” means? data bus?
A. Protected from danger or harm A. Memory Address Register
B. Protested by danger or harm
B. Memory Data Register
C. Presented with danger or harm
C. Program Counter
D. Provide information about computer
data D. Current Instruction Register
321. What does MAR stand for? 326. If the processing speed goes up from
A. Main Address Register 1GHZ to 4GHZ and the number of cores
B. Memory Address Register goes from 1 to 2-what is the exact effect
on the performance of the computer?
C. Massive Address Register
A. Quadrupled
D. Minimal Age Readable
B. Eight Times faster
322. The Program Counter
C. Sixteen times faster
A. Stores the address of the next instruc-
tion in memory D. Doubled
327. Which of the following is TRUE about the 332. A truth table of the n variables has
READ operation? Minterms
A. Contents of memory are copied to A. N2
MDR
B. (n-1)2
B. Contents of MDR are copied to memory
C. 2n-1
NARAYAN CHANGDER
333. Which register holds the memory address
D. Contents of MAR are copied to memory of the next instruction that would be exe-
cuted?
328. Typical processor speed of 2016
A. MDR
A. 16Hz
B. AC
B. 100MHz
C. 4GHz C. PC
D. 300GHz D. CIR
329. You need to prepare a brand-new replace- 334. What is the name given to the memory
ment hard drive for storage. What is the which works on time sharing principle in
first step needed to get it ready? order to create an illusion of infinite mem-
ory space?
A. Format the drive
A. Register
B. Install an OS
C. Install a file system B. Primary memory
337. are used to overcome the difference 342. Which part of the processor processes
in data transfer speeds of various de- and manipulates data?
vices.
NARAYAN CHANGDER
D. ROM C. Execution Cycle
349. The ROM chips are mainly used to store D. Decode Instructions
359. What does CPU stand for? 365. Which of the following bus is unidirec-
A. Central Program Unit tional?
NARAYAN CHANGDER
D. Intel CPUSingle Core3.9 GHz
371. Processors don’t do the following
377. What should you do everyday when en-
A. Operate in Hz
tering and starting class?
B. Execute Data
A. Line book bags along glass wall
C. Execute Instructions
B. Sharpen pencils
D. Process Data
C. Listen to music
372. RAM is memory, meaning that when D. Start eating a snack
the system is shutdown, the contents of
RAM are erased. 378. What is the function of Memory Address
Register (MAR)?
A. non-volatile
A. Stores the data for read/write opera-
B. extra tions.
C. volatile B. Stores the address of the data for
D. secret read/write operations.
373. What does ALU stand for? C. Stores the sum of two bits when they
are added.
A. Arguable Logic Unit
D. Stores the address of the next instruc-
B. Arithmetic Larger Unit tion
C. Arithmetic Logic Unit
379. programs that control or maintain
D. Arithmetic Logic Utility the operations of the computer and its de-
vices.
374. Most PCs give a single beep on boot-up
to indicate they are OK hardware wise. A. Software
You boot your PC and don’t get a beep. B. System Software
What should you check first?
C. Application software
A. system board
D. Utility program
B. RAM
380. The control unit controls other units by
C. microprocessor
generating(IBPS clerk 2011)
D. speaker
A. Control signal
375. Representation of-29 in binary is B. transfer signal
A. 11101 C. timing signal
B. 00010 D. command signal
381. What register do you store the data in? D. Decoding the data in MDR and placing
A. CPU it in IR
NARAYAN CHANGDER
memory? C. Memory Address Register
A. Instruction Cache D. Memory Data Register
B. Instruction Register
399. Peter, a friend of yours, has a piece of
C. Instruction Opcode software that was written for Mac OS X.
D. Both (A) and (B) Which of the following OSs will that soft-
ware run on?
394. Hard drives use what substance for mag- A. Mac OS X only
netising the bits for the storage of binary
1 or 0? B. Mac OS X and Linux
A. Ferrous particles C. Mac OS X and Chrome OS
B. Nitrous particle D. Mac OS X, Linux, and Chrome OS
C. Iodised particles 400. The transfer between Main memory and
D. Silicon particles Cache is
A. Word Transfer
395. Which if these is closest to 1 million.
B. Block Transfer
A. Kilo (K)
C. Byte Transfer
B. Mega (M)
D. Bit Transfer
C. Giga (G)
D. Tera (T) 401. Assume x=$s2, y=$s0, z=$s1 and find
x= (y/z).
396. EDSAC stands for
A. nor $s2, $s0, $s1
A. Electronic display storage automatic
B. nor $s1, $s0, $s2
calculator
C. nor $s2, $s1, $s0
B. Electronic delay storage automatic cal-
culator D. are $s0, $s1, $s2
C. Electronic delay storage automatic cir- 402. Second-level system bus that connects
cuit the memory subsystem to the chipset and
D. Electronic display automatic circuit the processor is referred to as
414. Find out the register number for $t8-$t9 420. Which part of the CPU is responsible for
A. 24-25 all the calculations?
A. Control Unit
B. 22-23
B. Arithmetic Logic Unit
C. 4-6
C. MDR
D. 29
D. MAR
415. Clock speed is measured in
421. What are two types of RAM?
NARAYAN CHANGDER
A. Hertz
A. SRAM and QRAM
B. Words
B. QRAM and PRAM
C. Bits Per Second
C. PRAM and DRAM
D. Metres Per Second D. DRAM and SRAM
416. Processor which is complex and expen- 422. Which of the following operating sys-
sive to produce is tems can you freely modify if you choose?
A. RISC A. OS X
B. EPIC B. iOS
C. CISC C. BlackBerry
D. Multi-core D. Linux
417. During the execution of the instructions, 423. In the given below equation the 12 rep-
a copy of the instructions is placed in the resents lw $s0, 12($s1)
A. low set
A. Register B. high set
B. RAM C. off set
C. System heap D. second set
D. Cache 424. Which addressing mode execute its in-
418. The correct order is structions within CPU without the neces-
sity of reference memory for operands?
A. Fetch, Decode, Execute
A. Implied Mode
B. Decode, Execute, Fetch
B. Immediate Mode
C. Execute, Decode, Fetch C. Direct Mode
D. Decode, Fetch, Execute D. Register Mode
419. Hertz mean a CPUs Clock will pulse 425. Which of the following is not a multitask-
per second. ing operating system?
A. 1 A. Windows
B. 2 B. Linux
C. 1 000 C. Win NT
D. 1 000 000 D. DOS
437. I am the long-term storage part of the D. it makes a copy of the primary storage
computer. Software, documents and other
files are saved here. 443. Made up of addresses and contents. Each
address will uniquely identify every loca-
A. random access memory (RAM)
tion within the memory map.
B. hard drive
A. ALU
C. motherboard
B. control unit
D. expansion slot
NARAYAN CHANGDER
C. IAS
438. The additional duplicate register used in
ARM machines are called as D. processor
453. are used to translate high level lan- A. Process status word
guage programs into machine code B. Program status word
A. Assemblers C. Program status width
B. Compilers D. process status width
NARAYAN CHANGDER
C. average access time
mance of the computer?
D. transfer rate
A. Clock Speed
B. Number Of Cores 466. RAM-What happens when the electricity
C. Cache Size Is turned off?
D. The Number Of Instructions In The A. The data from the memory is saved
Program onto flash memory
B. The data from the memory is saved
461. Which interrupt is generated by an inter-
onto the hard disk
nal processor primarily to do mutitasking
C. The data from the memory is not saved
A. Timer interrupt
B. program interrupt
D. The data from the memory is saved
C. I/O interrupt onto ROM
D. Hardware failure
467. is an example of a Software
462. Data is written to and read from the disk
A. Monitor
via a magnetic head mechanism in the
floppy drive. B. USB
A. cylinder C. CD
B. read/write D. Microsoft Word
C. recordable
468. How does a CPU process instructions?
D. cluster
A. Using the Fetch Decode Execute cycle
463. They are used as temporary memory ar- B. Linearly using parallel processing
eas in devices, where data is kept
C. Using machine code
A. registers
D. Through the Control Bus
B. driver
C. buffer 469. How many cycles per second would a 3
D. program counter GHz processor do?
A. 3 million
464. Used to transmit data between areas of
the processor. B. 3000
A. Data bus C. 3 thousand million (3 billion)
B. Address bus D. none of above
474. Find out the answer for the equationG=H- C. Motorola and Apple
A[8], Assume g=$s1, h=$s2, A=$s3. D. Intel and AMD
A. lw $t0, 32($s3)sub $s1, $s2, $t0
480. In hexadecimal, what would be the next
B. lw $t2, 32($s2)sub $s2, $s1, $t3 value of the Program Counter after 0x09
C. lw $t1, 32($s3)sub $s3, $s1, $t0 if it was incremented?
D. none of above A. 0x0A
NARAYAN CHANGDER
482. Which is not a part of CPU? unit
A. Execution unit C. The decoded instruction is executed
B. I/O buffer register D. The ALU decodes the instructions
C. Program Counter
488. What component holds the address of the
D. I/O module next instruction
483. You get a CMOS checksum error during A. Memory Data Register
bootup. What is most likely the cause this B. Accumulator
error? C. Memory Address Register
A. power supply is bad D. Program Counter
B. b.BIOS needs updating
489. Which control line is responsible for send-
C. CMOS battery is nearing end of life ing out a message when the computer
D. hard drive types are incorrectly de- crashes and this message cannot be ig-
fined nored?
A. Reset
484. Which of the following is false about the
control unit? B. NMI
A. It controls the execution of programs. C. Interrupt
D. Clock
B. It times the fetching of instructions. 490. The effective address of the following in-
C. It decodes instructions. struction is MUL 5(R1, R2).
D. Its performance is unaffected by pro- A. 5+R1+R2
cessor speed. B. 5+(R1*R2)
485. Operating systems is also known as C. 5+[R1]+[R2]
A. Database D. 5*([R1]+[R2])
B. System software 491. High speed storage areas within the com-
puter; all data must be represented before
C. Hardware
it can be processed
D. Printer
A. buffer
486. RAM is usually called B. register
A. Logical Memory C. driver
B. Physical memory D. interrupt
492. You just installed a new IDE hard drive, 497. In ARM, is the default mode at start
but your system BIOS will not recognize up or reset
the new drive, what should you check
C. Intelligent Processing Output 499. Which part of the CPU controls the flow
of data and instructions.
D. Input Processing Output
A. Arithmetic Logic Unit
494. It holds data which will be sent and re- B. Control Unit
cieve from input and output devices
C. Cache
A. MAR
D. Registers
B. MBR
500. What is cache memory?
C. IR
A. A very large, temporary memory
D. IBR
B. A very small but expensive memory
495. Which is BetterIntel core i7 3rd genera- C. It is used to store data and programs
tion or Intel core i5 10th gen? permanently
A. Intel core i7 3rd gen D. It is a type of payment
496. What is fetch function in machine cycle? C. Commonly used instructions and data
A. Fetch instruction from control unit to D. Data that hasn’t been used for a long
memory time
B. Fetch instruction from memory to con- 502. What are the main components of a com-
trol unit puter in von Neumann architecture?
C. Fetch instruction from control unit to A. Processor and input-output devices
arithmetic logic unit
B. Processor, Memory unit and input-
D. none of above output devices
C. CPU, monitor, keyboard and mouse 508. What happens in the ‘fetch’ part of the
D. CPU, monitor, keyboard, mouse, Fetch Decode Execute Cycle
speakers and microphone A. The RAM delivers the instruction.
503. This holds the instruction/data temporar- B. The processor fetches the instruction
ily after it is brought to the processor from from primary memory.
the main memory
C. The program counter goes down by
A. Memory Address Register one.
NARAYAN CHANGDER
B. Memory Data Register D. none of above
C. Accumulator
509. Which of the following register is used in
D. Program Counter
the control unit of the CPU to indicate the
504. What happens at the Decode step of the next instruction which is to be executed?
fetch-decode-execute cycle? A. Accumulator
A. The CPU makes sense of the instruc-
B. Index Register
tions.
B. The CPU fetches the information from C. Instruction Decoder
RAM. D. Program Counter
C. The instructions are executed.
510. This component is required to process
D. none of above data into information and consists of inte-
505. Sends data between the processor, the grated circuits(SBI Clerk 2011)
memory unit and the input/output de- A. Hard disk
vices.
B. CPU
A. Address bus
C. RAM
B. Data bus
C. Control bus D. ROM
513. In which of the following gates, the out- C. Only decodes instructions
put is 1, if and only if at least one input is
D. Controls how much power is directed
1?
524. The following logic building block can be 529. In ARM LPC2148, in which sequence of
used to implement any combinational logic bytes are stored in computer memory ad-
circuit dress
A. Ex-Or gate A. Big Endian
B. Encoder B. X-Little Endian
C. Multiplexer C. Little Endian
D. Decoder D. Both Little & Big Endian
NARAYAN CHANGDER
525. What is the high speed memory between 530. About 99 percent of the BIOS business
the main memory and the CPU called? is controlled by two companies. Of the
following, which one is not a major BIOS
A. Register Memory
manufacturer?
B. Storage Memory
A. Intel
C. Cache Memory
B. American Megatrends (AMI)
D. Virtual Memory
C. Award Software
526. Which of the following gates are added D. Phoenix Technology
to the inputs of the OR gate to convert it
to the NAND gate? 531. Calculate the overall speed of this CPU
AMD Vengeance3.3 GHzQuad Core
A. NOT
A. 13.2 (13 200 000 cycles per second)
B. AND
B. 6.6 GHz (6 600 000 cycles per second)
C. OR
D. XOR
C. 13.6 GHz (13 600 000 cycles per sec-
527. What kind of data dependences can be ond)
eliminated unsing register renaming tech- D. 3.3 GHz (3 300 000 cycles per second)
nique
532. Which component generates addresses
A. True and output dependences
A. Secondary Storage
B. Output and antidependence
B. Processor
C. All types of dependences
C. Main Memory
D. Antidependences and true depen-
dences D. Control Unit
528. Control line causes data from the ad- 533. To which register(s) is instruction copied
dressed I/O port to be placed on the bus to in the fetch process?
A. I/O read A. MDR only
B. Memory read B. To MDR first and then, to CIR
C. memory write C. To MDR first and then, to PC
D. I/O write D. MAR only
534. Charlie uses social media regularly. What 538. CPU stands for
step would you recommend to be more se- A. Central Program Unit
cure online?
3. Feasibility should be feasible with the 8. Routine to delete element in an array im-
available resources. plementation
A. True A. for(i=pos-1;i<n-1;i++)list[i]=list[i-
1];
B. False
B. for(i=pos-1;i<n-1;i++)list[i]=list[i*1];
C. All of the above
D. None of the above C. for(i=pos-1;i<n-1;i++)list[i]=list[i+1];
NARAYAN CHANGDER
4. A terminal node in a binary tree is called
D. for(i=pos-1;i<n-1;i++)list[i]=list[i+2];
A. Root 9. What is the advantage of a linked list?
B. Branch A. Easy to modify
C. Child B. Easy to understand
D. Leaf C. Easy to see
D. All of the above
5. give a function that does not return any
value, what value is shown when exe- 10. An entity is that which contains certain at-
cuted at the shell? tributes or properties, which may be as-
signed values
A. int
A. Attribute and Entity
B. bool
B. Entity Set
C. void
C. Field
D. none
D. Record
6. For a ordered list of 11 items, how many
11. Time complexity of binary search:
comparisons will a linear search need be-
fore it knows that a value in NOT in the A. O(n)
list? B. O(log n)
A. 12 C. O(1)
B. 11 D. O(n2)
C. 6 12. This data structure extends an array’s
D. 4 functionality.
A. ArrayList
7. If letter ‘D’, ‘C’, ‘B’, ‘A’, are sequentially
inserted into a queue, and then deleted one B. Queues
by one, in which sequence will the letter be C. Stacks
deleted from the queue? D. List
A. A, B, C, D
13. Identify the sorting algorithm that apply
B. A, B, D, C divide-and-conquer method.
C. D, C, A, B A. Linear Sort
D. D, C, B, A B. Merge Sort
24. A graph having an edge from each vertex 29. which module of python supports regular
to every other vertex is called a expressions?
A. Tightly Connected A. re
B. Strongly Connected B. regex
NARAYAN CHANGDER
25. It is a view or representation of an entity sification in which the elements are
that includes only the most significant at- stored/accessed on a non-linear order
tributes such as trees and graphs.
A. Abstract Data Type A. trees
B. Abstraction B. linear
C. Abstracted C. non-linear
D. none of above D. graphs
31. Output of:max(”please help ‘’)
26. Maximum number of comparisons required
to search the leaf node of Binary search A. please help
tree is B. Error
A. log n C. p
B. n D. s
NARAYAN CHANGDER
47. Which of the following sorting algorithms C. Circular linked list
has the lowest worst-case complexity?
D. None of the above
A. Quick sort
53. If the numbers 5, 10, 3, 42 are enqueued
B. Merge sort
onto a queue in that order, what does de-
C. Selection sort queue return?
D. Bubble sort A. 5
48. What is a dictionary data structure? B. 10
A. Abstract Data Type made up of associ- C. 3
ated pairs D. 42
B. Queue that hold alphanumeric charac-
54. Which of the following facts about arrays
ters
is TRUE?
C. a type of array
A. Lists can contain items of different
D. Abstract Data Type that holds Strings data types
49. In a unidirectional graph the connections B. Arrays can only contain items of a sin-
between nodes can be traversed in both gle data type
directions. If the arcs are all one way, the C. Lists and arrays are the same thing
the graph is called a
D. A list is a type of variable
A. Digraph
B. One way graph 55. Which of the following is an advantage of
a bubble sort?
C. Unigraph
A. It is a very small and simple computer
D. Epigraph program
50. Array is data type. B. It takes a very long time to run
A. user defined C. It is very quick
B. primary D. none of above
C. derived 56. This is used to store values temporarily
D. all of above A. Data Types
51. Index values of an array range from B. Variables
A. 0 to length-1 C. Array
B. 1 to length D. Loops
57. Which component of a computer controls 63. Which of the following best describes AVL
the entire system and is often called the tree?
brain of the computer?
68. there are primitive data types, meanwhile 73. What does a linear search do?
there are what we call abstract data type, A. Looks at the first item of data, then
evaluate which is not one. each one in turn, until it finds the data item
A. Stacks requested
NARAYAN CHANGDER
D. none of above
69. Which value does the command ‘list[3]’
find? 74. A queue is a first in, data structure.
A. The fourth value of ‘List’ A. Last in
B. Last out
B. The third value of ‘List’
C. First out
C. The second value of ‘List’
D. All of the above
D. The fifth value of ‘List’
75. Tree
70. An algorithm should have step-by-step di- A. data structure similar to a graph, with
rections, which should be of any pro- no loops.
gramming code.
B. an object in a graph also known as a
A. Feasibility vertex
B. Independent C. a join of relationship between nodes-
also know as an arc
C. Output
D. the starting node in a rooted tree struc-
D. Finiteness ture from which all other nodes branch
off./
71. Which of the following is/are not the dis-
advantage of Linked list? 76. Using a binary search why will the number
9 never be found in the following list:11,
A. Linked list does not support random ac- 8, 13, 9, 7, 3
cess
A. It does not work on numbers
B. Memory is required to store next field
B. It only works on letters
C. Searching takes time compared to ar- C. The list is not in order
rays
D. none of above
D. None of the above
77. For a linked list, what meta-data will need
72. A tree sort is also known as sort. to be stored with each data entry?
A. The Name of the list
A. quick
B. The address of the current data entry
B. heap
C. The address of the next data entry in
C. shell the list
D. selection D. The meaning of life
78. A field or collection of fields in a record D. A list is a collection of data that can-
which identifies a record uniquely is called not hold duplicated data and cannot be
a changed
88. Degree of the leaf node is 94. Suppose a tuple test contains 5 elements.
A. 0 How can you set the 3rd element of the
tuple to ‘Python’?
B. 1
A. test[2] = ‘Python’
C. n
B. test[3] = ‘Python’
D. n-1
C. test(2) = ‘Python’
89. Which is NOT a type of queue?
D. Elements of tuple cannot be changed
NARAYAN CHANGDER
A. Priority
95. Root
B. Linear
C. Circular A. data structure similar to a graph, with
no loops.
D. Semaphore
B. an object in a graph also known as a
90. Which of the following is an advantage of vertex
a linked list? C. a join of relationship between nodes-
A. Efficient Memory Utilization also know as an arc
B. Not cache friendly D. the starting node in a rooted tree struc-
C. Extra memory space for a pointer is re- ture from which all other nodes branch
quired off./
D. Random access is not allowed 96. which data structure type allows deleting
data elements from front and inserting at
91. In which algorithm takes less time or space
rear?
is called
A. Stacks
A. Best case
B. Queues
B. Worst case
C. Average case C. Dequeue
92. It is a specialized format to store and orga- 97. In a linked list, you must store the data
nize data in a computer’s memory or disk. with
A. Raw Data A. the address of the next datum
B. Data Types B. the address of the head of the list
C. Data Structures C. the null value to signify the end of the
list
D. Data
D. none of above
93. In the array ‘names(”John”, “Ali”,
“Sarah”)’, what is the value of element 98. The algorithm is completed when the state-
names(2)? ment is encountered.
A. Ali A. Return
B. Sarah B. Finish
C. John C. EXIT
D. none of above D. None of the above
99. How many searches will it take to find 10 C. HashMap<Integer, String> map =
in [1, 3, 5, 7, 10, 12, 15] using BINARY new HashMap<Integer, String>();
search?
D. a directed graph with cycle 106. In the queue, the first index comes
right after the last index.
101. How do you add 21 to an ArrayList of
Integers? A. linear queue
A. list.add(21); B. circular queue
B. list.put(21); C. priority queue
C. 21.add(list); D. none of above
D. list.add(”21”); 107. What is R’s equivalent of numpy’s broad-
102. A node is a if it has successor nodes- casting rules?
that is, if it has an out-degree greater than A. Vectorization
zero. B. Recycling
A. child
C. Repetition
B. parent
D. Regurgitation
C. siblings
108. How many Queues are required to imple-
D. none of above
ment a Stack?
103. If for an algorithm time complexity is A. 2
given by O(n) then complexity of it is:
B. 3
A. linear
C. 1
B. exponential
D. 4
C. constant
D. none of the mentioned 109. A queue data structure places data items
in an order that is
104. with Strings as
A. FIFO
A. HashMap<String, Integer> map =
B. FILO
new HashMap<String, Integer>();
B. HashMap<String> map = new C. LIFO
HashMap<Integer>(); D. FOLI
110. Which of the following is an advantage 115. A representation of a graph data struc-
of a insertion sort when compared with a ture set up as a two dimensional array or
bubble sort? grid that shows where there is an edge be-
A. It is quicker than a bubble sort algo- tween each pair of nodes.
rithm A. Ordered pairs
B. It is simpler than a bubble sort algo- B. Graph paper
rithm C. Adjacency List
NARAYAN CHANGDER
C. There is no advantage. D. Adjacency Matrix
D. none of above
116. This data structure uses pointers to link
111. a collision in a hash table is nodes together.
A. When 2 things have the same value A. Queue
B. When 2 things are assigned the same B. Linked List
address C. Array
C. When 2 things are processed at the D. Trees
same time
D. When 2 things are deleted at the same 117. Graph traversal is used to find the
time route to visit all nodes in a network
A. Shortest
112. Main Operations in Stacks are Called
B. Best
A. Insertion and deletion
C. Longest
B. Push and Pop
D. Most secure
C. append and insertion
D. append and pop 118. The main hardware components of a
home computer are:
113. Which of the following statements is/are A. Excel, Word, Internet Explorer
TRUE for an undirected graph? P:Number
of odd degree vertices is evenQ:Sum of de- B. Monitor, CPU, Keyboard
grees of all vertices is even C. Word, Speakers, Printer
A. P Only D. Monitor, Mouse, Internet
B. Q Only 119. are data that a variable can hold in a
C. Both P and Q programming language.
D. Neither P nor Q A. Variable
124. Which Python Library is used to manipu- 129. An empty list is the one which has no
late the data so that it becomes readable A. Nodes
and organised?
B. Data
A. NumPy
C. Address
B. Library 1
D. Both a & b
C. Python np
D. Pandas 130. A variant of linked list in which last node
of the list points to the first node of the
125. Which of the following usees FIFO metho list is?
A. Queue A. Singly linked list
B. stack B. Doubly linked list
C. linklist C. Circular linked list
D. binary tree D. none of above
NARAYAN CHANGDER
D. none of above
C. shuffle(L)
132. Characteristics of Data Structure D. random.shuffle(L)
A. Correctness
138. It is a measure of how well a computer
B. Time Complexity algorithm scales as the amount of data in-
C. Space Complexity volved increases.
D. All of the above A. Big logN Notation
B. Big X Notation
133. What is a static structure?
C. Big O Notation
A. A structure fixed in size
D. none of above
B. A structure that cannot be moved
C. A structure that cannot be changed 139. s = 0for d in range(0, 5, 0.1):s += d
print(s)
D. A structure that is influenced by elec-
tricity A. Syntax Error
B. Type Error
134. A linear data structure in which insertion
C. Name Error
and deletion operations can be performed
from both the ends is D. Traceback Error
A. Circular Queue 140. Consider the following operation
B. Deque performed on a stack of size
5.Push(1);Pop();Push(2);Push(3);Pop();Push(4);Pop();Pop();P
C. Priority Queue
the completion of all operation, get the to-
D. Queue tal number of element present in stack is
135. Which of these data structures is FIFO? A. 1
A. Stack B. 2
B. Queue C. 3
D. 4
C. Binary Tree
D. Linked List 141. Recognize the algorithm that does not di-
vide the list.
136. Suppose you have the follow-
A. Merge sort
ing series of queue operations.q =
B. Binary Search
Queue();q.enqueue(1);q.enqueue(10);q.enqueue(100);q.dequeue();q.dequeue();What
items are the output? C. Linear Search
A. 10010 D. Quick sort
142. The process of Visiting each element in 147. stack is also called
any Data structure is termed as A. first in first out
152. A data structure whose elements form a 157. Which of the following is NOT a form of
sequence is known as technology?
A. Heterogeneous data structure A. Fire
B. Homogeneous data structure B. Wheat
NARAYAN CHANGDER
158. Which of the following is not a type of
153. It talks about arranging data in a particu- Linked List?
lar format, whether ascending or descend-
ing. A. Hybrid linkedlist
B. Singly linked list
A. Searching
C. Doubly linked list
B. Stacking
D. circular linked list
C. Queueing
D. Sorting 159. Array or linear list comes under the cate-
gory of
154. is the method used by card sorter? A. Compound Data Structure
A. Radix sort B. Simple Data Structure
B. Insertion C. Random Data Structure
C. Heap D. None of these
A. Data is better when ordered 162. In the worst case, the number of compar-
isons needed to search a singly linked list
B. Data always needs to be in order be-
of length n for a given element is
fore searching
A. log 2 n
C. The search algorithm may be in the
code before the sorting algorithm B. n/2
174. An algorithm should have 1 or more well- 179. Which of the following principle does
defined , and should match the desired Queue use?
A. LIFO principle
A. Unambigous
NARAYAN CHANGDER
B. FIFO principle
B. Input
C. Linear tree
C. Output
D. Ordered array
D. Finiteness
180. What is an advantage of a linear search?
175. The maximum time taken by linear search
algorithm when A. It is very quick
184. What is Breadth-First search? 189. Its from entities similar of attributes
form.
A. A search method that scans from the
186. C++:SET and MAP Java:TreeMap and 191. Which of the following is not an advan-
TreeSet tage of trees?
NARAYAN CHANGDER
B. Data Item 201. Algorithms must terminate after a finite
C. Group Items number of steps.
205. Which of the following is not a sorting 210. In a graph if E=(u, v) means
algorithm? A. u is adjacent to v but v is not adjacent
206. In stack insertion and deletion can take 211. To measure Time complexity of an algo-
place only at one end call the of the rithm Big O notation is used which:
stack. A. describes limiting behaviour of the
A. Path function
B. Function B. characterises a function based on
growth of function
C. Top
C. upper bound on growth rate of the
D. Bottom function
207. Which of the following data structure al- D. all of the mentioned
lows you to delete the elements from both
the ends while insertion from only one 212. DFT is equivalent to which of the traver-
end? sal in the Binary Trees?
A. Deque C. Delete
B. Header D. Search
C. Queue 221. O(n) means that your algorithm will take
D. Circular Queue on the order of operations to find the
minimum item
216. There are 3 Basic sorting algorithms the
Bubble Sort, Insertion Sort, Selection Sort. A. n2
Which of these is the slowest? B. n-1
NARAYAN CHANGDER
A. Insertion C. n
B. Selection D. none of above
C. Bubble 222. What is the output of the following pro-
D. Quick gram? print((1, 2) + (3, 4))
A. [2, 3] B. (1, 2, 3, 4)
C. [2, 3, 4] D. Error
220. One or more cells that have filled cells A. Processor speed
above them B. Speed
A. Hole C. Algorithm
B. Insert D. Data Structure
226. Which of the following data structures is 231. A pile of book is an example of a
immutable? A. Stack
make use of arrays to implement their al- 242. What will the following statement do?
gorithms. df grades.index = [”Amna”]
A. Element A. It will add name amna in dataframe
B. Array B. It will add grades for Amna
C. Index C. It will add Amna as a new row header
D. none of above for index 0
D. It will delete Amna from data frame
NARAYAN CHANGDER
237. Which is the correct operation for:”Add
item to the rear of the queue.”
243. Should be feasible with the available re-
A. enQueue(item) sources.
B. Append.Queue(item)
A. Feasibility
C. enQueue()
B. Independent
D. AddItem(EnQueue())
C. Output
238. Insertion in Queue is done at end, and D. Finiteness
deletion is at end
A. start, last 244. An ADT is defined to be a mathematical
B. front, rear model of a user-defined type along with
the collection of all operations on that
C. rear, front model.
D. begin, stop A. Assignment
239. Essential tool in programming that gener- B. Primitive
alizes the notion of an operator.
C. Structured
A. Data Structures
D. Cardinility
B. Variable
C. Procedure 245. User push 1 element in the stack hav-
D. None of the above ing already five elements and having stack
size as 5 then stack becomes
240. Which of the following is not a type of A. Overflow
missing value in R?
B. User Flow
A. NA double
C. Underflow
B. NA integer
C. NA D. Crash
258. What is the output when following 263. which of these is not core data type?
code is executed? names = [’Amir’, A. lists
‘Bear’, ‘Charlton’, ‘Daman’] print(names[-
B. dictionary
1][-1])
C. tuples
A. n
D. class
B. D
264. Which of the following data structure is
C. Daman
non linear type?
NARAYAN CHANGDER
D. Error
A. Stack
259. Based on the statement below, which of B. Queue
the following statements gives the length C. Tree
of the data array? double[ ] data = new
D. Liked list
double[10];
A. data.size() 265. Which one of the following is not the ap-
plication of the Queue data structure?
B. data.length
A. Resource shared between various sys-
C. data.size tems
D. data.length() B. Data is transferred asynchronously
260. Most Efficient Time Complexity of Topo- C. Load balancing
logical Sorting is? (V-number of vertices, D. Balancing of symbols
E-number of edges)
266. How do you write a for loop?
A. O(V + E)
A. for (int i = 0; i < 21) {}
B. O(V) B. for (int i = 0; i++) {}
C. O(E) C. for (int i = 0; i < 21; i++) {}
D. O(V*E) D. for (i) {}
261. Other name for directed graph is 267. is a specialized format to store and
organize data in a computer’s memory
A. Direct graph
disk.
B. Digraph
A. Control Structure
C. Dir-graph B. Data Structure
D. Dgraph C. Algorithm
262. Consider the functionfind ( int x, int D. Data type
y){return (( x < y )? 0:( x-y ));}Let a, b be 268. A mathematical-model with a collection
two non-negative integers.The call find(a, of operations defined on that model is
find(a, b)) can be used to find the called
A. positive difference of a, b A. Data Structure
B. maximum of a, b B. Abstract Data Type
C. minimum of a, b C. Primitive Data Type
D. sum of a, b D. Algorithm
269. In data structure data items are not 274. Computer programs and games are called
in sequence. what?
270. Pushing an element into a stack already 275. The path is a if it begins and ends at
having six elements and the size is six, the same vertex.
then the stack has A. wheel
A. Overflow B. circuit
B. Crash C. length
C. Underflow D. none of above
NARAYAN CHANGDER
A. Sets C. Space Complexity
B. Stacks D. none of above
C. Lists 287. is a way to represent data in mem-
D. Dictionaries ory.
A. Data Handling
282. State the meaning of “void” keyword:
B. Data Structure
A. No statement
C. Data Dumping
B. No function
D. Data Collection
C. No program
D. No value 288. What kind of sorting algorithm puts the
data into piles of like data.
283. The process by which a programmer re-
A. Linear
fines an initial idea to a problem’s solution
into more specific terms. B. Bucket
A. Flowcharting C. Bubble
B. Algorithms D. Binary
C. Pseudocodes 289. What is the error in the following code
D. Stepwise Refinement fragment? double[ ] data = new dou-
ble[20];data[20] = 15.25;
284. The process where data is pushed into a
A. A cast is required
queue from one end is called
B. data not initialized
A. Dequeue
B. Enqueue C. A two-dimensional array is required
NARAYAN CHANGDER
ing piece of code? a={1:”A”, 2:”B”, D. All of the above
3:”C”}print(a.get(1, 4))
309. When creating the array ‘scores(9)’,
A. “A”
what does the ‘9’ in brackets represent?
B. True
A. The number of elements the array can
C. 4 hold
D. Error B. The largest number of digits an ele-
ment can hold
304. Select a real life situation implement
stack C. The largest number of characters an
element can hold
A. All of the answers
D. none of above
B. The cars a garage the first car in will
be the last car out of the garage 310. is an operation in arrays that allows
C. The batteries in a flashlight us to query for an element from the array.
A. Adjacent D. Insert
313. In doubly linked lists 318. What are the 3 depth traversals for a
tree data structure?
A. a pointer is maintained to store both
A. 8 C. 1
D. None of these
B. 6
C. 7 320. A hash table is
A. an abstract data structure
D. 5
B. an array
315. People have used the word to mean C. an integer
computer information that is transmitted
or stored. D. made of pine
NARAYAN CHANGDER
B. Garbage collection
325. are each variable or cell in an Array.
C. Overflow
A. Array
D. None of the above
B. Variable
C. Element 331. Example of linear data structure except
D. Index A. array
B. tree
326. What data structure is used when con-
verting an infix notation to prefix nota- C. queue
tion? D. stack
A. Stack
332. If the elements ‘20’, ‘10’, ‘300’ and
B. Queue
‘25’ are inserted in a queue, what would
C. B-Trees be order for the removal?
D. Linked-list A. 25 300 10 20
327. data structures are those whose B. 10 20 25 300
sizes and structures associated memory lo- C. 20 10 300 25
cations are fixed at compile time.
D. none of above
A. linear
B. homogeneous 333. There are two types of queue data struc-
ture. They are
C. static
D. dynamic A. Circular and linear
B. Round and straight
328. What is a dynamic structure?
C. Oval and rectangular
A. A structure that can be moved
D. Cylinder and simple
B. A structure which’s size can change
C. A structure that moves by itself 334. What is a data structure?
D. A structure that works A. A method of arranging data
329. For an undirected graph G with n vertices B. A way of keeping data without an or-
and e edges, the sum of the degrees of der?
each vertex is C. A “stack” only
A. ne D. There is no formal definition for “Data
B. 2n Structure”
335. A single elementary unit of information B. It is saved in the users document files
representing an attribute of an entity
340. Which statement best describes what 345. Which of the following can be done with
happens to the temporary working mem- LinkedList?
ory (RAM) of a computer when it is shut A. Implementation of Stacks and Queues
down?
A. It is deleted B. Implementation of Binary Trees
NARAYAN CHANGDER
B. A structure that allows its data to be 352. chr( ord (’A’) )
edited A. A
C. A structure that allows its data to be B. B
deleted
C. a
D. A structure that allows its data to be
moved D. error
350. Which of the following is useful in 355. Which of the following statements will
traversing a given graph by breadth first give header to columns for df grdaes
search? DataFrame?
A. List A. df grades.column
B. Set B. df grades.columns
C. Queue C. df grades columns
D. Stack D. df grades.columnnames
C. Insert A. error
D. Update B. none
367. Which search algorithm would be best to 372. Ordered set of a variable number of el-
use with ordered data? ements to which additions and deletions
may be made
A. A binary search
A. List
B. Either binary search or a linear search
B. Array
C. A linear search C. Variables
D. none of above D. Constants
NARAYAN CHANGDER
368. What would be needed if searching algo- 373. The number of edges from the node to the
rithms didn’t exist? deepest leaf is called of the tree.
A. Height
A. The data would need to be saved
B. Depth
B. Each item of data would need to be
looked at one by one, until the searched C. Length
for data was found D. Width
C. A new set of data to look at would be
needed 374. What is the proper way to get the num-
ber of items in an ArrayList called list?
D. none of above
A. list.length
369. The minimum number of dimensions in a B. list.size
matrix? C. list.length()
A. 2 D. list.size()
B. 3
375. In Singly Linked List Left part of the node
C. 10 which contains may include a simple
D. 12 data type, an array or a structure.
A. data
370. If START= then it means that the
singly linked list is empty and contains no B. node
nodes. C. address
A. FULL D. none of above
B. NULL 376. One important categories of algo-
C. START rithms:Algorithm to insert item in a data
structure.
D. none of above
A. Search
371. is a collections of facts. B. Sort
A. Datatype C. Insert
B. Data D. Update
C. Record
377. The height of a binary tree is the maxi-
D. Information mum number of edges in any root to leaf
382. What are for loops used for? 387. Which of the following applications may
use a stack?
A. To run a piece of code only when a cer-
tain condition is met A. A parentheses balancing program
B. To run a piece of code repeatedly until B. Tracking of local variables at run time
a condition is met C. Compiler Syntax Analyzer
C. To run a piece of code repeatedly for- D. Data Transfer between two asyn-
ever chronous process
NARAYAN CHANGDER
linked list
ment that was inserted last is the first one
to be taken out. C. The insertion and deletion of a node
take a bit longer
A. LIPO
D. Implementing a doubly linked list is
B. FIFO
easier than singly linked list
C. LIFO
395. The maximum degree of any vertex in a
D. FIPO
single graph with N vertices is
390. List of data in which element can be in- A. N
serted and removed at the same end is
B. N-1
called as
C. N+1
A. array
D. 2N+1
B. stack
C. linked list 396. A graph in which some of the edges are
directed and some are undirected is called
D. queue
399. A binary tree in which every node other 405. What does a searching algorithm do?
than leaf nodes has two children is called
A. Search through a set of data
410. One important categories of algo- 415. What does LIFO stand for?
rithms:Algorithm to update an existing A. Last In First Out
item in a data structure.
B. Least In Flow Out
A. Delete
C. Last In Flow Out
B. Sort
D. Last In First Object
C. Insert
416. Stack performs operation
D. Update
NARAYAN CHANGDER
A. PUSH
411. Which of the following is/are non- B. POP
primitive data structures?
C. both of the above
A. Arrays, Linklist
D. none of above
B. Stack, Queue
417. Why do hashing algorithms use the MOD
C. Trees, Graphs function?
D. All the above A. produces a random value
412. What does this program print? B. guarantees the value is in range
heights = [65, 56, 67, 48, C. avoids collisions
64]heights.sort()heights.extend([60, 61,
D. can work on both integers and chars
62])heights.remove(67)print(heights)
A. [48, 56, 64, 65, [60, 61, 62]] 418. One important categories of algo-
rithms:Algorithm to sort items in a certain
B. [48, 56, 60, 61, 62, 64, 65] order.
C. [48, 56, 64, 65, 60, 61, 62] A. Search
D. The program will error. B. Sort
413. What can a computer NOT do? C. Insert
C. None of the above 428. Which data structure is mainly used for
D. none of above implementing the recursive algorithm?
NARAYAN CHANGDER
size of the table be? C. Not all the time
A. same size as the amount of data to D. none of above
hold
439. What is the output of the following
B. an odd number
code? a={1:”A”, 2:”B”, 3:”C”}for i, j in
C. an even number a.items():print(i, j, end=” “)
D. a prime number A. 1 A 2 B 3 C
434. Which of these algorithms sorts items by B. 1 2 3
first splitting the list of items down into C. “A” “B” “C”
smaller and smaller groups?
D. 1:”A” 2:”B” 3:”C”
A. Bubble sort
440. If the tree is not empty, then the first
B. Merge sort
node is called
C. Linear search
A. leaf
D. Binary search
B. internal node
435. The essential condition which is checked C. root
before insertion in a linked queue is?
D. none of above
A. Underflow
B. Overflow 441. If the elements “A”, “B”, “C” and “D”
are placed in a stack and are deleted one
C. Front value at a time, in what order will they be re-
D. Rear value moved?
A. ABCD
436. Data structure= Organized data +
B. DCBA
A. allowed operations on it.
C. DCAB
B. allowed functions on it
D. ABDC
C. None of the above
D. none of above 442. In circular linked list, insertion of node re-
quires modification of?
437. While implementing Stack using list when
we want to delete element we must use A. One pointer
pop function as B. Two pointer
A. list.pop(0) C. Three pointer
B. list.pop(pos) D. None
443. Which of these tree traversal methods is 448. Independent algorithm should have step-
used to output the contents of a binary by-step directions, which should be inde-
tree in ascending order? pendent of any programming code.
444. A node that is not a root or a leaf is 449. The search algorithm(s) which can be
known as node because it is found in implemented using recursive approach
the middle portion of a tree. is/are
C. A series of memory locations, each 459. A linked list is a linear collection of homo-
with the same name, that hold related geneous elements called
data A. Runtime
D. none of above B. Nodes
454. It use pointer to link nodes. C. Pointers
A. Variable D. None
NARAYAN CHANGDER
B. Link List 460. Multiple requests search data simulta-
neously on a web server, even the fast
C. Pointer
server fails while searching the data.
D. Trees A. True
455. int Array[][] = new int [3] [5];What kind B. False
of array is the example above. C. All of the above
A. One Dimensional D. None of the above
B. Two Dimensional 461. The worst case occurs in linear search al-
C. Three Dimensional gorithm when
D. None of the above A. Item is not in the array at all
B. Item is somewhere in the middle of the
456. What is DataFrame? array
A. A data structure from Pandas library C. Item is the last element in the array or
B. A frame in which data is kept item is not there at all
D. A data structure from Numpy Library 462. An adjacency matrix can store informa-
tion on graphs. An adjacency list can be
457. Which programming language has arrays used for graphs with not many nodes to
whose index doesn’t have to start at 0? A. Save space
A. Pascal B. Keep the locations in sequence
B. Perl C. To make it easier to read
C. VBA D. utilise the internal language data
structure
D. C
463. Which of the following is application of
458. As applications are getting complex and Doubly Linked List?
data rich, there are three common prob-
lems that applications face now-a-days. A. moving pages forward and backward
in browser
A. Data Search
B. Giving chance to each player in a multi
B. Processor Speed player game
C. Multiple Request C. Implementing Stack
D. All of the Above D. none of above
NARAYAN CHANGDER
476. The main rules for BST are as below ex- A. INTERFACE & EXECUTION
cept
B. INTERFACE & IMPLEMENTATION
A. Items of the left subtree < x
C. INTERCONNECTION & IMPLEMENTA-
B. Items of the right subtree > = x TION
C. Items of the left subtree > x
D. INTERCONNECTION & EXECUTION
D. none of above
482. What is the biggest disadvantage of a bi-
477. Applications of Linked list nary search?
A. Polynomial Arithmetic
A. It is slow
B. Multi lists
B. It can only be used if the data is sorted
C. Radix Sort into an order
D. All the above C. It takes the data and keeps dividing it
478. In the prefix notation, as the name in half until it finds the item it is looking
suggests the operator is placed the for
operands. D. none of above
A. before
483. Which definition best describes a com-
B. after puter?
C. both a and c A. A machine with a brain and emotions
D. none of above
B. A device that collects viruses and dust
479. How many times does this program print
That’s a large class!? num students = C. A device that was invented to be
[23, 21, 33, 35, 24, 35]for num in num smarter than man
students:if num > 23:print(”That’s a
large class!”) D. A machine that stores and processes
data
A. 0
B. 1 484. A LIFO structure where the last item of
data added is the first to leave.
C. 4
D. 6 A. Stack
B. Queue
480. Linked list data structure offers consider-
able saving in C. Graph
A. Computational Time D. Linked list
D. 5432 A. 1
B. 2
488. Collection of dinner plates at a wedding
reception is an example of C. 3
A. stack D. 4
B. queue 494. Which sorting algorithm may make multi-
C. circular queue ple swaps per pass?
D. none of above A. Bubble Sort
B. Selection Sort
489. Which are two examples of alternative
hashing algorithms? C. Insertion Sort
A. cubed & random D. none of above
B. square-point & creasing 495. A graph G is called a if it is a con-
C. div 2 & skip ahead nected acyclic graph?
D. mod & folding A. Cyclic graph
490. What is the term for inserting into a full B. Regular graph
queue known as? C. Tree
A. overflow D. Not a graph
NARAYAN CHANGDER
B. 5
497. An algorithm should have 1 or more well-
C. 7
defined outputs, and should match the de-
sired output. D. 0
A. Storage 503. Compound Data structure can be &
B. Input
C. Output A. Simple and Nested
D. Mainbrain B. Linear and Non Linear
C. Sequential and random
498. Which of the following data structures
allow insertion and deletion from both D. none of above
ends?
504. If a node having two children is to be
A. Stack deleted from binary search tree, it is re-
B. Double Ended Queue(Deque) placed by its
C. Queue A. Pre-order predecessor
D. Strings B. In-order predecessor
C. in-order successor
499. Hashing gives each item
D. Post-order successor
A. A sequential address
B. A logarithmic address 505. The keys like M, S, G, H, B, V, W, T are
C. No address inserted into B-tree of order 5. The COR-
RECT option is
D. A unique address
A. Leaf node is split, when key B is in-
500. Data Structures is about rendering data serted
elements in terms of some relationship, for B. Leaf node is split, when key G is in-
better organization and storage. serted
A. True C. Leaf node is split, and B goes to root
B. False node
C. Maybe D. Leaf node is split, and G goes to root
D. None of the above node
501. What is the output of the following? True 506. Example of non linear data structure
= Falsewhile True:print(True) A. array
A. True B. tree
A. It removes the indices from data frame 522. The concatenation of two list can per-
formed in O(1) time. Which of the follow-
B. It replaces index number instead of ing variation of linked list can be used?
name A. Singly linked list
C. It replaces index names instead of B. Doubly linked list
numbers C. Circular doubly linked list
D. It removes all records from data frame D. Array implementation of list
NARAYAN CHANGDER
518. What are the advantages of arrays? 523. A collection of records of the entities in a
A. Objects of mixed data types can be given entity set.
stored A. File
B. Elements in an array cannot be sorted B. Entity Set
C. Field
C. Index of first element of an array is 1 D. Record
D. Easier to store elements of same data
524. Which game doesn’t use 2-D arrays?
type
A. Minecraft
519. What would a dynamic data structure en-
B. Battleships
tail?
C. Snake
A. Memory is allocated to the data struc-
ture as the program executes. D. Snakes and Ladders
B. Memory is allocated to the data struc- 525. Which one is the best variable name to
ture at compile time. use?
C. The size of the structure is fixed A. fullName
D. The data structure can also double as B. FULLname
TNT C. Full Name
520. What is the output of the code shown be- D. full name
low? l1=[1, 2, 3]l2=[4, 5, 6][x*y for x in
526. Which of the following is NOT an advan-
l1 for y in l2]
tage of a serial search?
A. a) [4, 8, 12, 5, 10, 15, 6, 12, 18]
A. It can be used on any set of data re-
B. [18, 12, 6, 15, 10, 5, 12, 8, 4] gardless of type
C. [4, 5, 6, 8, 10, 12, 12, 15, 18] B. It is the quickest search to use
D. [4, 10, 18] C. It is a simple algorithm, so it is easy to
write a computer program to carry it out
521. Graphs are represented using
D. none of above
A. Adjacency tree
527. What is the maximum number of possible
B. Adjacency linked list
non zero values in an adjacency matrix of
C. Adjacency graph a simple graph with n vertices?
D. Adjacency queue A. (n*(n+1))/2
A. 1 D. none of above
D. MAX-1 A. Search
B. Insert
529. of a node is the number of edges leav-
ing that node. C. Delete
A. in-degree D. Edit
B. out-degree 535. What is a tuple?
C. inout-degree A. A data value which can be modified.
D. none of above B. A data value which cannot be modified.
530. Process of inserting an element in stack
is called C. An immutable data structure that con-
tains related elements.
A. Insert
D. A data structure that can only hold 3
B. Pop
elements.
C. Overflow
536. What kind of data structure is user
D. Push
data in the following declaration? user
531. It is an operation that accesses the top of data = (”TJ”, 24, “artLover123”)
the stack A. Tuple
A. Peek B. List
B. Pop C. String
C. Push D. 2d List
D. None of the above
537. Which of the following operation will ac-
532. operation removes the element from cess each data item exactly once so that it
the top of the stack. can be processed?
A. push A. Insertion
B. pop B. Traversal
C. update C. Sorting
D. none of the above D. none of above
NARAYAN CHANGDER
D. 6 C. Purple
539. TREE[1]=NULL indicates is D. none of above
A. Overflow 545. Data in the data structures are processed
B. Empty by operations like insertion, deletion, sort-
ing, merging and
C. Underflow
A. Traversing
D. Full
B. Searching
540. Which of the following is not an attribute C. Retrieval
of an ordered factor? D. Both A and B
A. levels
546. Identify the correct sequence of sorting
B. class algorithms w.r.t their sorting time (in-
C. order creasing order of time taken)
D. none of above A. Insertion sort, Shell sort, Bubble sort
B. Bubble sort, Insertion sort, Shell sort
541. In Singly linked list last node address part
C. Shell sort, Insertion sort, Bubble sort
contains
D. Insertion sort, Bubble sort, Shell sort
A. NULL
547. The output of the code below is
B. FULL
stack.push(10);stack.push(15);stack.push(20);stack.push(39)
C. data .pop()stack.push(35);System.out.println(stack.peek());
D. none of above
A. 20
542. What is the postfix expression for the in-
fix expression:a-b-c? B. 35
A. a-b-c C. 39
D. 10
B. ab-c-
C. abc 548. How many steps needed to sort the fol-
lowing numbers using a selection sort. 5
D. -ab-c 1 12-5 16 2 12 14
543. An algorithm should have 0 or more well- A. 8
defined B. 6
A. Unambigous C. 7
B. Input D. 5
560. What does “packing” refer to in 565. Which one of the following node is con-
Python? sidered the top of the stack if the stack is
A. Creating a list implemented using the linked list?
A. First node
B. Initializing variables using values from
a list B. Second node
C. Storing multiple variables’ values by C. Third node
putting them in a collection, like a list or D. none of the above
NARAYAN CHANGDER
tuple
566. What is meant by collision in Hash Func-
D. Cramming as many commands as pos-
tions?
sible onto a single line
A. When 2 values use the same hash key
561. A Queue can only store 6 data items. The
B. When 1 or more values use the same
Queue is sent 4 data items:Bert, Cynthia,
hash key
Cedric and Albert. Where does the “Front”
pointer point? C. When there is not enough room in RAM
A. 0
D. When the data bumps into each other
B. 1
C. 2 567. sum(c(TRUE, FALSE, TRUE, TRUE))> 3
This is known as
D. 3
A. Vectorisation
562. BFS follow B. Recycling
A. first in last out C. Implicit coercion
B. first in first out D. Attributes
C. last in first out
568. The algorithm implemented in a stack is?
D. none of above
A. FIFO-the first element must come out
563. In Linked list the node that contains first from the list
the address of the first node is actually the B. WIFI-the worst element must be the
last node of the linked list. first to come in to the list
A. singly C. LIFO-the last element must be the first
B. doubly to come out from the list
581. Elements in an array are accessed 586. A data structure that has data located
A. randomly with a key is called a
B. Sequentially A. Dictionary
C. Exponentially B. List
D. Logarithmically C. Queue
D. Spreadsheet
582. Which of the following operator can be
NARAYAN CHANGDER
used to access value at address stored in
587. What is the output of the code shown
a pointer variable?
below? L=list(’HELLO’)p=L[0], L[-1],
A. * L[1:3]’a={0}, b={1}, c={2}’.format(*p)
B. & A. Error
C. → B. a=’H’, b=’O’, c=[’E’, L’]
D. . C. a=’H’, b=’E’, c=[’L’, L’, ‘O’]
583. Choose correct output for the following D. a=’H’, b=’E’, c=’L’
sequence of operations.push(5)push(8)poppush(2)push(5)poppoppoppush(1)pop
588. Which of the following is not a valid ar-
ray?
A. 85251
A. names=(”Tom”, “Ali”, “22”, “Con-
B. 85521
nie”)
C. 82551
B. scores=(2, 3, 5, 4, 2, 1)
D. 81255
C. names=(”Tom”, “Ali”, 22, “Connie”)
584. Determine the output:#include D. none of above
<stdio.h>int main(){ char a[] =”C Program-
ming”; char* p = & a; printf(”%s”, p+2 589. Data Structure is a way of collecting and
);} data in such a way that we can per-
A. C Programming form operations on these data in an effec-
tive way.
B. CProgramming
C. Programming A. collecting
D. rogramming B. organizing
C. performing
585. Consider the following operation
performed on a stack of size D. structure
5.Push(1);Pop();Push(2);Push(3);Pop();Push(4);Pop();Pop();Push(5);After
the completion of all operation, the num- 590. This data types can only hold whole num-
ber of elements present in stack are ber values.
A. 1 A. int
B. 2 B. double
C. 3 C. String
D. 4 D. char
591. Which of the following data structures 596. Identify the types of sorting that used
can be used for parentheses matching? the concept of divide and conquer.
594. What is the number of vertices of degree 599. What is the output of C Program? #in-
2 in a path graph having n vertices, here clude<stdio.h>void main(){ int *ptr, a=10;
n>2. ptr = & a; *ptr += 1; printf(”%d, %d”,
*ptr, a);}
A. n
A. 10, 11
B. n-2
B. 11, 11
C. 0
C. 11, 10
D. 2
D. 10, 10
595. The following are main components of the
hash data structures except: 600. Recursive problems are implemented by
A. Hash value A. stack
B. Hash function B. queue
C. Key C. linked list
D. Linked lists D. strings
601. A data structure that has a liner relation- 607. Which is not a type of a data structure?
ship
A. Linked List
A. Non-Linear Data Structure
B. Trees
B. Liner Data Structure
C. Linear Data C. Array
D. Linear Relationship Data D. None of the above
602. Which subject are u studying now
NARAYAN CHANGDER
608. operation changes the value of ele-
A. c ment given by user of the stack.
B. python A. push
C. c++ and data structures
B. pop
D. none of above
C. peep
603. If node N is a terminal node in a binary
tree then its D. update
A. Right tree is empty
609. This structure uses a pointer to link
B. Left tree is empty nodes.
C. Both left & right sub trees are empty
A. Variable
D. Root node is empty
B. Link List
604. Which of the following is a disadvantage
of a linked list? C. Pointer
A. Efficient Memory Utilization D. Trees
B. Not cache friendly
610. A list of elements in which enqueue op-
C. Dynamic Data Structure
eration takes place from one end, and de-
D. Insertion and Deletion Operations are queue operation takes place from one end
Easier is
605. Which of the following is an infix expres- A. Stack
sion?
B. Binary Search Tree
A. (a+b)*(c+d)
B. ab+c* C. Graph
C. +ab D. Queue
D. abc+*
611. A Kind of tree where every node in a tree
606. In the following code, i is a/an ? i= can have at most two children.
(2)
A. Binary Tree
A. String
B. Binary Expression Tree
B. Tuple
C. Int C. Tree
D. Boolean D. Binary Search Tree
612. Select the correct tree traversal method 617. Circular Queue is also known as
for the following description:Left Subtree- A. Ring Buffer
Right Subtree-Root
NARAYAN CHANGDER
623. In terms of an array, what is an index? B. A and X
A. A value which points to a data element C. F and X
in an array D. A, F and X
B. The first element in an array
629. Weighted graph
C. A list of all the elements in an array
A. a graph that has a data value labelled
D. none of above on each edge.
624. In notation, the operator is placed be- B. The underlying mathematical princi-
tween the operands. ples behind the use of graphs.
A. infix C. An object in a graph. Also know as a
node (vertices is the plural).
B. prefix
D. A join (relationship) between two
C. postfix
nodes-sometimes called an edge.
D. none of above
630. Which of the following is not an inherent
625. In C programming language, which of the application of stack?
following type of operators have the high-
A. Implementation of recursion
est precedence?
B. Evaluation of a postfix expression
A. Relational operators
C. Job scheduling
B. Equality operators
D. Reverse a string
C. Logical operators
D. Arithmetic operators 631. operation returns the value of the
topmost element of the stack.
626. How do you iterate through a HashMap
A. push
using a for each loop?
B. pop
A. for each (String key:map.keySet()) {}
B. for each (String key:map) {} C. peep
NARAYAN CHANGDER
645. removal of items is from the top ture.
A. Push B. The Array shows a hierarchical struc-
ture.
B. Pop
C. The Array is not a data structure
C. Peek
D. Container that stores the elements of
D. None of the above similar types
646. Which is an abstract data type that 651. A collection of field values of a given en-
serves a collection of elements called push tity
and pop?
A. Attribute and Entity
A. Queue
B. Entity Set
B. Stack
C. Field
C. Array
D. Record
D. none of above
652. Every stack has a variable associated
647. A linked list contains a pointer variable with it.
called , which stores address of first
A. TOP
node in the list.
B. BOT
A. LAST
C. POT
B. START
D. none of the above
C. MIDDLE
D. all of above 653. In algorithm assignment operation is per-
formed using the symbol
648. With a data set of 0, 1, 3, 6, 7, 8, 9How A. =
many steps would a binary search take to
find the value 8? B. :=
C. ++
A. 2
D. ==
B. 4
C. 3 654. . An edge of a graph which joins a node
to itself is called
D. 7
A. node
649. Algorithm should be clear and Each B. loop
of its steps (or phases), and their in-
puts/outputs should be clear and must C. tree
lead to only one meaning D. none of above
665. In linked list implementation of a queue, 671. The height of a tree is the length of the
where does a new element be inserted? longest root-to-leaf path in it. The max-
A. At the head of link list imum and minimum number ofnodes in a
binary tree of height 4 are
B. At the centre position in the link list
A. 31 and 5
C. At the tail of the link list
B. 32 and 5
D. None of the mentioned
C. 15 and 5
666. Algorithm is a procedure.
NARAYAN CHANGDER
D. 15 and 4
A. shortcut
B. function 672. is very useful in situation when data
have to stored and then retrieved in re-
C. reverse
verse order.
D. step by step
A. Stack
667. In the stack process of inserting an ele- B. Queue
ment in the stack is called as
C. List
A. Create
D. Link list
B. Evaluation
C. Push 673. What is a weighted graph?
D. Pop A. A graph that holds values between
nodes
668. What does a linked list use to store it’s
data? B. A heavy graph
A. Module C. A graph that holds many nodes
B. Node D. A graph that holds many edges
C. Array 674. What would the following program print
D. Step to the screen when run? my list
= [7, 0, 0, “d”, “n”, “o”, “B”]my
669. Which one of the below mentioned is lin- list.reverse()for thing in my
ear data structure? list:print(thing)
A. Queue A. 700dnoB
B. Stack
B. 007Bond
C. Arrays
C. Bond007
D. All of the above
D. 700donB
670. Which loop is most suitable to first per-
form the operation and then test thecondi- 675. In data structure, the data items are
tion? arranged in a linear sequence.
A. while loop A. linear
B. for loop B. non linear
C. do while loop C. both a and b
D. All of the mentioned D. all of above
676. It is consider an inventory of 1 mil- 681. In data structures all elements may
lion(106) items of a store. If the applica- or may not be of same type.
tion is to search an item, it has to search
C. (8, 3) A. Finiteness
D. (3, 8) B. Ambiguous
NARAYAN CHANGDER
687. Which of the following is/are the levels C. Dependent
of implementation of data structure D. Impossible
A. Abstract level
693. Given an undirected graph G with V ver-
B. Application level tices and E edges, the sum of the degrees
C. Implementation level of all vertices is
D. All of the above A. 2E
688. Which data structure allows deleting B. 2V
data elements from and inserting at rear? C. E
A. Stacks D. V
B. Queues
C. Dequeues 694. Finite set of instructions that specify a se-
quence of operations to be carried out
D. Binary search tree
A. Algorithms
689. What would be the Prefix notation for
B. Procedure
the given equation:A+(B*C)
A. +A*CB C. Flowcharting
B. *B+AC D. Pseudocodes
C. +A*BC 695. Traversing each and every record exactly
D. *A+CB once is called
697. What will be the output of the following B. Giving chance to each player in a multi
C code? #include <stdio.h>void main(){int player game
x = 5;if (x < 1)printf(”hello”);if (x ==
A. Stack C. Factor
B. Queue D. Integer
NARAYAN CHANGDER
709. It refers to collection of variables, pos- C. 000000345
sibly of several different data types con- D. 345000000
nected in various ways.
715. You have to sort 1 GB of data with only
A. Data Structures
100 MB of available main memory. Which
B. Database sorting technique will be most appropri-
C. Arrays ate?
D. Abstraction A. Heap Sort
B. Merge Sort
710. In type of linked lists we can traverse
in both the directions. C. Quick Sort
A. Singly linked list D. All of the above
B. Circular linked list 716. What will strcmp() function do?
C. One dimensional linked list A. compares the first n characters of the
D. Doubly linked list object
B. compares the string
711. Can boolean values be stored in an
python array? C. find the length of the string
C. Index of the first element starts from 735. Which of the following is an example of
1. a FIFO data structure?
D. Elements of an array cannot be sorted A. Stack
730. Select the correct tree traversal method B. Array
for the following description:Left Subtree- C. Queue
Root-Right Subtree D. Linked List
A. Pre-Order
736. How do you add an element to a
NARAYAN CHANGDER
B. In-Order HashMap with String keys and Integer val-
C. Post-Order ues?
D. none of above A. map.put(Stuff, 123);
731. Which of the following algorithms can B. map.add(”Stuff”, 123);
be used to most efficiently determine the C. map.put(”Stuff”, 123);
presence of a cycle in a given graph? D. map.add(Stuff, 123);
A. BFT
737. The addition of two vectors results in
B. Prim’s Minimum Spanning Tree Algo-
rithm A. a new vector with each relative compo-
nent summed into one
C. Kruskal’s Minimum Spanning Tree Al-
gorithm B. a new vector with all components
summed into one number
D. DFT
C. two new vectors with some compo-
732. is an operation in arrays that allows nents switched
us to add an element from the array. D. a super vector with each component
A. Delete multiplied by it’s square
B. Edit 738. The step-by-step procedure unambiguous
C. Insert instructions to solve a given problem.
D. Search A. Data Structure
751. If the elements “A”, “B”, “D” and “C” B. Stack entries may be compared with
are placed in a stack and are deleted one the ‘<‘ operation
at a time, in what order will they be re- C. The entries are stored in a linked list
moved?
D. There is a Sequential entry that is one
A. ABCD by one
B. ABDC 753. Linked list data structure offers consider-
C. CDBA able saving in
NARAYAN CHANGDER
A. Computational Time
D. DCAB
B. Space Utilization
752. Entries in a stack are “ordered”. What C. Space Utilization and Computational
is the meaning of this statement? Time
A. A collection of stacks is sortable D. None of the mentioned
1.5 Algorithms
1. Any user should be able to perform an Al- A. following steps exactly as they’re writ-
gorithm without any problems, that means ten.
it should be B. coming up with a unique solution that
A. Doable works sometimes.
B. Understandable C. making a solution more efficient.
C. Infinite D. making an interface using prior knowl-
edge.
D. Precise
5. Using a flow chart to plan a program is
2. A Binary search is what? known as
A. The list is split into two and repeated A. decomposition
B. The list is either right or wrong B. abstraction
C. You are forced to guess the value C. planning
D. An Algorithm that give you directions D. programming
3. The files x1, x2, x3 are 3 files of length 6. OUTPUT and can be used interchange-
30, 20, 10 records each. What is the opti- ably by programmers. They mean the
mal merge pattern value? same thing and perform the same opera-
A. 110 tions. It usually depends on a person’s
preference as to which one they decide to
B. 90 use.
C. 60 A. BEGIN
D. 50 B. START
7. What is the purpose of a rectangle within 12. The following two lists are to be merged,
a flowchart? which element first goes into thenew
merged list? List 1:2 4 8 9List 2:1 6 8
D. Sequence A. IF
B. THEN
18. Which of the following routing algorithms
can be used for network layer design? C. ELSE
A. shortest path algorithm D. none of above
NARAYAN CHANGDER
B. distance vector routing 24. What algorithm do we use when we’re
C. link state routing making a cake?
D. all of the mentioned A. A set of directions
28. What is an Algorithm? 33. What must be true before performing a bi-
A. A chart showing the flow of a series of nary search?
30. Which of the following is not a least cost 35. Which of the following contains an INCOR-
algorithm? RECT sequence when getting dressed to go
out?
A. Distance vector
A. Put on socks, put on shoes, put on coat
B. Link state
C. Path vector
B. Put on coat, put on shoes, put on socks
D. All the mentioned
31. Why is selection important? C. Put on socks, put on coat, put on shoes
A. Selection allows us to include more
than one path through a solution D. none of above
B. Selection allows us to repeat steps in
36. What is a flowchart?
a solution
A. A text-based way of designing an algo-
C. Selection allows us make our solution
rithm
more efficient
D. none of above B. A specific programming language
C. A diagram that represents a set of in-
32. What is meant by the time complexity of structions
an algorithm?
D. A bullet point list of instructions
A. The amount of time required to solve a
particular problem 37. A BINARY SEARCH looks through a list
B. How difficult a problem is to solve named studentList finds an what it was
searching for in the first spot it looked.
C. How many lines of code are required
Where was it?
to solve a problem
D. How quickly a solution can be devel- A. at index 0
oped B. at index studentList.length / 2
NARAYAN CHANGDER
C. 2 D. Syntax
D. 3 44. A section of flowchart that repeats is
known as a
39. What is the missing part of this
Algorithm:Input-Process-? A. loop
A. Sequence B. wait
C. decision
B. Output
D. input / output
C. Abstract
D. Iteration 45. Suppose we have a sorted list with n ele-
ments. We decide to perform an insertion
40. Which of the following algorithmic efficien- sort on this already sorted set. How many
cies would be considered LEAST efficient? comparisons will the sort make?
A. Linear A. n-1
B. Constant B. n
C. Polynomial C. n (n-1)
D. Exponential D. n + 1
48. Why do we need to think computation- 53. To repeat until a particular condition is true
ally? use
NARAYAN CHANGDER
information to reduce complexity solved
70. What is a sequence 75. A “defined set of steps that can be used
A. Putting and executing instructions in to complete a task”. Usually related to
computers
D. Command B. ELSE
C. THEN
73. Link state routing uses algorithm.
D. none of above
A. Quick Sort Algorithm
B. Floyd Warshall Algorithm 78. switching a process stores state into PCB
and restore a state of different process is
C. Bellman Ford
called as
D. Dijkstra’s
A. Dispatching
74. A sorted list of numbers contains 200 ele- B. context switching
ments. Which of the following is closest to
the maximum number of list elements that C. demand paging
will need to be examined when performing D. page fault
a binary search for a particular value in the
list? 79. What symbol do flowcharts begin with?
A. 5 A. oval
B. 8 B. parallelogram
C. 100 C. rectangle
D. 200 D. diamond
80. Which algorithm is defined in Time quan- C. A logical way of getting from the prob-
tum? lem to the solution.
A. shortest job scheduling algorithm D. none of above
B. round robin scheduling algorithm
86. An algorithm asks a user to enter their age,
C. priority scheduling algorithm
the age is read into the system and the sys-
D. multilevel queue scheduling algorithm tem outputs a ‘Thank You’ message. This
is an example of which of the algorithm
81. What is decomposition?
NARAYAN CHANGDER
construct?
A. Searches the computer’s memory for
data A. Decision (Selection)
B. Repeats a program B. Loop (Iteration)
C. Getting small part of a problem and C. Order (Sequence)
adding them together
D. All of the above
D. Breaking down a complex problem
87. The following list is to be sorted using a
82. Big Ω defines
bubble sort:12 6 8 1 3What will the list
A. lower bound look like after the first iteration through
B. upper bound the list?
C. middle bound A. 6 8 1 3 12
D. none of the above B. 6 12 1 8 3
83. A control structure in which each step is C. 1 3 6 8 12
carried out in order of its position.
D. 6 8 1 12 3
A. Binary Selection
B. Flowchart 88. What is space complexity?
C. Sequence A. The space complexity is the amount of
D. Case Selection storage space an algorithm takes up
84. Case statements can be used in some lan- B. How many times a certain number
guages instead of: (base) is multiplied together to reach an-
other number.
A. a nested if
C. An algorithm is a series of steps that
B. a combined if
complete a task
C. a multiple if
D. none of above
D. a sequence if
85. Which of the following best describes de- 89. Decides if a string only contains numbers
composition? A. isalpha()
A. Removing all of the unimportant bits of B. isnumeric()
a problem.
C. int()
B. Breaking the problem down into man-
ageable chunks. D. string()
NARAYAN CHANGDER
A. Merge
wrong?
B. Bubble
A. The algorithm may be overly long
C. Insertion
B. The algorithm may be inefficient
D. None of them do
C. The algorithm may produce unex-
pected results 108. On a flowchart, a decision will always
D. none of above have:
A. Two exit arrows
103. What symbol shows a decision?
B. One exit arrow
A. oval
C. Three exit arrows
B. parallelogram
D. Four exit arrows
C. rectangle
D. diamond 109. In computer programming, what is a
‘loop’?
104. Why is a “divide-and-conquer” search A. Something that is used to end a pro-
more efficient than a linear search gram
A. You only look at half the data set B. Something that is continually repeated
B. You eliminate half the data set with until a certain condition is reached
each iteration C. Something that tells a program what to
C. You have to search all the values do
D. It is less efficient with large data sets D. Something that is required to load a
program
105. What will the output be from the follow-
ing code? print(”Hello world!” * 2) 110. Code executed based on a condition being
A. TypeError true
114. Algorithms are made up of 3 processes: 119. is used to denote when a user has to
give something to a program.
A. Sequence, Selection and Rules
A. WRITE
B. Control Flow, Conditionals and Repeat
Functions B. OUTPUT
115. In priority scheduling algorithm 120. Linear Search is faster than Binary
search
A. CPU is allocated to the process with
highest priority A. TRUE
B. CPU is allocated to the process with B. FALSE
lowest priority C. It depends on the scenario
C. Equal priority processes can not be D. none of above
scheduled
D. None of the mentioned 121. What shape represents the start and end
of a flowchart
116. The interval from the time of submission
A. Oval
of a process to the time of completion is
termed as B. Rectangle
A. waiting time C. Diamond
B. turnaround time D. Square
NARAYAN CHANGDER
C. Boolean
rithm?
D. none of above
A. Strict/Bossy Wording
B. First-person tense 129. Which of the following would represent
an input in a flow chart?
C. Confidence
A. Put teabag in cup
D. Informal Speach
B. Drink tea
124. How do we represent the complexity of
C. Wait for water to boil
an algorithm?
D. Is water boiled?
A. Big-R
B. Big-O 130. A symbol that automatically performs an
C. Big-N action in a flow chart is known as a
D. Big-A A. sequence
B. input / output
125. What is a Greedy strategy for Optimal
storage on tape C. decision
A. Arrange all programs in decreasing or- D. wait
der of length
131. What is computational thinking?
B. Arrange all programs in First in first
come basis A. It allows you to break down a large /
complex problem into smaller parts.
C. Arrange all programs in increasing or-
der of length B. It is thinking like a robot
133. How do you determine the cost of a span- 138. Distance vector algorithm uses equa-
ning tree? tion to find the least cost route.
A. Euclid
145. When your programming is achieving A. Removing all of the unimportant bits of
a problem.
NARAYAN CHANGDER
some desired outcome while minimizing
wasted effort or resources, we would say B. Breaking the problem down into man-
that its: ageable chunks.
A. Top Notch C. A logical way of getting from the prob-
lem to the solution.
B. Comparable
D. none of above
C. Efficient
D. Problematic 151. A string is a data type that contains
A. numbers
146. The Table used to organize the elements
needed to build a solution is called B. text (words or characters)
A. Input Process Output Table C. True
B. In And Out Table D. False
C. Algorithm 152. A variable that can hold a collection of
D. Problem Solving Table values, often called an array in other pro-
gramming languages
147. The two main types of programming
A. list
methodologies are:
B. int
A. Procedural & OOP
C. string
B. Selection & OOP
D. constant
C. OOP & Iterative
D. Procedural & Iterative 153. Every algorithm can be constructed on us-
ing:
148. What is sequencing? A. Sequencing
A. The order in which steps are carried B. Selection
out in an algorithm
C. Iteration
B. The order in which we think computa-
tionally D. Questions
C. The process of repeating a number of 154. What does the parallelogram represent
steps in an algorithm in a flowchart?
D. none of above A. Decision
166. When a computer is performing the in- 171. first name is and example of what
structions contained in a program, it is commonly used way to name a variable
called: A. camelcase
A. Debugging B. snakecase
B. Compiling C. linecase
C. Assembling D. hillcase
D. Executing
NARAYAN CHANGDER
172. Which of the following sorting algorithms
use recursion?
167. Which of the following is an example of
a simple (atomic) variable? A. Selection Sort
B. Insertion Sort
A. score = 7
C. Mergesort
B. name = “Jack”
D. none of above
C. scores = [4, 2, 12, 7]
D. grades = [”A”, “F”, “B”] 173. What does a rectangle represent in a
flowchart?
168. The committee wrote a report, ex- A. Input/Output
tolling only the strengths of the proposal B. Process
A. reasonable C. Start/End
B. supportive D. Display
C. biased 174. In the exam all instructions / commands
D. fragmented should be written in:
A. Upper Case
169. Joining elements together to make a
string is called what? B. Lower Case
B. Checking which path to take through 181. To repeat a fixed number of times use a
the solution A. while loop
187. Fractional knapsack is based on 193. firstName is and example of what com-
method monly used way to name a variable
A. Greedy A. camelcase
B. Branch and Bound B. snakecase
C. Dynamic Programming
C. linecase
D. Divide and Conquer
D. hillcase
188. What is the correct symbol for an input
NARAYAN CHANGDER
in a flowchart? 194. A piece of code that you can easily call
over and over again. Sometimes called
A. A diamon
procedures.
B. A square
A. digital footprint
C. A parallelogram
B. run program
D. A rectangle
C. abstraction
189. How many searches would take place for
an array containing 50 data items (worst D. function
case) using a linear search algorithm
195. What is the main disadvantage of a bi-
A. 50 nary search compared to a linear search?
B. 1
A. It requires the data to be in order
C. 6
B. It requires more memory
D. 19
C. It does not execute as quickly with
190. Which algorithm must start with an or- larger data sets
dered list/array?
D. Not all CPUs are capable of executing
A. linear the algorithm
B. binary
196. An is a precise, step by step set of
C. bubble
instructions to perform a specific task.
D. merge
A. task
191. What does OOP stand for?
B. sequence
A. Object Orientated Programming
C. sub-tasks
B. Order Orientated Programming
D. algorithm
C. Objective Order Programming
D. Objective Orientated Programming 197. WHILE loops are
192. when can algorithms be used A. loops which run an unknown number
of times
A. Any time to design solutions to prob-
lems B. loops which run for a specific number
B. Only with computers of times
C. Only when programming C. the same as if statements
D. Only with flowcharts D. not part of programming
198. Why is sequencing important? A. write a tv show without pen and paper
A. To ensure the algorithm is kept to a
NARAYAN CHANGDER
B. wait bread.
C. decision C. An algorithm is a software used to
D. input / output compute numbers.
D. An algorithm is the process of break-
210. What does the following code do? ing problems.
myAge = int (myAge)
A. Converts the var (variable) myAge to a 215. What are the two main ways that algo-
string rithms can be designed?
219. If you want more than one option for 224. What is a counter used for in iteration?
your code, what do you use (after if)? A. To keep track of how many different
230. Which of the algorithm allows the send- 236. A loop that is carried out a set number of
ing host to impose policy on route? times
A. link state A. Count controlled
B. distance vector B. Condition controlled
C. path vector
C. Infinite
D. all the mentioned
D. Array
231. What is logical reasoning?
NARAYAN CHANGDER
237. An algorithm is only as good as the infor-
A. Counting rules in an algorithm
mation it acts upon hence the phrase:
B. Using steps to solve problems
A. Don’t count your chickens before they
C. Using rules to solve problems hatch
D. none of above
B. Measure twice, cut once
232. If one would like to read through a large C. Garbage in, garbage out
list of names and read every name on the
list, which big O notation would you use? D. Computers do exactly what you tell
them
A. O(log n)
B. O(n) 238. Define ABSTRACTION
C. O(nlog n) A. Breaking a task into smaller tasks.
D. O(n!) B. Drawing a map to show how to reach
233. Which type of loop runs a set number of a destination.
times? C. Creating step by step instructions.
A. Indefinite D. Focusing on what is important and ig-
B. While noring what is unnecessary.
C. Infinite
239. Examples of O(1) algorithms are
D. For
A. Multiplying two numbers.
234. Find the slowest algorithm:
B. assigning some value to a variable
A. O(n)
C. displaying some integer on console
B. O(n2 )
D. All of the above
C. O(n!)
D. O(2n ) 240. Given this array:1, 2, 4, 5, 6, 7, 8, 12,
14, 21, 22, 42, 53How many comparisons
235. Consider this list of numbers L:3 4 5 6 7
are required to find 42 using the Binary
8 9. Which number would be checked first
Search?
in a binary search?
A. 3
A. 6
B. 3 B. 2
C. 9 C. 10
D. 4 D. 5
NARAYAN CHANGDER
flowcharts 256. What do we mean by COMPUTATIONAL
THINKING?
A. Square
A. Understanding a complex problem and
B. Triangle developing possible solutions.
C. Diamond B. Breaking a task into smaller tasks.
D. Circle C. Selecting a computer to use.
252. Which of the following BEST declares a D. Focusing on what is important, ignor-
variable for storing the number of items ing what is unnecessary.
purchased from a user?
257. When can algorithms be used?
A. Number of items Purchased
A. Only with computers
B. numberofitemspurchased B. Only when programming
C. noofitem C. Only with flowcharts
D. no of item D. Any time to design solutions to prob-
lems
253. Quick sort running time depends on the
selection of 258. What does an algorithm have to do with
A. Size of array processing?
B. Pivot element A. Algorithms are the steps that change
it from input to an output
C. Sequence of values
B. Algorithms have nothing to do with pro-
D. None of the above cessing
254. Merge Sort is? C. Algorithms are the steps that change
it from output to input
A. When a list is kept as one and com-
pared D. Algorithms are a series of steps
B. List is split into 2 and merged together 259. Which sorting algorithm is described
by:moving through a list repeatedly,
C. List is split into 2 and kept seperate swapping elements that are in the wrong
order.
D. Nothing
A. Merge
255. The following is pseudocode for which al- B. Bubble
gorithm? look at middle of arrayif element
you’re looking for return trueelse if ele- C. Insertion
ment is to left search left half of arrayelse D. None of these
260. The following is pseudocode for which al- 265. A whole number such as 7 is stored as
gorithm? Repeat, starting at the first el-
ement:If the first element is what you’re
A. linear C. a boolean
B. binary D. a string
B. run when an “if” condition is false 269. A model in which programs run in order,
one command at a time.
C. run every time an “if” statement runs
A. Linear Search
D. do not need an “if” statement
B. Binary Search
264. Which python operator means ‘less than C. Unreasonable Time
or equal to’?
D. Sequential Computing
A. >=
270. In a flowchart how are symbols con-
B. >
nected?
C. <
A. Symbols do not get connected together
D. <= in a flowchart
B. With lines and an arrow to show the 276. Which sorting algorithm takes an item
direction of flow from the list, and puts it in the correct
C. With dashed lines and numbers place in a sorted list?
A. Merge
D. With solid lines to link events
B. Bubble
271. What is the function of the router? C. Insertion
A. converting the data from one format to D. None of them do
another
NARAYAN CHANGDER
277. A concrete step is an algorithmic step
B. Forward the packet to the up links
where
C. error detection in data
A. All the details are specified.
D. None of the above B. Some details details are unspecified.
272. An Algorithm asks the user to enter their C. There is a top down design.
scores for 5 different tests. This is an D. Details are object orientated.
example of which of the algorithm con-
structs? 278. What is a flowchart symbol?
A. Decision (Selection) A. Specific shape used to create a visual
representation of the program
B. Loop (Iteration)
B. It is a directional symbol for traffic
C. Order (Sequence)
C. it shows a connection
D. All of the above
D. words that flow with the chart
273. What does this pseudocode do? print 279. Which option is a searching algorithm
“Hello”
A. Bubble
A. Nothing
B. Linear
B. Prints the word “Hello” to the output C. Merge
C. hello is print in pseudocode D. none of above
D. The code won’t work
280. Algorithms can be designed using
274. Which of these is a way can you repre- A. A pie chart.
sent and algorithm? B. A bar graph.
A. Code C. Use case diagrams.
B. List D. Flowcharts and Pseudo codes.
C. Pseudocode
281. Which correctly illustrates the structure
D. Shapes of a pseudocode algorithm?
292. Flowcharts are from 297. How are symbols connected together in a
flowchart?
A. Left
A. Symbols do not get connected together
B. Right
in a flowchart
C. Bottom
B. With lines and an arrow to show the
D. Top to bottom direction of flow
NARAYAN CHANGDER
gorithm used by computer systems? D. none of above
A. Linear search
298. Describe an advantage of a linear search
B. Bubble search algorithm
C. Open search A. Data does not need to be in order.
D. none of above B. Performs well over large ordered lists.
B. List is split in two and merged together 300. Which sorting algorithm splits a list of
in order items into individual lists?
C. List is split into 2 and kept seperate A. Merge
D. None of the above B. Bubble
302. The second part of if, that is executed 307. Algorithm is problem solving pro-
when the condition is false cess.
NARAYAN CHANGDER
C. END 319. Putting commands in correct order so
D. ELSE computers can read the commands is
A. algorithms
314. A simple way of describing a set of in-
structions that does not have to use spe- B. selection
cific syntax is called:
C. sequencing
A. Flow Chart
D. none of above
B. Pseudocode
C. Shapes 320. What is the purpose of a diamond in a
D. none of above flowchart?
C. Blocks C. Ni
D. Scripts D. Pie
323. Given this array:1, 2, 4, 5, 6, 7, 8, 12, 328. The time used to complete a task sequen-
14, 21, 22, 42, 53How many comparisons tially divided by the time to complete a
are required to find 42 using the Linear task in parallel
325. In Python, the output is made using the 330. Which one of these is floor division?
command A. /
A. display() B. //
B. print() C. %
C. show() D. None of the mentioned
D. see
331. Which sorting algorithm is described by
326. The following lists represent 3 passes of taking each item in turn, compare it to the
a sorting algorithm. Which algorithm is be- items in the sorted list and place it in the
ing used to sort the list? 4 5 9 6 2 72 5 9 ordered position in the sorted list?
6 4 72 4 9 6 5 72 4 5 6 9 7 A. Merge
A. Bubble Sort B. Bubble
B. Selection Sort C. Insertion
C. Insertion Sort D. None of the above
D. none of above 332. Define DECOMPOSITION
327. A program is designed to accept the name A. Breaking a task into smaller tasks.
and price of an item and calculate the total B. Looking for similarities and trends.
price including GCT of 16.5%.What vari-
ables can be used to store the input from C. A sequence of instructions.
the user? D. Focusing on what is important and ig-
A. name, price, totalprice noring what is unnecessary.
B. price and GCT 333. What is Pseudocode used for?
C. name, price, GCT A. For testing a program.
D. name and price B. For coding a program.
334. What is syntax? 339. Which of the algorithm uses the concept
of best spanning tree?
A. Syntax is the word used to describe an
error A. Path vector
B. Syntax is the rules of the programming B. distance vector
language C. link state
NARAYAN CHANGDER
C. It is used to read information D. none of the mentioned
D. It is used to output information 340. You are required to design an algorithm
to calculate the pay for an artiste. The
335. The process carried out in computer sys-
pay is top rate for most popular artiste
tems is represented by in flowchart.
otherwise is at normal rate. Which one
A. Rectangle of the following control structures should
B. parallelogram you use?
C. Square A. Iteration.
D. Diamond B. Repetition.
C. Selection.
336. The following lists represent 3 passes of
D. Sequence.
a sorting algorithm. Which algorithm is be-
ing used to sort the list? 4 8 6 2 5 7 4 8 341. The breaking down of a system into
6257468257 smaller parts is called
A. Bubble Sort A. Instruction
B. Selection Sort B. Syntax
C. Insertion Sort C. Variable
D. none of above D. Decomposition
337. How is sequencing represented in pseu- 342. In a flow chart, what does a oval mean?
docode? A. Start or end
A. Each step of the algorithm is written B. Decision
on a line of its own, in sequence C. Process
B. Each step of the algorithm is explained D. Input or Output
in a diagram
C. All the steps of the algorithm is written 343. Which one of the following statements is
on the same line TRUE about Algorithm?
A. It is a computer program.
D. none of above
B. It is a link to another web page.
338. Which of these is NOT a Sort algorithm
C. It is a set of steps applied to solve a
for OCR GCSE computer science?
problem.
A. Binary D. It is a set of steps that are arranged in
B. Merge no particular order.
344. Which of these would not be involved in C. Hello Hello world! world!
decomposing a problem? D. SyntaxError
B. Hardware-STORAGE B. WHILE
C. Hardware-SYSTEM UNIT C. REPEAT
D. Hardware-INPUT D. LOOP
347. Which sorting algorithm shifts elements 352. Identify the search algorithm
instead of swapping elements if needed in A. Random search
each pass.
B. Binary search
A. Bubble Sort
C. Denary search
B. Selection Sort
D. Next Item search
C. Insertion Sort
D. none of above 353. Which of the following is not a pseudo
code keyword or instruction?
348. What will the output be from the fol-
A. READ
lowing code? print(”Hello” + str(2) +
“world!”) B. WRITE
A. Hello world! Hello world! C. START
B. Hello2world! D. END IF
354. Which sorting algorithm is the fastest for 360. what is a pros of linear search?
a list that is in the correct order?
A. good with long lists
A. Bubble
B. very easy to implement
B. Merge
C. Insertion C. quick
D. Binary D. none of above
355. Tells the interpreter that the code which
NARAYAN CHANGDER
361. Which of the following variables names
follows is a function
is an example of camel case?
A. const
A. totalScore
B. int
C. def B. TOTALSCORE
D. while C. TotalScore
365. What is the variable name in this Pseu- 370. Dijkstra algorithm is also called the
docode? STARTSEND ‘Whats your name? shortest path problem.
’ TO DISPLAYRECEIVE agE FROM KEY-
A. equals = C. Bubble
B. plus + D. Insertion
367. What type of operators are == != < > <= B. If Then Else
>= C. Conditional
A. Arithmetic D. Value
B. Relational 373. What is a pseudocode?
C. Booleon A. Story-telling written in English.
D. none of above B. Complicated programming language.
368. What does Router do in a network? C. Simple English language, with more
A. Forwards a packet to all outgoing links detailed steps to describe the flow of al-
gorithm.
376. What are the three algorithm con- 381. The output of Kruskal and Prims algo-
structs? rithm is
A. Sequence, selection, repetition A. Maximum spanning tree
B. Input, output, process B. Spanning tree
C. Input/output, decision, terminator
C. Minimum spanning tree
D. Loop, input/output, process
D. None
NARAYAN CHANGDER
377. What is the pseudo-code instruction out-
put data? 382. What decisions need to be made in the
problem, is part of
A. GET or READ
B. PROCESS A. Understanding the Problem
D. none of above C. 4 2 9 3 8 5 1
NARAYAN CHANGDER
rithm?
404. What is a binary search?
A. A linear sort
B. A bubble sort A. Each item is checked in order
408. If an Algorithm is performed correctly 413. What is the worst case complexity of
should always give same result, that Merge sort?
means it should be
D. none of above D. First letter lower case and the rest up-
per.
412. Unambiguous in Algorithm means
417. What is abstraction?
A. the steps are interepted only in one
unique way A. The process of filtering out unneces-
sary detail.
B. the person or device executing the in-
struction must know how to accomplish B. The process of filtering out irrelevant
the instruction without any extra informa- characteristics
tion. C. The process of filtering out irrelevant
C. the steps should be clear characteristics and unnecessary detail.
D. none of above D. none of above
418. To compute a speedup calculation: 423. What is a type of diagram that shows the
A. Divide Parallel Time by Sequential sequence of steps in an algorithm?
Time A. flow chart
B. Subtract Sequential Time by Parallel
B. pie chart
Time
C. Substract Parallel Time by Sequential C. bar graph
Time D. line graph
NARAYAN CHANGDER
D. Divide Sequential Time by Parallel
Time 424. Which of the following contains a correct
sequence to make a cup of tea?
419. What do you call English-like statements
that represent program logic? A. Add water to kettle, boil water, add hot
water to cup
A. Flowcharts.
B. Pseudocodes. B. Add hot water to cup, add water to ket-
tle, boil water
C. Machine language.
D. Low-level languages. C. Boil water, add hot water to cup, add
water to kettle
420. Which of the following is FALSE regarding
D. none of above
algorithms?
A. Option 1:Different algorithms can be 425. Another name for a terminator in a flow
developed to solve the same problem chart is
B. Option 2:Different code can never be
A. start / end
written to implement the same algorithm
C. Both Option 1 and 2 are true B. decision
D. Both Option 1 and 2 are false C. process
428. When an algorithm is written in the form 434. A symbol that leads to two possibilities
of a programming language, it becomes a in a flow chart is known as a
A. loop
440. Breaking a complex problem down into 445. What symbol shoes something you need
smaller problems and solving each one in- to do?
dividually.
A. oval
A. Decomposition
B. parallelogram
B. Abstraction
C. Programming C. rectangle
NARAYAN CHANGDER
441. What are algorithms used for? 446. What is the pseudo-code instruction for
A. To plan out the solution to a problem calculation?
B. As a platform to program a solution A. GET or READ
C. To test a solution to a problem B. PROCESS
D. none of above
C. COMPUTE or CALCULATE or DETER-
442. Which of the following is true about Huff- MINE or PROCESS
man Coding.
D. DISPLAY or WRITE or PRINT or SHOW
A. Huffman coding may become lossy in
some cases 447. What is a condition?
B. Huffman Codes may not be optimal
A. A decision
lossless codes in some cases
C. In Huffman coding, no code is prefix of B. A situation that is checked every time
any other code. iteration occurs
D. All C. A type of iteration
444. Which type of programming structure re- 449. What are the drawbacks of using merge-
quires each instruction to be performed in sort?
order, with no possibility of skipping an
action or branching off to another action? A. It has no drawbacks.
A. Loop B. It only works on arrays.
B. Sequence C. There are special cases where it runs
C. Selection very slowly.
D. Iteration D. It uses more memory.
A. 1 D. none of above
B. 2 457. A datatype that can hold more than one
C. 3 value is known as
D. 4 A. Composite
B. Concrete
453. What approach does MergeSort use?
A. divide and conquer C. Abstract
B. iterative D. Atomic
C. search and swap 458. An Algorithm, should be easy to follow
D. search and insert (clear). That means it should be
A. Doable
454. How many passes will it take to sort this
data in ascending order, 1, 2, 3, 5, 4. B. Understandable
A. 2 C. Finite
B. 5 D. Precise
D. No need to distinguish job from job and 8. Which one is not type of operating system
data from program A. Batch system
3. What happens when RAM is full? B. Distribute system
C. Multi-level system
A. The computer crashes
D. Multi-programming system
B. Virtual Memory is used
C. An interrupt is raised 9. The operating system that a computer uses
sometimes is called which of the follow-
NARAYAN CHANGDER
D. The computer explodes ing?
A. Base
4. are programs that designed to help
users complete a task. B. Platform
A. Software C. Index
D. Boot System
B. System Software
C. Application software 10. Instructions that enable the operating sys-
tem to interact with a device.
D. Utility program
A. Virtual Memory
5. Which is the first program run on a com- B. Application software
puter when the computer boots up? C. System softwarre
A. System operations D. Driver
B. System software. 11. What is a hardware utility software used
C. Operating system. for?
D. System operations. A. Make hardware function better
B. Make Software function better
6. Which is not a traditional phase in prepar-
C. Make users function better
ing a disaster recover plan
D. None of the above
A. Risk analysis
12. Which is NOT a function of Operating Sys-
B. Testing, Maintenance, Awareness, and
tems?
Training
A. Booting the Computer
C. identify all systems used in the organi-
zation B. Networking
C. Streaming content
D. none of above
D. Device Management
7. Which of the following is NOT a step of
13. Which of the following controls the orien-
the information system process?
tation of your phone?
A. Gather
A. Gyroscope
B. Create B. Accelerometer
C. Store C. Geotracking
D. Process D. Capacitive
14. Which one of these is a real File System? 20. Which Operating System function allows
A. NTSF more than one program can run at the
same time?
NARAYAN CHANGDER
C. Event log errors 32. kernel space
D. none of above A. develop than single programming sys-
tems
27. What is the CPU?
B. is the location where the code of the
A. Circled processing unit kernel is stored, and executes
B. Storage device C. operating system can support two or
C. Central processing unit more CPUs
D. Hard drive D. Computer program requests a service
from the kernel
28. This type of operating system can be im-
proved and enhanced by users 33. What is a virus?
A. MacOS A. blocking access until money is paid
B. UNIX B. A piece of code that can copy itself and
attack a computer
C. Windows 7
C. Sends information covertly
D. Windows 10
D. when someone steals your computer
29. Key is a specific
software-based key for a computer pro- 34. What is a device driver?
gram. It certifies that the copy of the pro- A. Acts as a way of turning machine code
gram is original and was legally purchased in to low level programming
A. Application B. A type of printer or scanner
B. Product C. A program that manages the devices
C. Software attached to your computer.
D. Windows D. Something that manages your vari-
ables.
30. The last character in a file name, after the
period that usually identifies the program 35. The part on the right side of the task bar
used to create the file is known as?
A. Windows Exploer A. Start button
B. Android-Os B. Menu bar
C. File Extension C. Notification area
D. Windows 10 D. Quick launch toolbar
36. Which of the following helps distinguish in- 42. Which type of user interface requires the
dividual computers, serving the same pur- user to input text?
pose as a street address
37. When does BIOS run? 43. BIOS is a part of which function?
A. Runs after Windows loads
A. Memory Management
B. Runs before you shut down
B. Bootstrap Process
C. Runs after you log in
C. Process Management
D. Runs before Windows loads
D. System Restore
38. Which is the best advantage of using Win-
dows?
44. What is windows XP?
A. The price
A. legacy operating systems
B. The security
C. Availability of Software B. current operating system
NARAYAN CHANGDER
‘software’ we get the word ‘malware’. C. Hard copy
What does malicious mean? D. none of above
A. Malicious means delicious.
54. The option which gives you detailed infor-
B. Malicious means Mali Juice. mation about files, folders, drives.
C. Malicious means harmful. A. Start button
D. None of these
B. Navigation pane
49. What is an operating system? C. Windows/File explorer
A. interface between the hardware and D. Show files
application programs
B. collection of programs that manages 55. Before the operating system is completely
hardware resources running the handles the start up in-
C. system service provider to the applica- structions.
tion programs A. RAM
D. all of the mentioned B. ROM
50. Which type of User Interface is text-based C. CPU
and requires the user to write commands? D. BIOS
A. Command Line Interface
B. Graphical User Interface 56. What is the most popular operating sys-
tem in the world?
C. Menu Interface
A. iMac Pro
D. No User Interface
B. Windows 7
51. Which of the followings is not GUI operat-
C. MacBook Air
ing system?
A. DOS D. Windows 95 OSR2.5
B. Windows 57. is a program that controls the execu-
C. iOS tion of application programs
D. Linux A. CPU
69. What can be a cause of deleting files in 75. what is the most important aspect before
your system? installing the OS?
A. Self-replicatingvirus A. The OS must be compatible with the ex-
B. Systemrestore isting hardware and the required applica-
tions.
C. Forget thelogin password
B. Have more than 500GB of storage
D. none of above space
C. Install the OS regardless of computer
NARAYAN CHANGDER
70. Which of the following should be per-
formed in order to prevent an issue with specs
information system? D. none of above
A. Decreasing security on computers
76. A signal sent by a hardware or software
B. Increasing expenses/costs to CPU indicating that something needs at-
C. increasing complexity of systems tention
D. Increasing security on computers A. disturbance
B. interrupt
71. What is Malware?
C. waiting
A. Types of Networks
D. exclusion
B. Types of Hardware
77. Which of the following is not one of the
C. Types of Software
most common operating systems for per-
D. Types of Social Media sonal computers?
72. Which of these is not a file type? A. Microsoft Windows
A. .txt B. IBM
B. .pdf C. Linux
C. .exe D. Mac OS X
D. .pp 78. Which code allows people from different
countries to use the computer in their own
73. How many subdirectories are you allowed language?
to create within a single directory is an
OS? A. ASCII
80. keys helps you to open Windows Ex- 86. The final step in the problem solving pro-
plorer. cess is
A. Finding possible solutions
81. A computer uses hold files 87. Best resources of information for hard-
ware and software products:
A. Folder
A. Warranty
B. Icons
B. Vendor website
C. Recycle bin
C. Salesinvoice
D. Applications D. none of above
82. A network that cover large area city, coun- 88. Which part of the operating system will re-
try, called? move data that is no longer needed to free
A. WAN up space for other programs being used?
B. Bridge A. Memory management
C. Router B. File and disk management
D. none of above C. User management
D. User interface
83. The enclosure that contains the internal
components of a computer is called the 89. Select the free operating system with a
A. Portable Storage version called Ubuntu?
A. iOS
B. Hardware
B. Android
C. Tower Casing
C. Windows
D. USB Port
D. Linux
84. A(n) is the most important software
that runs on a computer. 90. What is the main part of the operating sys-
tem
A. Operating System
A. user interface
B. Windows
B. kernel
C. Anti Virus C. system utilities
D. iOS D. device drivers
85. Which of the following operating system 91. Which of the following operating system
is open-source software does not implement multitasking truly
A. Windows A. MS DOS
B. Mac OS X B. WINDOWS 7
C. Linux C. WINDOWS 98
D. UNIX D. All of the above
NARAYAN CHANGDER
C. single user operating system B. Anti Virus
D. desktop operating system C. Firewall
93. Which of the following is an advantage of D. Zip Compression
Micro kernel Kernel
99. In Linux booting process it is the GRUB
A. Fast Execution phase is where
B. Easily Extendable A. Userallowed to select the Kernel
C. Large in size B. The system accessthe hard drive parti-
D. None of the above tions, and other hardware
94. Which is not a type of OPERATING SYS- C. The system definewhich subsystems
TEM SOFTWARE? are working
97. Which one of the following is not a part in B. So that it doesn’t feel lonely.
the hard disk drive? C. To find it easily.
A. Actuator. D. none of above
103. How does the operating system handle 108. Which of these is NOT an operating sys-
file management? tem?
A. Windows
114. Which one is not an operating system? 120. The information contained in a file sys-
A. iOX tem
B. Windows A. The computer characteristics
C. Android B. the direction web
D. Poloroid C. Location, name, type of flie
115. What is the reason computer memory D. Type of OS, tipe of memory, name
needs to be managed?
NARAYAN CHANGDER
121. The OS provides a platform that enables
A. the amount of memory in a computer
what to be run?
is limited
B. to protect your data from hackers A. Applications
125. Which of the following is not a resource 131. Which cannot self replicate?
managed by the OS? A. Virus
129. Which of the following commands ap- B. Communication from you to the com-
pears in the Insert menu or tab? puter.
A. Table C. A server that makes the keyboard
B. Undo/Redo work.
C. Bold D. Communication between your touch-
screen and the speakers.
D. Line Spacing
136. A user interface made up of a command
130. What operating system is on a pc? prompt is called:
A. OS X A. Graphical User Interface
B. Vista B. Super User Interface
C. Safari C. Command Line Interface
D. Windows D. Command User Interface
NARAYAN CHANGDER
138. This option replaces your current version
of Windows, but doesn’t preserve your C. guest drive
files, settings, and programs. D. application software
A. BIOS
144. A role of the operating system that helps
B. Custom keep storage devices well organized and
C. Update maintained.
D. Upgrade A. Application Management
B. Disk Management
139. THE ANDROID OPERATING SYSTEM IS A
C. Service Management
A. MULTI-USER OS
D. Device Management
B. SINGLE-USER OS
C. REAL-TIME OS 145. Which of these tasks is a function of the
operating system?
D. BATCH-OPERATING OS
A. Scanning a photograph
140. Application software is B. Copying a file
A. help the user run specific tasks like C. Producing a database report
word processors, web browser, email,
D. Adding data to a spreadsheet
clients, games, etc
B. run tasks like the operating systems, 146. Which of the following means the operat-
utilities, etc ing system automatically configures new
devices as users install them?
C. help the user run things down
A. Operational Buffering
D. run tasks like the doing my homework,
revision, etc B. Plug and Play
C. Virtual Memory
141. All users of a particular class should have
access based on: D. Page Logging
148. The binary system allows digital devices 154. Which of the following is NOT a desktop
to represent any number by using operating system?
149. Which of these codes can’t be used to rep- 155. How do you select a file or folder inWin-
resent character data on digital devices? dows Explorer?
A. Binary A. [Ctrl][X]
B. ASCII B. Single-click it.
C. Pseudo C. shortcut menu
D. EBCDIC D. Folder
150. Palm OS and Personal Digital Assistants 156. In this kind of memory, the operating
make use of what kind of operating sys- system allocates a portion of a storage
tem? medium, usually the hard disk or a USB
A. Single User, Multi Task flash drive, to function as additional RAM.
What kind of memory is this?
B. Real time
A. Performance
C. Multi User
B. Managed
D. Single User, Single Task
C. Device
151. What types of data can be transferred D. Virtual
using windows Easy transfer tool?
A. Ram addressing 157. Operating Systems perform basic tasks
such as
B. Files and User settings
A. creating BIOS data for users.
C. Security options
B. recognizing input from the system
D. none of above clock.
152. what is the use of firewall in computer? C. recognizing input from the keyboard.
A. For security D. creating programs for unauthorized
B. For data transmissions users.
C. For authentication action 158. What would be the result of having a cor-
D. none of above rupt Master Boot Record?
A. The printer will function incorrectly.
153. What does GB stand for?
B. The operating system will fail to start.
A. Gigabyte
B. Giantbyte C. A new application will fail to install.
C. Giagabyte D. The keyboard will be unresponsive to
D. Giggabyte the user.
NARAYAN CHANGDER
160. Which is the definition of free software? or taking a picture?
A. The freedom to study how the program A. Virtual personal assistant
works, and change it
B. Pinch gesture
B. The freedom is cheap software
C. Dock
C. The free in the use
D. Lock screen
D. fredom of the designer
166. What is a firewall?
161. How many digits does a binary number
system have? A. Antivirus software
A. 10 B. Security device that monitors incoming
B. 4 and outgoing network traffic
B. RAM B. windows
C. HDD C. ?
D. Google Drive D. the root
181. What program is used to start and shut 186. What is “Layered Approach”?
down a computer or mobile device, pro- A. A number of layers
vide a user interface, manage programs
and memory, and provide file manage- B. The interaction of the layers
ment, among other functions? C. A small operating system core
A. An operating System D. A networked computer system.
B. A File Utility
187. System software is a set of needed
NARAYAN CHANGDER
C. A System Utility for a computer to
D. Application Software A. program, work
184. What type of operating system monitors 190. A network OS will provide user user
external events & processes data consis- names to identify users and and pass-
tently within a set deadline words to
A. Real Time A. Authenticate Users
B. Single User Single Task B. Validate Users
C. Single User Multi Tasking C. Scan Users
D. Multi User D. Secure Users
192. Which f these is a type of Operating Sys- 198. The operating system is on every
tem computer.
A. Input D. XOXO
B. output 201. What manages the hardware and runs
C. Software the software?
D. USB A. Computer Systems
196. THIS BOX APPEARS ON THE DESKTOP B. Dedicated Systems
WHEN WE START A PROGRAM C. Embedding Systems
A. WINDOW D. Operating Systems
B. OPERATING SYSTEM
C. TASKBAR 202. Which of the following is a function of the
operating system?
D. none of above
A. To compose and send email.
197. Which is not the function of the Operating
B. To edit photographs and other high-
System?
resolution images.
A. Memory management.
C. To control communication and manage
B. Disk management. files.
C. Application management. D. All of these are operating system func-
D. Virus Protection. tions.
203. Which is the best advantage of using Mac A. Your user profile
OS? B. Your domain
A. The price C. Your lock screen
B. The publicity
D. Your permission level
C. Better graphic design
209. Provides a graphical view of all of the
D. the people
drives, folders and files on your computer
NARAYAN CHANGDER
204. What type of software am I? Presenta- A. Windows Explorer
tion software, e.g. Microsoft PowerPoint
B. Picture View
A. Operating System
C. ROM
B. Application software
D. RAM
C. Utility software
D. none of above 210. CUIs HAVE COMPONENTS SUCH AS
A. WINDOWS
205. These are example of Mobile OS Except
for B. MENUS
A. iOS C. COMMAND LINES
B. Symbian OS D. ICONS
C. Linux OS 211. What does Kernel mean?
D. Android OS A. Hardware of the OS
206. With which of the following do users in- B. Central component of the operative
teract with menus and visual images such system
as icons, buttons, and other objects to is- C. Is the processor of the system
sue commands?
D. Is a Firmware
A. Graphical user interface (GUI)
B. Menu-driven interface 212. The transfer rate of a hard disk drive de-
pends primarily on the drive’s HDA (Hard
C. Performance-monitor interface Drive Assembly) and secondarily on the
D. Command-line interface A. drive controller.
207. THE TASKBAR IS AT THE OF THE DESK- B. file management.
TOP.
C. operating system.
A. LEFT
D. file allocation table.
B. TOP
213. Select the operating system used on the
C. BOTTOM
Chromebook?
D. RIGHT
A. Chrome OS
208. Which of the following is the collection B. Android
of stored settings that ensure your cus-
tomizations are in effect whenever you log C. Windows
on? D. Linux
214. is a program that control or main- C. Any set of instructions that you can
tain the operations of the computer and its work with
hardware
225. RAM and ROM are both 231. THE OPERATING SYSTEM CONTROLS
A. primary storage THE
NARAYAN CHANGDER
A. Securing Information on a network 232. Which of the following is a way of Iden-
tifying critical systems?
B. Deleting applications
A. Checklist to test and evaluate the sys-
C. Hacking Passwords
tem
D. none of above
B. identify organization importance or
227. Before a document prints it waits in the criticality
C. Interruption Test on the system
A. BIOS D. none of above
B. buffer
233. Which of the following is a unique combi-
C. boot process
nation of characters, such as letters of the
D. swap alphabet and/or numbers, that identifies
one specific user?
228. What is the best way to shut down a com-
puter? A. Client
A. Press the power button on the com- B. Username
puter case. C. Password
B. Click Start, Power, Shut down, then let D. Cycle
the process complete.
C. Press CTRL+ALT+DEL twice. 234. Most computers require what type of
software?
D. Press ESC.
A. Binary
229. Who might send out an emergency B. Operating System
alert?
C. Application
A. Mr. Doering
D. Hardware
B. Trump
C. Obama 235. How can the OS help manage security of
the system?
D. Professional Organizations
A. The OS can hire backup
230. The following is not a part of GUI:
B. User accounts may be password pro-
A. command prompt tected
B. scroll bar C. Files can self destruct after a set time
C. text box
D. radio button D. none of above
236. What type of code is data converted to 241. A discontinued OS that was last used by
once it is input into a computer? Nokia for their smartphone.
237. In the tree structured directories, 242. A type of OS which can respond instantly
A. the tree has the stem directory. to any inputs or sensors
240. Identify the basic function of an operat- B. They are basic Key to open the com-
ing system puter
A. Limit specifies the length of the seg- C. They are used to to open and close pro-
ment grams
C. Execute user programs and make solv- 246. Which of the following Windows dialog
ing user problems easier box features allows you to select several
D. To allow the system to enter the dead- options?
lock state then recover A. Drop-down lists
NARAYAN CHANGDER
B. TV Host computer what tasks to perform and how
to perform them.
C. File clerk
A. data
D. Computer tech
B. information
248. Where are deleted files sent to prevent C. instruction
you from accidentally deleting files?
D. utility
A. Trash Can/Recycle Bin
254. The following is not a function of an op-
B. A folder
erating system:
C. They are automatically deleted
A. Checking for viruses
D. none of above
B. Directing information from peripheral
devices like a mouse or a printer
249. Windows is the Product of?
C. Allowing users to open applications
A. Apple
D. Allocating the computer’s memory be-
B. HP
tween different tasks.
C. Dell
255. What is multiprocessing?
D. Microsoft
A. The computer has more than one core
250. Example of a real time control system processor
A. Payroll processing B. where tasks are done apparently at
the same time
B. Seat booking system
C. Where more than one computer is
C. Engine control unit in a car used to carry out instructions
D. none of above D. none of above
251. System lock-up problem is type of 256. Which is the layer of a computer system
A. An operational operating system prob- between the hardware and the user pro-
lems gram?
257. An example of a potential deadlock situ- 262. Which of the following does an operating
ation is system not do
268. Which of these is NOT a task of Operat- 274. Which of the following consists of one
ing Systems or more chips on the motherboard that
A. communicating with the user hold items such as data and instructions
while the processor interprets and exe-
B. communicating with the hardware cutes them?
C. managing memory A. POST
D. browsing the Internet B. ROM
NARAYAN CHANGDER
269. Ctrl + S option file. C. RAM
A. starts D. Basic Input Output System
B. creates
275. Problem of Light print, or fade.
C. opens
A. Replacethe toner cartridge
D. saves
B. Reinstallthe Driver
270. Operating system used on PC platform or C. a) Cleanlaser scanner mirrors.
IBM computer.
D. none of above
A. IOS
B. Windows XP 276. Which part of Operating system is re-
sponsible for sending basic instructions
C. Android and managing the hardware?
D. Mac OS
A. Kernel
271. witch of the following is an email client? B. Shell
A. Outlook express C. The shell allows the user develop the
B. Mozilla Firefox D. Freeware
C. Internet explorer
277. is a complete operating system that
D. Yahoo works on a desktop computer, notebook
computer, or mobile computing device.
272. Where is BIOS stored?
A. Stand-alone OS
A. On the RAM
B. On the Motherboard ROM B. Server OS
273. When you save your document to your 278. A system designed to prevent unautho-
computer, where is it stored? rized access to or from a private network
A. in the cloud A. Adware
B. in a folder B. Firewall
C. on the Internet C. Antiviruis
D. on a hard drive D. Spyware
279. Select an open source operating system C. Super internet explorer Pro
A. Windows 10 D. none of above
291. Which of the following is Cloud Platform 297. Places all the parts of a file in one loca-
by Amazon? tion
A. Azure A. zipped
B. Cloudera B. malware
C. AWS C. defragmenters
D. All of the above D. disk clean up
292. displays battery status, current date 298. Which one of the following is NOT a com-
NARAYAN CHANGDER
and time, volume level monly used operating system?
A. Notification area A. BIOS
B. Navigation area B. OS X
C. Clock C. LINUX
D. Status area D. WINDOWS
293. Hard drive space that can work as RAM. 299. Which runs on computer hardware and
A. Virtual Memory serves as platform for other software and
the user program?
B. Application software
A. System software.
C. System Software
B. System operations.
D. Driver
C. Operating system.
294. The kernel can be stored in D. Utilities.
A. ROM
300. to manage processor, memory and I/O
B. RAM device, we are need
C. the Hard Disk A. Operating System
D. Computer Disk B. CPU
295. Where can a technician look to determine C. Inter process communication
if specific computer hardware or software D. none of above
has been tested to work with Windows
OS? 301. SQL is?
A. Microsoft Compatibility Center A. Programming structured Language
B. Microsoft Knowledge Base B. Software
C. Windows 7 manual C. Unstructured Language
D. Windows Easy Transfer D. none of above
296. Which of the following is NOT a network 302. Where are all of the start up files lo-
operating system? cated?
A. Windows Server 2003 A. ROM
B. Banyan VINES B. RAM
C. Unix C. CPU
D. Xerox Network Systems D. Motherboard
314. Which of these devices can have an 319. What are the most popular operating sys-
MULTI USER operating system? tems?
A. Personal computer A. Nintendo Switch
B. Simple mobile phone B. Windows and Mac OS X
C. Mainframe C. Apple
D. Smartphone D. Microsoft
320. Make copies of files in case of loss.
NARAYAN CHANGDER
315. The File system used for?
A. backup
A. The shell keeps the end users access
kernel . B. subfolder
C. rename
B. uses to name, store, and organize files
on a drive D. copy
C. produce basic information about data 321. Which of these is not a function of an OS:
D. All of above A. Provide a user interface
B. Communicate with hardware
316. Which file and disk management tool at-
tempts to locate a file on your computer or C. Allow the computer to multi-task
mobile device based on specified criteria? D. Improves CPU performance
A. Locator 322. A user interface where the user interacts
B. Search with menus and icons is called:
C. Seeker A. Graphical User Interface
325. Which method is considered one of the 330. Software program that carries out some
general methods to pass parameters? action
336. What type of software am I? Spread- C. Allows users to review and modify the
sheet software, e.g. Microsoft Excel source code source code is release.
A. Operating System D. none of above
B. Application software
342. Which is not a process state?
C. Utility software
A. waiting
D. none of above
B. terminated
NARAYAN CHANGDER
337. Which type of system needs interactive
processing C. blocked
358. One of the capabilities of operating sys- 363. The primary purpose of an operating sys-
tems:Two or more users have individual ac- tem is:
counts that allow them to work with pro-
A. To make the most efficient use of the
grams and peripheral devices at the same
computer hardware
time.
B. To allow people to use the computer
A. Multi-user
C. To keep systems programmers em-
B. multiprocessing
ployed
NARAYAN CHANGDER
C. multitasking
D. To make computers easier to use
D. multithreading
364. A computer uses to organize all of
359. What is the most common way people’s the different files and applications that it
computers get infected by a virus? contains.
A. Receive a call A. Folder
B. Install a new hardware B. Icons
C. Download email attachments C. Trash Can
D. None of these D. Applications
360. Allocating time on the processor to indi- 365. Which of the following is a main function
vidual processes is known as of an operating system?
A. CPU Scheduling A. managing applications
B. CPU Timing B. text processing
C. CPU Clocking C. flow chart editing
D. CPU Sorting D. program compilation
362. Shortcut key to delete the files/folders 367. What is the first program that usually
permanently: runs when you turn on a computer?
A. Shift + Ctrl A. Windows
B. Del + Shift B. BIOS-ROM instructions
C. Ctrl + Del C. Mac OS
D. Shift + Del D. Binary
368. What acts as the master controller for 373. Which company was created by Bill
all activities that take place within a com- Gates?
puter system?
NARAYAN CHANGDER
D. A temporary memory area within a de- B. Software Job First
vice. C. System Job First
379. You can arrange the tiles by: D. Shortest Job Final
A. You can’t move them 385. A type of OS which makes use of Parallel
B. Right Click Processing to spread the load over multi-
C. Dragging and Dropping ple servers
389. A type of OS which would be suited to 395. Which methods should a technician use to
use inside aeroplane autopilot systems or update a device driver?
nuclear reactors
NARAYAN CHANGDER
A. Disk Management
B. Device Manager D. All of the above
C. Microsoft System Preparation 407. Select the best choice for the statement.
D. Bootmgr Acomputer icon is a(n):
411. What is a kernel? 417. What does the user interface do?
A. The battery on motherboard. A. Allows users to communicate with the
D. An application launcher.
C. Manages printers and scanners
412. Operating Systems will allocate sections D. Acts as the essential center of a com-
of RAM to the processes as part of: puter operating system
A. Processor Management
418. What kind of operating system comes
B. File Management pre-installed with tools to protect a com-
C. Peripheral Management puter from threats.
D. Memory Management A. Multi User OS
B. Security OS
413. Windows 10 and Windows 7 are exam-
ples of: C. Single-User, Multi-Tasking OS
A. IOS Phone D. Single-User, Single Tasking OS
B. Android 419. What is an Operating System?
C. Microsoft Windows A. Physical parts of a computer
D. none of above B. A keyboard
414. Latest Version of Windows Series is? C. A videogame
A. Windows 8 D. Software that let a user work with a
B. Windows 8.1 computer
NARAYAN CHANGDER
charged
B. program on the hard drive
423. One of the capabilities of operating sys-
tems:The operating system can support C. high level program
two or more CPUs. D. low level program
A. multi-user
429. What does the term file management
B. multitasking mean?
C. multiprocessing
A. How your manager is able to find your
D. multi-threading file.
424. Which of the following uses an embedded B. The way in which we organise our files
operating system? and documents on the computer.
A. Computer C. How you organise the rough edges of
B. Smart Phone your nails
432. A type of OS which can run on a stan- 437. What is meant by multi-tasking?
dalone PC (or other device) and supports
A. The computer executes more than one
the use of running more than one job simul-
442. Which of the following is a private combi- 447. A role of the operating system that man-
nation of characters associated with a user ages applications or programs that are in-
name that allows access to certain com- stalled on a system.
puter resources? A. Application/Program Management
A. Password B. Service Management
B. Username C. Access Control/Protection
C. Folder D. Windows Settings App
NARAYAN CHANGDER
D. Cipher
448. The function of the operating system is
443. It is a computer operating system; a sys- to serve as the between the user, the
tem that is designed primarily to support application software, and the computer’s
workstation, personal computer, and, in hardware
some instances, older terminal that are A. interface
connected on a local area network (LAN).
B. program
A. Network Operating System
C. application
B. WAN
D. server
C. MAN
D. OSI 449. Which of the following kinds of software
consists of the programs that control or
444. Which of these is NOT a Mobile OS? maintain the operations of a computer and
its devices?
A. iOS
A. System
B. Symbian OS
B. Application
C. Linux OS
C. Program
D. Android OS
D. Management
445. Which one related to MULTITASK
450. What is an Operating System? Is the one
A. Bigger parts of a program are loaded
that..
when needed by OS
A. Is a software that manages the com-
B. Smaller parts of a program are loaded
puter hardware and software
when needed by OS
B. Is a huge program that allows you to
C. CPU can only run many program at a
write and connect to the net
time
C. is commomly known as the brand of
D. CPU can only run one program at a
computers
time and OS will switch programs for it
D. It is the system followed by the opera-
446. Windows are tor
A. Symbols of application 451. Being able to run several applications at
B. Rectangular area on screen the same time is known as
C. Graphical User Interface A. Multi tasking
D. All of the above B. Application management
463. A system usually designed to handle 468. What kind of operating system would be
large volumes of data periodically such as needed for payroll processing
calculating tax payable is an example of A. Batch
what kind of system?
B. Interactive
A. single user C. Real TIme
B. batch D. none of above
C. real-time 469. Which one of these is not Cloud Storage
NARAYAN CHANGDER
D. network A. OneDrive
B. Icloud
464. Organization documents For IT contains
C. IOS
A. The Businessplans for the cash flow
D. DropBox
B. The procedures and policies that will
be adopt in work 470. Which is NOT an example of a peripheral
device?
C. The contract with the suppliers
A. Printer
D. none of above
B. Monitor
465. Which operating system are IOS applica- C. Projector
tions designed in? D. Computer
A. Windows 8.1/10 471. the Network information technology sys-
B. Unix tem include
B. Control signal used to synchronise the 473. This following is an example of a periph-
internal components. eral.
485. Used to select multiple files in a series 491. Operating systems are available on
A. Control Key which types of computers?
NARAYAN CHANGDER
A. Windows non-Apple computers?
B. Android A. Linux
C. Linux B. Windows
D. Mac OS X C. Mac OS
487. Which one of the following is one the ben- D. Unix
efits of a Microkernel Organizaton?
493. Hardware is different from software be-
A. Portability cause
B. Safety A. you can see hardware
C. Privacy B. it costs more
D. Productivity C. hardware needs a person to make it
work
488. Ext2, Ext3 is an example of Linux
D. a computer doesn’t need software to
A. Process scheduling work
B. Linux Process scheduling
494. Choose the Microsoft operating system
C. Memory address
A. Windows
D. File system
B. Android
489. How many applications can be processed C. Linux
by the CPU at a time? D. Mac OS X
A. 1
495. Operating systems that can be used by
B. 2 only one person at a time on a single ap-
C. 3 plication is called
D. Several A. Single User, Multi Task
B. Single User, Single Task
490. Left, Center, Right, and Justify are op-
tions for which tool located on the toolbar C. Multi Task
or ribbon? D. Real time
A. Zoom
496. The grouping of jobs that require similar
B. Line Spacing resources
C. Bulleted Lists A. timesharing
D. Text Alignment B. serial processing
C. Cooling Fan 503. The ability for different people to use the
D. none of above same computer is made possible through:
A. Open-source software
498. are a types of systems are regarded
as critical system B. Desktop elements
NARAYAN CHANGDER
B. Process Management C. Business Continuity Planning
C. Memory Scheduling
D. none of above
D. Process Scheduling
514. Which type of screen relies on the electri-
509. DATA PROCESSING JOBS ARE DIS-
cal properties of the human body to detect
TRIBUTED AMONG THE PROCESSORS IN
where a display was tapped?
A
A. MULTI-USER OS A. Resistive Touchscreen
NARAYAN CHANGDER
D. none of above C. To protect your computer form mal-
ware
530. The ability for an operating system to
save and switch context to change proces- D. Because it’s the law
sor execution between multiple processes
535. What technology makes WiFi calling pos-
A. multi-programming sible?
B. multi-tasking A. VOIP
C. multi-processing B. WiFi
D. multi-plying C. WiMax
531. How much processor speed is needed to D. WWAN
run windows XP operating system?
536. Operating Systems need to manage Sys-
A. 233 MHz tem ? (1-3)
B. 133 MHz A. Objectives
C. 800 MHz B. Electricity
D. 259 MHz C. Restores
532. Which of the following is the design goals D. Resources
of an Operating System?
537. Which utility organizes files efficiently on
A. Sensory Experience, Brand Image and
the hard drive?
Durability
A. Uninstaller
B. Maintainability, Accessibility and Pro-
ductivity B. Disk defragmenter
C. Learnability, Discoverability, Conve- C. Backup Utility
nience and Safety D. File Manager
D. Flexible, Reliable, Error-free and Effi-
cient 538. The following are the benefits of format-
ting hard drive except one.
533. A short line of text that a web site puts
A. Speed up your computer
on your computer’s hard drive when you
access their website. They may be used B. Fix malware and virus problems
to monitor your computer. C. Get rid of outdated personal informa-
A. Malware tion
B. Cookies D. Increase hard drive capacity
NARAYAN CHANGDER
1.7 Unix
1. A command that does not have an indepen- 5. What is your Lecture name in Unix Opera-
dent existence is called tor System Subject
A. External command A. MOHD SHAHRIL AFANDI BIN ABDUL
MAJID
B. Internal command
B. MOHD SHAHRIL BIN AFFANDI
C. kernal
C. MOHD SHAHRIL AFFANDI BIN ABDUL
D. shell
MAJID
2. how to find out which shell our system D. MOHD SHAHRIL AFFANDI BIN MAJID
has?
6. What is execute permission?
A. echo $shell
A. permission to execute the file
B. echo $SHELL
B. permission to delete the file
C. cat shell
C. permission to rename the file
D. echo sh
D. permission to search or navigate
3. “grep-v” command is used to through the directory
9. which directory contains all the users’ 15. To make a pipe put a on the command
home directories line between two commands
10. What does the following command do? $ 16. print the last line of a file
mkdir dir 01 dir 02 dir 03 A. sed ‘$p’ file
A. create dir, dir 01 and dir 02 B. sed ‘ & p’ file
B. creates dir 02 C. sed ‘!p’ file
C. creates dir only D. sed ‘np’ file
D. throws an error
17. I want to show a list of users logged in
11. Unix operating system is written in for a specific host. Which command will I
A. Ada Language use?
C. C Language B. whoami
13. The following command can list out all the 19. How many levels of Unix core structure
current active logins. are there?
A. A-whoami A. 2 levels
B. B-who am i B. 3 levels
C. C-who C. 4 levels
D. D-None of the above. D. 5 levels
14. Which command is used to create a direc- 20. Which command is used to list your files
tory? and directories in unix opearting system?
A. create directory A. list
B. create folder B. cd
C. mk dir C. ls
D. mk directory D. None of these
21. UNIX operating system supports 27. If the command cat x is executed after suc-
A. Multi User cessfully executing the command time sort
filename > x, then
B. Pattern Matching
A. only the time details will be displayed
C. Multi Tasking
D. All of the above B. only the sorted contents of the file file-
name will be displayed
22. Command used to list all hidden files is
C. an error message will be displayed
NARAYAN CHANGDER
A. Multiple Choice
D. None of the above
B. ls-l
C. ls-d 28. is like an engagement dairy that con-
D. ls-a tains text information and offers a re-
minder services based on a file.
23. Which syntax is used to move a file from
one place to another place or directory? A. cal
A. rm filename1 filename2 B. date
B. li file C. mkdir
C. mv filename
D. calendar
D. mv filename1 filename2
24. how to sort according to the 4th character 29. The is responsible for the management
of the 3rd column of a file in decreasing of processes.
order? A. Shell
A. sort-t3, 4 file B. User
B. sort-r-d3, 4 file
C. Kernel
C. sort-k3, 4-r file
D. Administrator
D. sort file
25. mv command is used to move files and di- 30. Which year UNIX created?
rectories.
A. 1969
A. True
B. 1978
B. False
C. 1965
C. Can’t determined
D. None D. 1971
26. Unix shell command that lists directory 31. Which command is used for changing the
contents of files and directories with hid- current directory?
den files.
A. cd
A. ls-d
B. cp
B. ls-F
C. ls-a C. pwd
D. ls-l D. rm
32. Driving is in the city unless you like 38. Which among the following interacts di-
traffic. rectly with system hardware?
44. The of UNIX is the hub of the operating 50. Which command is used to remove a direc-
system tory?
A. Kernel A. rd
B. Shell B. rmdir
C. Commands C. dldir
D. None of these D. rdir
NARAYAN CHANGDER
45. Which is the default editor of Unix Oper- 51. is a program written to perform cer-
ating System? tain specific action.
A. Notepad A. Kernal
B. vi B. Shell
C. Dreamweaver C. Command
D. All of the above D. getty
46. A command with an independent existence 52. Which of the following is not a filter in
in the form of a separate file is called Unix?
A. External Command A. cat
B. Internal Command B. head
C. Shell C. tail
D. Kernal D. cd
47. Which command searches a file or files for 53. What is used for confirmation before delet-
lines that have a certain pattern? ing any file?
A. erep A. rm-r
B. pgrp B. rm-i
C. grep C. del-filename
D. drep D. del-f
48. Which symbol is represented as root direc- 54. Which of the following is not a part of all
tory? the versions of UNIX?
A. % A. Kernel and Shell
B. * B. Commands and utilities
C. & C. Graphical user interface
D. / D. System Calls
49. Unix OS was first developed by 55. In Unix, Combining commands are
A. Dennis Ritchie A. & %
B. Bjarne stroustrup B. & & %
C. Ken Thompson C. ; & &
D. Brian Kernighan D. ; &
56. Shell Program is stored in a file called 62. In Linux everything stored as a
A. Unix A. file
B. Multics B. rm
C. Unix C. delete
D. wisdom D. erase
58. which commands gives the no of recently 64. Which command is used to remove a file?
logged in users?
A. remove
A. who
B. del
B. who | wc-w
C. rm
C. whoami | wc-l
D. mv
D. who | wc-l
59. The command is used to display some 65. A disk partition is used to for?
process attributes A. Allocate space for a filesystem
A. pwd B. Compress space on disk
B. od C. Set permission on files
C. cd D. Eliminate need for home directory
D. ps
66. The standard tree structure starts at which
60. When was the UNIX Programmer’s Man- directory?
ual book first published?
A. home
A. November 4, 1987
B. user
B. November 4, 1971
C. root
C. November 3, 1971
D. bin
D. November 3, 1987
61. Which command Is used to change current 67. To remove a file from a system, is
directory to parent directory used
68. In what year did the Uniplexed Informa- 73. What does the script do?
tion and Computing System operating sys- A. Set the entry direction of the Output-
tem undergo a small change and become shell.
called UNIX?
B. Set the direction of the input.
A. 1900 C. determine the direction of entry In-
B. 1980 put/Outputshell
C. 1970 D. Determine the direction in and out of
NARAYAN CHANGDER
Input/Outputshell
D. 1988
74. Which of the following command is used to
69. Which directory contain device special create file in Linux?
files? A. touch
A. /etc B. cat
B. /etc/dev C. echo
C. /root/bin D. All of the above
B. fork A. mkdir
C. wait B. rmdir
D. phase C. del
D. remove
82. command helps to know the details of
the one’s Unix system. 88. Which symbol is used as a command
A. date prompt in unix?
B. uname A. !
C. cal B. @
D. who C. $
D. #
83. Which command is used for making the
scripts interactive? 89. What is group ownership?
A. ip A. group of users who can access the file
B. input
C. read B. group of users who can create the file
D. write
C. group of users who can edit the file
84. If rmdir dir001 fails, what could be the rea-
son(s)? D. group of users who can delete the file
NARAYAN CHANGDER
D. None B. Solaris
C. OpenBSD
92. In a system, if 5 people are currently us-
ing the vi editor. then the number of cor- D. Uniplexed Information and Computing
responding processes will be System
A. 1
98. Firefox is an example of a(n).
B. 5
A. Animal
C. 2
B. Internet Browser
D. 0
C. Internet
93. how to print the date of the system
D. E-mail program
A. date
B. date +%d-%m-%y 99. The write permission for a directory deter-
mines that
C. date +’%D-%M-%Y’
D. date +’%d-%m-%Y’ A. we can write to a directory file
B. we can read the directory file
94. find out the 7th character of the word ‘EN-
CYCLOPAEDIA’? C. we can execute the directory file
A. cut-f7-d’ ‘ ‘ENCYCLOPAEDIA’ D. we can add or remove files to it
B. cut-d’ ‘-c7 ‘ENCYCLOPAEDIA’
100. Unix is which kind of Operating System?
C. cut-c7 ‘ENCYCLOPAEDIA’
A. Multi User
D. none of the above
B. Multi Processes
95. Which command is used for printing the
C. Multi Tasking
current working directory?
A. HOME D. All of the mentioned
B. Someone who is not dependable. 108. Which of the following commands is used
to display the directory attributes
C. Someone who doesn’t rely on others,
can take care well of him/herself without A. cat
help. B. ls
D. none of above C. mkdir
103. Naming a file or directory can use any let- D. cp
ter in the name. except any letter
109. To display the given string, number or
A. letter a
any other format specifier on the terminal
B. sign window
C. number 1 A. echo
D. mark * B. printf
104. command is used to control the move- C. sort
ment of the cursor on the screen. D. cat
A. mkdir
110. Which meta character takes output of
B. echo
first command as input of second com-
C. tput mand?
D. tty A. Multiple Choice
105. UNIX Architecture contains B. ;
A. KERNEL C. |
B. SYSTEM CALL D. ||
C. SHELL
111. Unix is
D. ALL OF THE ABOVE
A. Application Software
106. Which of the following is true about past B. System Software
perfect tense?
C. Utility Software
A. We use it when there is only 1 event.
D. Operating System
B. Had + P.P
C. We use it when events happened at 112. The first line in any shell script begins
the same time. with a
D. Have + P.P A. &
B. !
107. All device files are stored in which direc-
tory? C. $
A. /etc D. #
113. Which command is used for creating direc- 116. POSIX refers
tories? A. Portable operating system interface
A. rmdir B. Portable operating system index
B. mkdir C. Position operating system interface
C. cd D. Partial operating system interface
D. cp
117. command can display the current date
NARAYAN CHANGDER
114. delete all file starting with d and ending along with the nearest to the seconds.
with t? A. date
A. rm dt* B. cal
B. rm d*t C. who
C. rm td* D. mkdir
D. rm t*
118. command is used to display mes-
115. Which is wrong? sages
A. Potato-potatoes A. mkdir
B. Piano-pianoes B. echo
C. Bench-benches C. bc
D. Girl-girls D. ls
11. What are the advantages of DBMS? 16. Occurs when multiple users seeking access
to the same set of records lockout each
A. Low cost of hardware & software
other.
B. DBMS are simple to use
A. Data manipulation
C. Uniform administration procedures
B. Deadlock
for data
C. Database lockout
D. Offers a variety of techniques to store
& retrieve data D. Data redundancy
17. Which of the following is the disadvan- 22. Update the data of the database including
tages of DBMS? A. Import, edit, delete data
A. Cost of setup of DBMS is relatively B. Sort
cheap
C. Search
B. Database systems are complex D. Report
C. Database will not be corrupted
23. Features in MS access build to provide help
D. Database systems are fast to be de- topics and topics on tasks performed work-
NARAYAN CHANGDER
signed ing with Access
A. Index
18. Database management system is soft-
ware B. Office Assistant
A. System C. Query
D. Ribbon
B. Relational
C. Application 24. Consider attributes ID, CITY and NAME.
which one of these can be considered as
D. Game a primary key?
19. The following are purpose of a database, A. NAME
which is NOT true? B. ID
A. To store data C. CITY
B. To create a responsive web page D. ID, NAME
C. To provide an organizational structure 25. The relationship between two entities can
for data be given using the lower and upper lim-
its.This information is called
D. To provide a mechanism for CRUD data
A. Cardinality
20. One or more very large databases contain- B. Composite entity
ing both detailed and summarized data for
C. Optional relationships
a number of years that is used for analysis
rather than transaction processing. D. Business rules
39. A data types which stores data and time B. Keep call records, monthly bills, main-
values from the year 100 through 9999. taining balances
A. Currency C. For storing customer, product and
B. Date/Time sales information
NARAYAN CHANGDER
40. Why would you create a primary key?
A. Menu Bar
A. To make each record in a database
unique B. Ribbon
B. To make each field in a database C. Navigation Pane
unique D. Quick access
C. To make each query in a database
46. Formatted summaries suitable for printing
unique
A. Table
D. none of above
B. Form
41. The key that can be used for data retrieval
is known as C. Report
NARAYAN CHANGDER
62. In a relational model, a row is known as C. Modules
D. Report
A. Domain
68. Which of the following is a Data Model?
B. Degree
A. Entity-Relationship model
C. Tuple
B. Relational data model
D. Attributes
C. Object-Based data model
63. The features of MS Access builds to pro- D. All of the above
vide helps topics and topics on tasks per-
form while working with Access. 69. Which of the following keys is generally
used to represents the relationships be-
A. Index
tween the tables?
B. Office Assistant A. Primary key
C. Query B. Foreign key
D. Report C. Secondary key
64. What are databases mainly used for? D. Non of the above
A. To store archived data 70. Which of the following provides the abil-
B. To store and organise data ity to query information from the database
and insert tuples into, delete tuples from,
C. To analyse data
and modify tuples in the database?
D. none of above
A. DML
65. Proponent of Entry-Relationship (ER) B. DDL
Model
C. Query
A. Ted Codd
D. Relational schema
B. Bill Gates
71. The personal database system assumes
C. Peter Chen
that no two transactions will happen at
D. none of above the same time on one table, which is
known as
66. For each attribute of a relation, there is a
set of permitted values, called the of A. Client Server
that attribute. B. Network
A. Domain C. Transaction
B. Relation D. Optimistic locking
72. If you were collecting and storing informa- B. It helps increase organisational acces-
tion about your music collection, an album sibility to data
would be considered a/an
C. Place where all meta data for 88. A collection of fields and records in a spe-
database is stored cific category
D. Provides direct control access to A. Record
database
B. Table
83. is a database management package C. Field
A. MS Excel D. none of above
NARAYAN CHANGDER
B. MS Word
89. Which of the following is generally used
C. Ms Access for performing tasks like creating the
D. MS Paint structure of the relations, deleting rela-
tion?
84. is an example of hierarchical data A. DML
model
B. Query
A. Doors and windows
C. Relational schema
B. Windows registry
D. DDL
C. RDM server
D. Jellyfish 90. The following are the functions of a DBMS
except
85. It let you access frequently access com- A. Creating database
mand.
B. Processing data
A. Navigation pane
C. Creating and processing forms
B. Quick access toolbar
D. Administrating database
C. Backstage view
D. Ribbon 91. What is database?
A. Collection of organized data that al-
86. is one of the oldest ways to maintain lows access, retrieval of that data.
records in a conventional file oriented data
collection system. B. Collection of organized data that al-
lows access, retrieval, and use of that
A. records data.
B. database C. Collection of organized data that al-
C. files lows retrieval, and use of that data.
D. none D. none of above
87. It is used to customized formats for adding, 92. An arrangement of data in a row and col-
editing, deleting or displaying data. umn
A. Field A. Record
B. Report B. Table
C. Macro C. Field
D. Form D. Form
93. a group of related data organized in 99. Data type used to store currency value and
columns and rows in a datasheet. numeric data used in mathematic calcula-
tions involving data with one to four deci-
98. Data resulting from questions you asked 103. The set of all possible values that a col-
from one or more tables umn may have is called as
A. Form A. Domain
B. Report B. Relation
C. Queries C. Degree
D. Field D. Metadata
104. A Database Management System (DBMS) 109. Which is the example of File Based Sys-
is tem?
A. Collection of interrelated data A. Using MySQL to find specific data
B. Collection of programs to access data B. Using MS Access to control users ac-
C. Collection of data describing one par- cess
ticular enterprise C. Using spreadsheet software to man-
D. All of the above age data of employee
NARAYAN CHANGDER
D. Using OpenOffice.org Base to create
105. Which of the following is a top-down new table
approach in which the entity’s higher
level can be divided into two lower sub- 110. Dbms stands for
entities?
A. Database management system
A. Aggregation
B. Database management storage
B. Generalization
C. Data base manipulation system
C. Specialization
D. Database manipulation storage
D. All of the above
111. Why we need database?
106. Course(course id, sec id,
semester)Here the course id, sec A. To store a particular picture
id and semester are and course is a B. To store a particular text
C. To store a particular collection of data
A. Relation, attribute .
B. Attribute, relation D. To store a particular audio
C. Tuples, relation
112. decides how the logical DB design is
D. Tuple, attribute
to be physically realised
107. Which one of these cannot be taken as a A. Data Administrator (DA)
primary key?
B. Database Administrator (DBA)
A. ID
C. Database Designers (Logical & Physi-
B. registration no cal)
C. Department ID D. Application Programmers
D. Street
113. The language in which users express
108. The language for expressing data mining requirements for creating databases is
and update requirements is called
A. Data manipulation language A. Data definition language
B. Data definition language B. Data manipulation language
C. Data update language C. Data Description Language
D. Database language D. Database language
NARAYAN CHANGDER
126. Data types where we can store files like C. Structural
digital photos
D. Relational
A. OLE Object
132. Data Manipulation Language enables
B. Hyperlink
users to
C. Attachment
A. Retrieval of information stored in
D. Lookup Wizard database
127. Types of Database System where sup- B. Insertion of new information into the
ports a small number of users(few than database
50) or specific department within an orga- C. Deletion of information from the
nization database
A. Enterprise Database D. All of the above
B. Centralized Database
133. I can perform an advanced search. I am
C. Workgroup Database very similar to asking a detailed question.
D. none of above A. report
128. The attribute refers to a of a table B. query
A. Record C. table
B. Foreign key D. form
C. Primary key 134. Which of the following gives a logical
D. Field structure of the database graphically?
A. Entity-relationship diagram
129. Which of the following in not a function
of DBA? B. Entity diagram
A. Network Maintenance C. Database diagram
B. Routine Maintenance D. Architectural representation
C. Schema Definition 135. A in a table represents a relationship
D. Authorization for data access among a set of values
136. Which one of the following commands is 141. Relational calculus is a language
used for removing (or deleting) a relation A. Non-procedural
forms the SQL database?
D. Application Programmers
A. Hierarchical database
138. Types of Database System designed to B. Object-oriented database
support companies day-to-day operations
C. Relational database
A. Data Warehousing database
D. Rational database
B. Distributed Database
144. It is a collection of data that is related to
C. Operational Database
a particular subject or purpose
D. none of above
A. Field
139. What is the difference between an entity B. Row
and an attribute? C. Column
A. An attribute is a table in a database D. Database
and an entity is a field
B. An attribute is a record in a database 145. Data types to store audio, video or other
and an entity is a table BLOBs files
147. The format of displaying the information 153. In which one of the following, the mul-
from a particular table is called tiple lower entities are grouped (or com-
A. Report bined) together to form a single higher-
level entity
B. Record
A. Specialization
C. Forms
B. Generalization
D. Database
C. Aggregation
148. The term is used to refer a row
NARAYAN CHANGDER
D. None of the above
A. Record
B. Primary key 154. Which one of the following keyword is
used to find out the number of values in a
C. Foreign key
column?
D. Field
A. Total
149. The database management system is B. Count
A. Software C. Sum
B. Data D. Add
C. Computer control program works
155. Which one of the following commands is
D. Information of the organization to be
used to restore the database to the last
managed
committed state
150. is a unique field by which records are A. Roll back
identified in a table.
B. Save point
A. Name
C. Committ
B. Field
D. Both A and B
C. Primary Key
D. None 156. Logically related data consists of these
EXCEPT
151. The term “TCL” stands for
A. attributes
A. Ternary Control Language
B. relationships
B. Transmission Control Language
C. entities
C. Transaction Central Language
D. variables
D. Transaction Control Language
152. Disadvantages of File systems to store 157. helps you retrieve information from
data is: table as when required.
A. Data redundancy and inconsistency A. Report
B. Difficulty in accessing data B. Database
C. Data isolation C. Record
D. All of the above D. Query
1.9 SQL
12. What is the OCR pseudocode keyword for C. DELETE FROM Persons WHERE First-
outputting to the screen? HINT:Same as Name = ‘Peter’
Python D. none of above
A. print
17. A is a database that subscribes to a
B. output model with information represented by ob-
C. display jects
D. show A. Relational Database
NARAYAN CHANGDER
B. Hierarchical Database
13. In order to delete data from a database,
C. Network Database
which of the following SQL statements
would you use? D. Object Oriented Database
A. COLLAPSE 18. Which of the query below is likely to run
into an error?
B. DELETE
A. SELECT FROM DataFlair;
C. REMOVE
B. SELECT name, emp id FROM
D. UPDATE DataFlair
14. A particular DBMS uses SQL for extracting C. SELECT name FROM DataFlair;
data. The SQL command “WHERE” is usu- D. SELECT * FROM DataFlair;
ally followed by:
19. Triggers are written to be executed in re-
A. a criteria sponse to any of the following events-
B. a table name A. A DML statement(insert or update or
C. a user name delete)
D. a mathematical formula B. A DDL statement
C. A database operation(startup, shut-
15. What is normalisation? down)
A. Making databases larger so that they D. All of the above
are easier to use
20. Which of the following data models de-
B. Analysing how to make databases
fines WHAT the system contains?
more efficient by using separate tables to
reduce redundant data A. Physical
16. With SQL, how can you delete the records 21. In what time will a railway time 60m long
where the “FirstName” is “Peter” in the moving at a rate of 36kmph pass a tele-
Persons Table? graph post on its way?
A. 9 sec
A. DELETE ROW FirstName=’Peter’
FROM Persons B. 8 sec
B. DELETE FirstName=’Peter’ FROM Per- C. 7 sec
sons D. 6 sec
22. Identify the total number of attributes in 27. A clause in the SELECT command that spec-
a relational data model. ifies the condition the records must sat-
isfy.
C. SELECT Empid FROM Emp; 30. Which operator is used to select values
within a range?
D. SELECT Empid WHERE empid=1001;
A. RANGE
25. Which SQL function is used to count the B. WITHIN
number of rows in a SQL query?
C. BETWEEN
A. COUNT()
D. None
B. NUMBER()
31. Which of the following system database
C. SUM()
occupies more space and memory?
D. COUNT(*)
A. Model
26. Which type of database management sys- B. Master
tem is Oracle /MySQL? C. Tempdb
A. Object-oriented D. Msdb
B. Hierarchical
32. Which of the following is used to modify
C. Relational the data stored in the database?
D. Network A. SELECT
33. Some SQL commands are. 38. How many 3 digits numbers can be formed
using the digits 1, 2, 3, 4, 5, 7, 9.
A. select, use, print, for
A. 343
B. select, order, create
NARAYAN CHANGDER
C. if, for, next B. 464
43. This symbol is an SQL wildcard that can 48. The FROM SQL clause is used to
substitute for one or more characters A. specify what table we are selecting or
when searching for data in a database.
46. Relationship between Primary key (P), Al- 51. Which of following SQL Wildcard repre-
ternate Keys(A), and Candidate keys(C) sents a single character in MS Access?
are: A. *
A. P=A+C B. ?
B. C=P+A C. !
C. A=P-C D.
D. A=P+C 52. Which is the most important system
database?
47. A integrity constraint requires that the
A. Northwind
values appearing in specified attributes of
any tuple in the referencing relation also B. Master
appear in specified attributes of at least C. Tempdb
one tuple in the referenced relation.
D. All of the mentioned
A. Referential
53. How many types of system databases are
B. Referencing present in SQL Server 2016?
C. Primary A. 3
D. None of the above B. 4
54. Which command will execute properly? 59. Assume that you have the follow-
ing:CREATE FUNCTION totalPaidBy-
A. INSERT INTO emp (101, ‘Melissa’, Cust(custID INT) ENDIf you want to
300); query the function, the command will be:
B. INSERT INTO emp VALUES (101, A. CALL totalPaidByCust(3);
Melissa, 300);
NARAYAN CHANGDER
B. SELECT totalPaidByCust(3);
C. INSERT INTO emp VALUES (101,
‘Melissa’, 300); C. EXECUTE totalPaidByCust(3);
D. None of the answer is correct
D. INSERT INTO emp VALUES (’101’,
Melissa, ‘300’); 60. What is the meaning of LIKE ‘%0%0%’
55. Which of the following are DDL com- A. Feature begins with two 0’s
mands? B. Feature ends with two 0’s
A. Create table, Insert into, Drop table C. Feature has more than two 0’s
B. Alter table, Update, Drop table D. Feature has two 0’s in it, at any posi-
C. Drop table, Alter table, Create table tion
D. None of the above 61. Who did Barry turn against when a meta
used Barry’s emotions against him?
56. To narrow a window function’s application
to a subgroup within a data set, use A. Arrow
A. OVER B. Vibe
B. SUBGROUP C. Reverse Flash
C. PARTITION BY D. none of above
D. SECTION 62. Which of the following is NOT a require-
ment of 1NF?
57. Which SQL statement is used to insert new
data in a database? A. It should only have single (atomic) val-
ued attributes/columns.
A. INSERT NEW
B. a Primary Key
B. ADD RECORD
C. One item of data per column in one row
C. INSERT INTO (i.e. no repeating data)
D. ADD NEW D. Data should be sorted in order
58. hat is the one thing we need to pay atten- 63. Fill in the blank space with the correct
tion to when we need to use constraints? preposition.I heard a glass breaking noise
A. Can be used with both Insert and in the living room and ran to see what hap-
Delete. pened. A pigeon flew thewindow and
B. Can be used with only Insert. broke it.
C. SELECT humidity = 89 FROM weather 80. Return all dramas made after 2004.
A. SELECT * FROM movies WHERE genre
D. SELECT city FROM weather = ‘drama’;
75. Which of the following join uses maximum B. SELECT * FROM movies WHERE genre
resources if there are large tables? = ‘drama’ AND year > 2004;
A. Left Join C. SELECT * FROM movies WHERE genre
= “drama’ AND year < 2004;
B. Right Join
NARAYAN CHANGDER
D. SELECT * FROM movies WHERE imdb
C. Cross Join
rating = 7 AND LIMIT = 7
D. Inner Join
81. When defining a table, each field name has
76. RDBMS consist a collection of? both a
A. Tables A. table name and a database
B. Fields
B. command and an argument
C. Records
C. goal and a purpose
D. Keys
D. name and a data type
77. How many times did barry go back in time
to save his mother? 82. Use what to separate multiple table names
in the FROM clause?
A. 1
A. commas
B. 5
B. periods
C. 3
D. 2 C. spaces
D. semicolons
78. Which of the following options is not true
about a WINDOW clause? 83. When examining a row in a table, we refer
A. It avoids repetition when creating mul- to it as a
tiple window functions A. row number
B. It comes before the ORDER BY clause B. result number
C. It can create an alias for shared PAR-
C. record
TITION BY and ORDER BY clauses
D. result
D. It comes before the WHERE clause
79. What is the circumference of a circle with 84. If you don’t specify ASC or DESC after a
a diameter of 16.5 inches? Round to the SQL ORDER BY clause, the following is
nearest tenth. used by default
A. 103.62 A. ASC
B. 33 B. DESC
C. 51.81 C. There is no default value
D. 25.91 D. None of the mentioned
85. Which fixed server role should be re- 90. With SQL, what wildcard symbol do you
garded as equivalent to sysadmin because use to select all the columns from a table
of its ability to assign server principals to named “Persons”?
NARAYAN CHANGDER
96. The command is used to completely re- if the key from one relation Is used as
move a table from the database. an attribute in that relation.
A. INSERT A. Candidate
B. ALTER B. Primary
C. DROP C. Alternate
D. CREATE D. None of the above
97. What is the commands that maintain and 103. Which command will delete your table
query a database from the database?
A. DCL A. DROP
B. DDL B. DELETE
C. DML C. TRUNCATE
D. SQL D. MERGE
98. At what degree will the hour hand of a 104. It is a flexible language that is used to
clock will be at one minute? communicate with a relational database
A. 30 deg such as MariaDB
B. 1/2 deg A. Java
C. 3/4 deg B. PhpMyAdmin
D. 360 deg C. SQL
99. Sorting of relations that do not fit in mem- D. MariaDB
ory is called as
105. What is data redundancy?
A. Internal sorting
A. Data that is repeated multiple times.
B. External sorting
B. Data that is safe from SQL attacks.
C. Overflow sorting
C. Data that is weak to SQL attacks.
D. Overload sorting
D. Data that has no use anymore.
100. A DBMS is a
106. What does data validation do?
A. Database management system
A. Checks that an input fits certain param-
B. Database multi system eters such as length.
C. Data set management system B. Checks that inputted data is com-
D. Database merger system pletely correct.
C. Checks that there is no redundant data 112. The c.p of 10 pens is equal to s.p of 12
in a field. pens.Find his gain% or loss%.
NARAYAN CHANGDER
124. How many Primary key a table can max
C. Alter have?
D. Modify A. Depends on no of Columns
B. Only 2
119. Command to open an existing database
C. Only 1
A. SHOW DATABASES
D. Depends on DBA
B. USE
125. Which all languages support the integra-
C. SHOW TABLES
tion of SQL with them?
D. none of above A. Java
120. Which type of driver provides JDBC ac- B. C++
cess via one or more ODBC drivers? C. Python
A. Type 1 driver D. All of these
B. Type 2 driver 126. Which of the following language is used
C. Type 3 driver to specify database Schema?
A. DDL
D. Type 4 driver
B. DML
121. SELECT * FROM students; This will show C. DCL
A. 1 record from the “students” table D. None
B. all the records in the “students” table 127. Which of the following type of database
management systems stores objects
C. first 10 records of “students” table rather than data such as integers, strings,
or real numbers?
D. all the boys in the table “students”
A. Relational
122. What permission enables a user to B. Flat-File
change the definition of a stored proce-
C. Hierarchical
dure?
D. Object-Oriented
A. CHANGE
B. CHANGE DEFINITION 128. How many times in a day are the hands
of a clock in a straight line but opposite in
C. ALTER direction?
D. none of above A. 20
139. In what order does SQL process the in- C. Capitalize action
structions? D. None of these
A. FROM-SELECT-WHERE-ORDER BY
145. Which of the following attributes can be
B. WHERE-FROM-SELECT-ORDER BY
considered as a choice for a primary key?
C. SELECT-FROM-WHERE-ORDER BY
A. Name
D. SELECT-FROM-ORDER By-WHERE
B. Street
140. What word is missing from the line be-
NARAYAN CHANGDER
C. RollNo
low? SELECT * CUSTOMER WHERE
Name = “Bob”; D. Subject
150. What is a field? 155. Which data type should you use for the
BIRTHDAY column in STUDENTS table?
A. A collection of information
NARAYAN CHANGDER
161. Which SQL query would display all pupils B. 3
surnames and registration class?
C. 5
A. SELECT * FROM Pupils
D. 2
B. SELECT * FROM Pupils WHERE sur-
name, regiClass 167. Which of the following is an invalid
C. SELECT surname, regiClass datatype?
D. SELECT surname, regiClass FROM A. varchar
Pupils
B. varchar2
162. SQL Query to delete all rows in a table C. int
without deleting the table (structure, at-
tributes, and indexes) D. float
A. DELETE FROM table name; 168. Which is the correct DDL group
B. DELETE TABLE table name;
A. CREATE, DELETE, DROP
C. DROP TABLE table name;
B. ALTER, DROP, INSERT
D. None
C. UPDATE, SELECT, DROP
163. enforces rules in your table.
D. CREATE, DROP, ALTER
A. Constraints
B. Data Types 169. Which of the following is a SQL aggre-
gate function?
C. SQL Statements
A. LEFT
D. Keywords
B. LEN
164. Less than or equal to?
C. AVG
A. >=
D. none of above
B. =>
C. =< 170. Select the term used to identify all rows
prior to the current row in a partition.
D. <=
A. UNBOUNDED BEGINNING
165. The string function that returns the index
of the first occurrence of substring is B. BOUNDED BEGINNING
A. INSERT() C. UNBOUNDED PRECEDING
B. INSTR() D. BOUNDED PRECEDING
182. What would this SQL query display? SQL 187. Which command is used for removing a
* FROM Pupils table and all its data from the database:
A. It would display pupils who have a * in A. Create command
their name. B. Drop table command
B. It is not a SQL statement. C. Alter table command
C. It would display all records from the D. All of the mentioned
Pupils table.
NARAYAN CHANGDER
D. It would not display any pupils. 188. Duplicate records can be eliminated using
A. TRIM B. SCL
B. CROP C. DCL
C. NOSPACE D. DDL
194. If you don’t specify ASC or DESC after 199. The distance that an automobile travels
a SQL ORDER BY clause, the following is varies directly as the time it travels. If
used by default the car travels 280 miles in 7 hours, how
far will it travel in 12 hours?
A. ASC
B. DESC A. 480
NARAYAN CHANGDER
B. EXISTS operator
203. Schools use SIMS database to store infor- C. LIKE operator
mation about students. Which will not be
inside the student details table? D. none
207. A data type that can only hold 2 values B. SELECT DIFFERENT
e.g. Yes/No or True/False. C. SELECT INDEX
A. Boolean D. SELECT DISTINCT
213. The SQL command to choose the data to 219. Which statement is used to count number
be displayed in a query of rows in table?
224. What language does the Relational 229. Extract, Transform, Load (ETL) process,
Model use? which can be implemented by the using
which tool. Choose the correct answer
A. Java
A. ETL tool
B. Python
B. TLE tool
C. SQL
C. LTE tool
D. C++
D. none of above
NARAYAN CHANGDER
225. Advantage of 3NF?
230. What does UNION operator do in a SQL
A. It eliminates redundant data which in statement?
turn saves space and reduces manipula-
A. Bring all distinct from the listed tables
tion anomalies.
B. It gives the data status.
B. Bring all data from the listed tables
C. It allows the tables to be queried in C. Bring data which is not common from
SQL. the listed tables
D. It prevents any new updates. D. Bring common data from the listed ta-
bles
226. The correct order of keywords in an UP-
DATE SQL statement is? 231. In a column named “age”, containing val-
A. UPDATE, SET, WHERE ues 4, 5, 6, the SQL statement “SELECT
SUM(age) FROM students;” will return,
B. UPDATE, WHERE, SET
A. 3
C. SET, WHERE, UPDATE
B. 15
D. WHERE, UPDATE, SET
C. 0
227. The Operation allows the combining D. 1
of two relations by merging pairs of tuples.
One form each relation into a single tuple. 232. Which of the following is the most impor-
tant feature of DBMS:
A. Select
A. Command language like SQL
B. Intersection
B. Ability to back up data
C. Union
C. Ease of use
D. Join
D. Ability to automate some tasks
228. What is def in the following statement? 233. In the keyword WHERE of the Select
CREATE TRIGGER abc ( )( ) ON def which operators can be used?
FOR EACH ROW ghi;
A. AND, OR, NOT
A. trigger name
B. Relational operators
B. table name
C. AND, OR, NOT and relational operators
C. trigger statement
D. none of above D. NONE
NARAYAN CHANGDER
D. delete only one row at a time
tween entities is implemented by storing
the primary key of one entity as a pointer 251. How would you DELETE records from the
or in the table of another entity. Items table with a “Chair” Type?
A. DELETE ‘Chair’ FROM Items
A. primary key
B. DELETE Type FROM Items WHERE
B. foreign key
Type = ‘Chair’
C. unique key
C. DELETE FROM Items WHERE Type =
D. not null key ‘Chair’
246. Most likely at your future job you will D. DELETE ITEMS WHERE Type = ‘Chair’
need to ? 252. Which of the following is/are NOT Azure
A. Extract data from a database Core Storage?
B. Design a database A. Azure Queues
C. Manage a database B. Azure HPC Cache
D. none of above C. Azure Disks
D. Azure Files
247. Which SQL statement is used to delete
data from a database? 253. How is a Primary key attribute shown?
A. REMOVE A. Underlined
B. COLLAPSE B. Ellipses
C. DELETE C. Double lined Ellipses
D. DROP D. a Line
256. Which of the following is NOT an exam- 261. What is the result of the following
ple of Data Manipulation Language? code:SELECT top 10 * FROM CARS
260. Which is an example of Data Manipula- 265. Which SQL keyword is used to sort the
tion Language (DML) command? result-set?
A. CREATE A. ORDER
B. INSERT B. SORT BY
C. ALTER C. ORDER BY
D. DROP D. SORT
266. As soon as Bob heard his boss coming, he C. filtered by, foreign key
jumped his chair and pretended he was
D. aggregate function, where clause
working
A. inside 272. What is the purpose of SQL?
B. under A. To communicate with a game
C. down B. To communicate with aliens
D. for
C. To communicate with a database
NARAYAN CHANGDER
267. NULL is D. To communicate with a base
A. no value
B. zero 273. Which SQL keyword is used to retrieve a
maximum value?
C. spaces
A. MOST
D. none of above
B. TOP
268. select RIGHT(”Informatics Practices”,
5);will return C. MAX
A. secit D. UPPER
B. scita
274. hich of the following statements about
C. tices the MAX function in SQL are true?
D. none of above A. Can be used on any datatype.
269. You can use SSMS to create jobs or you B. Returns the max value of the attribute.
can execute which system stored proce-
dure. Choose one
C. It is an aggregate function.
A. sp add job
D. All of the above statements are true.
B. sp execute job
C. sp run job 275. Using which word allows you to spec-
D. none of above ify that only one of a series of conditions
needs to be met in a query filter?
270. Match the following SQL term with a A. And
description-SELECT
B. Maybe
A. The fields to display
B. The table used in the query C. If
C. The criteria which must be met D. Or
D. The field and order used to sort the re-
276. delete * from employee;
sults
A. Deletes all tuples.
271. To join a table, connect the of one ta-
ble to the of the other. B. updates the table emp with null.
A. primary key, foreign key C. Destroys the table.
B. group by clause, primary key D. select all the record
NARAYAN CHANGDER
289. standard date format of oracle sql
accuracies.
A. YY-MON-DD
B. Remove additional records from the ta-
B. DD-MON-YY bles.
C. DD-MM-YYYY C. Add as much data as they like.
D. DD/MM/YYYY D. Draw an ERD.
290. To identify potentially corrupt pages, you 295. Match SQL language with SQL com-
can use the following command, Choose mands1)DDL i)Revok, Grant2)DML
one ii)rename a table3)TCL iii)insert, up-
A. DBCC CHECKDB date4)DCL iv)rollback, commit
B. DB0 CHECKDB A. 1-iii, 2-i, 3-ii, 4-iv
C. DB-OWNER CHECKDB B. 1-iii, 2-ii, 3-iv, 4-i
D. none of above C. 1-ii, 2-iii, 3-iv, 4-i
291. level describes what data is stored in D. 1-i, 2-iii, 3-ii, 4-iv
the database and the relationships among 296. Consider the below emp table with
the data. the data.EMPNO ENAME DEPTNO7369
A. Physical SMITH 207499 ALLEN 307654 MARTIN
B. Logical 307839 KING 107900 ALLEN 30What is
the output of the following query? SELECT
C. Conceptual ename FROM emp WHERE ename = (SE-
D. None of the Above LECT MIN(ename) FROM emp);
292. If two dice are thrown together, then the A. ename ALLEN
probability of getting an even number on B. ALLEN
one die and an odd number on other die is C. Error
A. 1/4 D. none of above
B. 1/2
297. Which of the following query finds em-
C. 3/4 ployees with an experience more than 5?
D. 3/5 A. Select * From DataFlair where experi-
293. A single backup can target more than one ence>5;
backup device. Up to how many devices. B. Select * From DataFlair;
Choose the correct answer. C. Select * From DataFlair where experi-
A. 64 ence>=5;
NARAYAN CHANGDER
a database, including creating, altering, C. ERASE
and dropping tables and establishing con- D. EDIT
straints
A. DCL 316. The MIN() function returns in the
given column.
B. DDL
A. the largest value
C. DML
B. the last value
D. SQL
C. the total sum value
311. Which word is missing from the following
SQL statement? Select * table name D. the smallest value
A. With 317. monthname(2020/04/07) will return
B. Where the value
C. From A. 4
D. And B. 7
312. Find all the cities whose humidity is 89 C. April
A. SELECT city WHERE humidity = 89; D. none of above
B. SELECT city FROM weather WHERE hu-
midity = 89; 318. Which of the following is not a part of
CRUD operations in SQL?
C. SELECT humidity = 89 FROM weather;
A. Creating a table.
D. SELECT city FROM weather B. Deleting records from the table.
C. Creating a copy of a table.
313. Less redundancy & errors occur in a
? D. Updating the data stored in the table.
A. Spreadsheet
319. If you did not include a WHERE clause in
B. Word Processor your UPDATE table command, what will
C. Database happen to the records?
D. Slideshow A. All records will be updated.
321. The table returned by the sys.fn get C. Structured Querying Language
audit file function returns how D. Structural Query Language
many columns. Choose the correct answer
A. 10 327. What is the full form of SQL?
322. Fill in with the correct past partici- D. Structuring Query Language
ple.Perhaps she would have been by
that dog if its owner hadn’t been faster 328. Which of the following clause allows us
and caught him right on time. to extract data in a range?
A. bit A. Between
B. bite B. Range
C. bitten C. Find In
D. bitted D. Like
323. Which of the following is not a data type 329. The backups on an individual device
in SQL? within a media set are referred to
A. int as:Choose the correct answer
B. Varchar A. a media family
C. Image B. a backup family
D. blob C. a backup set
324. A row in a database table is called a D. none of above
A. Field
330. Present ages of John and Dina are in the
B. Record ratio 5:4 respectively.Three years hence,
C. Column the ratio of their ages will become 11:9 re-
spectively. What is Dina’s age in years?
D. Entity
A. 24
325. Which symbol would you use to repre-
sent more than 50 B. 27
A. = 50 C. 40
B. < 50 D. Cannot be determined
331. Match the following SQL term with a 336. What will be the output of the
description-FROM query:Select Substring(’mysql applica-
tion’, 3, 3)
A. The criteria which must be met
A. app
B. The fields to display
B. mysql
C. The field and order used to sort the re-
sults C. application
NARAYAN CHANGDER
337. The average value of the given numeric
332. Which of the following is not a DBMS de-
column is calculated by using function.
spite having database capabilities:
A. GETAVG()
A. Microsoft Excel or similar spread-
sheets B. FINDAVG()
B. Oracle C. AVG()
D. AVGVALUE()
C. MySQL
D. Microsoft Access or similar 338. In a table, a record is
A. a group of data about one thing, one
333. Which database is used as template for person or one event.
all databases?
B. a compilation of songs to play
A. Northwind
C. a plastic sheet with data on it
B. Master
D. none of above
C. Tempdb
339. Which of the following is not a system
D. Model database?
334. By default, SQL Server retains backups A. Northwind
of many previous logs. Choose the correct B. Master
answer.
C. Tempdb
A. 3
D. All of the mentioned
B. 6
340. Which command is used to view the struc-
C. 9 ture of the table?
D. 12 A. SELECT * FROM <tableName>;
344. SQL has how many main commands for 349. A train 240 metres long passes a pole in
DDL: 24 seconds. How long will it take to pass
a platform 650 m long?
A. 1
A. 65 sec
B. 2
B. 89 sec
C. 3
C. 100 sec
D. 4
D. 150 sec
345. Which of the following can be imple-
mented? 350. Trigger is invoked before/after data row
is:
A. Conjunctive selection using one index
A. deleted
B. Conjunctive selection using composite
index B. updated
C. Conjunctive selection by intersection C. inserted
of identifiers D. all answers are correct
D. All of the mentioned
351. Which is the database created in our pre-
346. SQL query to find the temperature in in- sentation?
creasing order of all cities.
A. Hindi
A. SELECT city FROM weather ORDER BY
B. Movie
temperature
B. SELECT city, temperature FROM C. Shahrukh Khan
weather D. Aamir khan
352. The primarykey attributes are required C. SELECT ALL FROM employees;
to be and D. none of above
A. not null and repeated values
358. The sum of present ages of 2 persons A
B. null and unique values and B is 60.If the age of A is twice that
C. not null and unique values of B, Find the sum of their ages 5 years
hence.
D. none of above
A. 50
NARAYAN CHANGDER
353. When examining a column in a table, we B. 60
refer to it as a
C. 70
A. field name D. 80
B. folder name
359. What is the correct definition of a Field?
C. column number
A. Uniquely identifies any record in a ta-
D. table name ble
354. What does the len() function do? B. It is always a number
A. Gets the length of a string or list C. Used to store all of the data about each
specific item
B. Gets the character code for a charac-
D. Used to store a category (e.g. Names
ter
/ Gender / Mobile Num)
C. Converts a character into a character
code 360. Which is the subset of SQL commands
used to manipulate Oracle Database struc-
D. Would you like a muffin? tures, including tables?
355. In Relational Database Model, a table is A. Data Definition Language(DDL)
also referred to as a B. Data Manipulation Language(DML)
A. tuple C. Both a and b
B. attribute D. None
C. relation 361. The result of a SQL SELECT statement is
D. degree a
A. file
356. What is the name of the SQL database
the comes distributed with Python? B. report
A. SQLite C. table
D. form
B. PySQL
C. MySQL 362. With SQL, how do you select a column
named “FirstName” from a table named
D. PostgreSQL “Persons”?
357. Which of the following will display all the A. EXTRACT FirstName FROM Persons
records in EMPLOYEES table? B. SELECT Persons.FirstName
A. SELECT salary FROM employees; C. SELECT FirstName FROM Persons
B. SELECT * FROM employees; D. SELECT * FROM Persons
363. SELECT MAX(price)FROM PRODUCTwill 368. Which of the following is NOT a compo-
return how many rows? nent of a Database?
364. In relational data model, the total num- 369. Match the following SQL term with a
ber of rows can be identified as . description-ORDER BY
A. Cardinality A. The fields to display
B. Degree B. The field and order used to sort the re-
sults
C. Attribute
C. The table used in the query
D. Entity
D. The criteria that must be met
365. Which word is missing from the follow-
ing SQL statement? Select * from table 370. The SQL WHERE clause:
name where <condition> Having <con-
A. limits the column data that are re-
dition>
turned.
A. With
B. limits the row data are returned.
B. Order by
C. Both A and B are correct.
C. Group by
D. Neither A nor B are correct.
D. IN
371. Which of the following is NOT a type of
366. Which of the following is true about the SQL constraint?
RDBMS?
A. PRIMARY KEY
A. RDBMS stands for the Relational
B. ALTERNATE KEY
Database Management System.
C. FOREIGN KEY
B. RDBMS is mandatory to use to create
a database. D. UNIQUE
C. Both a and b. 372. Which of the below queries results have
D. None of these. only 10 rows being shown in the result
displayed?
367. How do you display the number of
A. SELECT * FROM DataFlair;
rows?
B. SELECT name, emp id FROM
A. ASC
DataFlair Display 10;
B. FILTER
C. Select name, location from DataFlair
C. COUNT LIMIT 10;
D. SELECT D. Select Count(name) FROM DataFlair;
373. What earth is HR from? 379. Which type of Statement can execute pa-
A. Earth 1 rameterized queries?
B. Earth 38 A. PreparedStatement
C. Earth 3 B. ParameterizedStatement
D. Earth 19 C. ParameterizedStatement and
CallableStatement
374. What type of data is stored as REAL?
D. All kinds of Statements (i.e. which im-
NARAYAN CHANGDER
A. Whole numbers plement a sub interface of Statement)
B. Decimal numbers
380. SQL means
C. Strings
A. Sequential Query Language
D. Yes / No True / False
B. Structured Query Language
375. Database tables store data about real C. Structured Query Language
world things called
D. Structured Query Language
A. Entities
B. Tables 381. Which operator selects values within a
given range?
C. Records
A. AND
D. Fields
B. LIKE
376. A and B can complete a work in 6 days.A C. SELECT
can alone do it in 10 days.Then B can alone
do the work in how many days? D. BETWEEN
A. 13.75 days 382. What does DROP means?
B. 14 days A. rearrange
C. 15 days B. delete
D. 16 days C. sort
377. In the ER model, what denotes a Relation- D. filter
ship between the entities?
383. Learning SQL is like learning ?
A. Double ellipse.
A. mathematics
B. Diamond
B. geography
C. Rectangle.
C. biology
D. Circle
D. a foreign language
378. With SQL, how do you select all the
columns from a table named “Persons”? 384. What does * mean when writing code?
A. SELECT Persons A. Select all columns
B. SELECT [all] FROM Persons B. Select all rows
C. SELECT * FROM Persons C. Select all genres
D. SELECT *.Persons D. Select jaskfjfjfjsfjiosjisjfjsfjsfjkjsk
B. Will give you last name information 401. In this type of database model, the
C. Will give you Name information schema, is represented using nodes and re-
lationship types and is not restricted to be-
D. none of above ing a hierarchy or lattice
396. DBMS allows a user to do all of these A. Relational Database
tasks except:
B. Hierarchical Database
A. Speed up the operation of a computer
C. Network Database
NARAYAN CHANGDER
B. Create a blank database table
D. Object Oriented Database
C. Extract a data set from a number of ta-
bles
402. Complete the solution:Select * ‘table
D. Produce reports that combine and name
summarise the data.
A. from,
397. Which is the subset of SQL commands
B. , from
used to manipulate database structures in-
cluding tables C. from ;
A. DML D. ; from
B. DDL
403. The SQL command to choose which tables
C. Both of the above
the data for the query will be taken from
D. None
A. SELECT
398. What type of data is stored as Boolean?
B. WHERE
A. Whole numbers
C. FROM
B. Decimal numbers
D. SHOW
C. Strings
D. Yes / No True / False 404. If you were wanting to filter data, which
clause would you use?
399. Which character returns all the data
found in a table? A. Where
A. % B. Order by
B. # C. From
C. * D. Select
D. /
405. What is the correct order of clauses in a
400. Which of the following query would limit SQL statement?
the output to 5 rows?
A. SELECT, FROM, ORDER BY, WHERE
A. SELECT * FROM DF 5;
B. SELECT * FROM DF LIMIT 5; B. SELECT, FROM, WHERE, ORDER BY
406. SELECT * FROM employee WHERE C. Null value just means that data of that
salary>10000 AND dept id=101;Which attribute is not available.
of the following fields are displayed as
C. To change the contents of records in a 414. In a scenario where you need your Azure
table Database for the PostgreSQL server which
D. To change the structure of a table is deployed on PREMISE, to have high per-
formance on multiple regions, what de-
409. What is the most common type of join? ployment mode would you choose?
A. INSIDE JOIN A. Hypervisor
B. JOINED TABLE B. Hyperscale
C. INNER JOIN C. RDS
D. JOINED D. Flexible Server
410. Which is not an aggregate function? 415. The primary key must be
A. SUM() A. Unique
B. POW() B. Not null
C. AVG() C. Both Unique and Not nul
D. COUNT() D. Either Unique or Not null
411. Which of the following is true about NULL 416. Which system view provides catalog
values in SQL? information about existing credentials.
A. A NULL value means zero. Choose the correct answer.
NARAYAN CHANGDER
“$er$” D. Grandma
C. SELECT * FROM Pupils Where Name =
“%er%” 423. In order to modify data in a database we
D. SELECT * FROM Pupils Where Name = would use which SQL statement?
“er%” A. Update
418. Below are the procedural SQL that can B. Amend
be used to enhance the power of SQL, EX-
CEPT: C. Alter
A. Triggers D. Modify
B. Stored procedures
424. Which of the following operator is used
C. Function to extract pattern matching data from the
D. View database?
427. The SQL statement that queries or reads C. SELECT Username, Password WHERE
data from a table is . Username = ‘user1’
438. If a:b=7:5 and b:c=9:11.Find a:b:c. B. select, where, having, group byselect,
A. 63:14:55 having, where, group by
NARAYAN CHANGDER
DECLARE x number:= 4; BEGIN LOOP dbms
output.put line(x); x:= x + 1; exit B. Remove that field name from the query
WHEN x > 5; END LOOP; dbms out-
put.put line(x);END;
C. Require unique fieldnames for all
A. 456
D. No such thing as ambiguous error
B. 45
445. Which is an example of Data Definition
C. 4
Language (DDL) command?
D. None of the above
A. INSERT
440. The command is used to modify B. DELETE
columns in a table
C. CREATE
A. DROP
D. UPDATE
B. INSERT
C. ALTER 446. The SUM() function returns
D. CREATE A. some random values from the given
column
441. Which command is used to select only one
B. the total number of columns in the
copy of each set of duplicate rows.
database
A. Select distinct
C. the total number of tables in the given
B. Select Unique databases
C. Select different D. the total sum of a given numeric col-
D. All of the above umn
B. SUM, AVG, MIN, MAX, MULT 454. A relational algebra operation annotated
C. SUM, AVG, MULT, DIV, MIN with instructions on how to evaluate it is
called
452. The operation, denoted by-, allows 457. What is the correct answer?
us to find tuples that are in one relation
but are not in another. A. Select * from “Database”
NARAYAN CHANGDER
A. One primary key and more than one
D. none of above
candidate key
B. One candidate key and one primary key 466. Which of these is not an advantage of us-
ing an electronic database?
C. More than one primary, alternate keys A. Faster to find information
B. Easy to move information-portable
D. One candidate key only.
C. Could be hacked
461. An SQL command used to add record in a D. Can keep a back-up copy
table.
A. Insert 467. A is an organized collection of struc-
tured data.
B. Create
A. information
C. Update
D. Add B. file
C. database
462. After you create the job, SQL Server
stores the job definition in which database, D. DBMS
choose one
468. What is a candidate key in MySQL?
A. the sqldb
A. Used to identify a column
B. the msdb
B. Alias for foreign key
C. the dbo
C. Alias for primary key
D. the master db
D. Used to uniquely identify a row
463. A database entity is also known as:
A. a table 469. You want to run a MySQL database in
an IaaS environment in which you’ll cre-
B. a field
ate new instances as quickly as possible.
C. a row Should you use virtual machines or contain-
D. a report ers?
A. Use containers.
464. Which example of the field name below
is in camel case? B. Use virtual machines.
A. First Name C. Use either.
B. firstName D. none of above
D. @ D. data
481. What sum of money will produce Rs.70 B. An exact match is not possible in a SE-
as simple interest in 4 years at 3 1/2 per- LECT statement.
cent? C. An exact match is necessary in a CRE-
A. Rs 525 ATE statement.
B. Rs 500 D. An exact match is not possible in a CRE-
C. Rs 550 ATE statement.
NARAYAN CHANGDER
which is the better program, spreadsheets
482. Which of the following model describes or databases?
HOW the system will be implemented us-
ing a specific DBMS system? A. spreadsheets
A. Physical B. databases
B. Conceptual C. Depends
NARAYAN CHANGDER
B. SELECT UNIQUE
C. $60
C. SELECT DIFFERENT
D. $10
D. none of above
503. In relational model the row of a tables
known to be? 506. A database is
A. Relation A. A collection of files
B. Entity Field B. A persistent, organised store of data
C. Tuple
C. An unstructured collection of data
D. Attribute
D. A folder containing related files
504. What is the purpose of the SQL AS
clause? 507. SELECT statement is a in SQL
A. The AS SQL clause is used to change A. Data Control Language(DCL)
the name of a column in the result set or
B. Transcation Control language(TCL)
to assign a name to a derived column
C. Data Manipulation language(DML)
B. The AS clause is used with the JOIN
clause only D. Data Definition language(DDL)
C. proceeds with next instruction or halts 10. The language of all words with at least 2
a’s can be described by the regular expres-
sion
16. Consider the grammar:S-> ABCc | AbcBA- D. not equal number of a’s and b’s
> ABBb-> bbAb-> abAa-> aa Which of the
following sentences can be derived by this 21. Which of the following allows stacked val-
grammar ues to be sub-stacks rather than just finite
symbols?
A. abc
A. Push Down Automaton
B. aab
C. abcc B. Turing Machine
C. Nested Stack Automaton
NARAYAN CHANGDER
D. abbb
D. None of the mentioned
17. string is accepted by a PDA when
A. Stack is empty 22. In context to the process of removing use-
less symbols, which of the following is cor-
B. Acceptance state
rect?
C. Both (a) and (b)
A. We remove the Nullable variables
D. None of the mentioned
B. We eliminate the unit productions
18. Following context free grammarS-> aB |
C. We eliminate products which yield no
bA A->b | aS | bAAB-> b | bS | aBB gener-
terminals
ates strings of terminals that have
D. All of the mentioned
A. equal number of a’s and b’s
B. odd number of a’s and odd number b’s 23. Languages of a automata is
A. If it is accepted by automata
C. even number of a’s and even number B. If it halts
of b’s
C. If automata touch final state in its life
D. odd number of a’s and even number of
time
a’s
D. All language are language of automata
19. The context-free languages are closed
for:(i) Intersection (ii) Union(iii) Comple- 24. Any string of terminals that can be gener-
mentation (iv) Kleene Star ated by the following CFG isS→ XYX→
A. (i) and (iv) aX | bX | a Y→ Ya | Yb | a
B. (i) and (iii A. has atleast one ‘b’
C. (ii) and (iv) B. should end in a ‘a’
D. (ii) and (iii) C. has no consecutive a’s or b’s
20. The following CFG S→aB|bA A→a|as|bAA D. has atleast two a’s
B→b|bs|aBBgenerates strings of termi- 25. Concatenation Operation refers to which
nals that have of the following set operations:
A. equal number of a’s and b’s
A. Union
B. odd number of a’s and odd number of
B. Dot
b’s
C. even number of a’s and even number C. Kleene
of b’s D. None
26. The logic of pumping lemma is a good ex- 32. Pushdown automata can recognize lan-
ample of guage generated by
37. Consider a grammar with the following 42. Which of these functions happens NEXT on
productions S→ aab | bac | aB S → α S | a Turing machine after READING a sym-
b S → α b b | ab Sα → bdb | b The above bol and considering its matching transition
grammar is rule.
A. Context free A. writes the replacement symbol
B. regular B. moves the tape one cell left/right
NARAYAN CHANGDER
D. LR ( k )
D. clears the current tape cell
38. A can also be described as a sequence 43. Which of the technique can be used to
of pattern that defines a string prove that a language is non regular?
A. regular expression A. Ardens theorem
B. regular Language B. Pumping Lemma
C. regular formula C. Ogden’s Lemma
D. regular grammar D. None of the mentioned
NARAYAN CHANGDER
ular 65. Given grammar:S→aA A→a A→B B→
A B→bb Which of the following is the
C. Both (a) and (b) production of B after simplification by re-
D. None of the mentioned moval of unit productions?
A. A
60. A FSM (Finite State Machine) with outputs
is called a B. bb
A. Mealy Machine C. aA
B. Finite State Machine with Output D. A| bb
C. Mechanical Machine 66. Which of the following is false for an ab-
D. Making Machine stract machine?
A. Turing machine
61. If all the production rules have single non-
terminal symbol on the left side, the gram- B. theoretical model of computer
mar defined is C. assumes a discrete time paradigm
A. context free grammar D. all of the mentioned
B. context sensitive grammar 67. Regular grammar is
C. unrestricted grammar A. context free grammar
D. phrase grammar B. non context free grammar
62. Which among the following is not a part of C. english grammar
the Context free grammar tuple? D. none of the mentioned
A. End symbol
68. A program can be tested for errors using
B. Start symbol what type of table?
C. Variable A. Trace
D. Production B. Track
C. Trail
63. The language accepted by a Turing machine
is called D. Trawl
A. a) Recursive Ennumerable 69. John is asked to make an automaton which
B. b) Recursive accepts a given string for all the occurrence
of ‘1001’ in it. How many number of
C. Both (a) and (b) transitions would John use such that, the
D. None of the mentioned string processing application works?
81. Which kind of proof is used to prove the 87. The Value of n if Turing Machine is defined
regularity of a language? using n-tuples
A. Proof by contradiction A. 6
B. Direct proof B. 7
C. Proof by induction
C. 8
D. None of the mentioned
D. 5
82. A turing machine is a
NARAYAN CHANGDER
A. real machine 88. A class of language that is closed under
B. abstract machine A. union and complementation has to be
C. hypothetical machine closed under intersection
86. If L1, L2 are regular and op(L1, L2) is also 91. What are the three different type of data
regular, then L1 and L2 are said to be you should use for testing?
under an operation op.
A. Normal, boundary, extreme
A. open
B. closed B. Novelle, bound, exponential
103. The sum of minimum and maximum num- 109. Which of the following statements are
ber of final states for a DFA n states is correct for a concept called inherent ambi-
equal to: guity in CFL?
A. n+1 A. Every CFG for L is ambiguous
B. n B. Every CFG for L is unambiguous
C. n-1 C. Every CFG is also regular
D. n+2 D. None of the mentioned
NARAYAN CHANGDER
104. A null production can be referred to as: 110. The stages in software development (for
A. String the AQA A-Level syllabus) are
B. Symbol A. Analysis Design Implementation Test-
ing Evaluation
C. Word
D. all of the mentioned B. Feasibility Design Programming Docu-
mentation Evaluation
105. In Reverse Polish notation, the expres- C. Idea Design Coding Testing Use
sion A*B+C*D is written as
D. Discuss Plan Implement Test Release
A. A*BCD*+
B. AB*CD+* 111. Which of the following does a Turing ma-
chine NOT consist of?
C. AB*CD*+
A. infinite input tape
D. A*B*CD+
B. sensing read/write head
106. (a+b)* is equivalent to
C. states and transition functions
A. b*a*
D. none of the mentioned
B. (a*b*)*
C. (a*b*)* 112. If NFA of 7 states is converted into DFA,
maximum possible number of states for
D. a*b* the DFA is?
107. is represented by double circle. A. 64
A. Initial state B. 132
B. Intermediate State C. 128
C. Final state D. 127
D. Null State
113. What does a structured approach to pro-
108. In computational thinking, representa- gramming improve?
tional abstraction is the process of A. Clarity and maintainability
A. removing unnecessary detail B. The speed and efficiency of the pro-
B. providing additional information gram
C. enhancing and amending detail C. The file size of the program file
D. embellish the current detail D. Functional coding data types
8. In a single pass assembler, most of the for- C. Size or Its running time
ward references can be avoided by putting D. Code Optimization
the restriction
A. On the number of strings/life reacts 14. The identification of common sub-
expression and replacement of run-time
B. Code segment to be defined after data
computations by compile-time computa-
segment
tions is
C. On unconditional rump
A. Local optimization
NARAYAN CHANGDER
D. None of these
B. Loop optimization
9. What is the other name of the parser? C. Constant folding
A. Lexical Analyzer D. Data flow analysis
B. Syntax Analyzer
15. What is the name of the process that de-
C. Semantic Analyzer termining whether a string of tokens can
D. Scanner be generated by a grammar?
10. A compiler is a A. Analyzing
A. Translate B. Translation
B. System Software C. Recognizing
C. Above 2 D. Parsing
D. Interpreter 16. Which of the following is NOT possible to
11. Punctuation, and parenthesis are exampes realize if activation record is static
of? A. Passing parameters
A. Alphabets B. Creating local variables
B. Strings C. Supporting recursion
C. Numbers D. None of the other options
D. Special Symbols
17. Information about source program is
12. In programming language, keywords, con- stored in
stants, identifiers, strings, numbers, oper- A. operating system
ators and punctuations symbols can be con-
sidered as? B. symbol table
A. Lexemes C. interpreter
B. Tokens D. database
C. Symbols 18. The method which merges the bodies of
D. Pattern two loops is
A. Loop rolling
13. The quality of the object program is gener-
ally measured by its B. Loop jamming
A. Cost C. Constant folding
B. Time D. None of these
B. is optimized to take less time for exe- 28. is associating the attributes with the
cution grammar symbols.
C. optimizes the code A. rotation
D. all the above
B. translation
23. S → A BA → ε | aAB → ε | bBFIRST(S) C. transformation
contains elements
D. evolving
A. 2
B. 3 29. In which automata, more than 1 transition
is possible?
C. 4
D. 5 A. NFA
B. DFA
24. Which grammar gives multiple parse trees
for the same string? C. PDA
A. Unambiguous D. Both NFA and DFA
NARAYAN CHANGDER
31. Synthesized attributes can be easily simu- 37. between dfa and nfa which has the poten-
lated by a tial to have more states in it
A. Ambiguous grammar A. dfa
B. Unambiguous grammar
B. nfa
C. LL grammar
C. cant say
D. LR grammar
D. both have same
32. Which of the following grammars are not
phases-structured? 38. The graph that shows basic blocks and
A. regular their successor relationship is called
B. Context free grammars A. DAG
C. context sensitive B. Flow graph
D. none of the above C. Control graph
33. is considered as a sequence of charac- D. Hamilton graph
ters in a token
A. Pattern 39. Compiler should report the presence of
in the source program, in translation pro-
B. Token
cess
C. Lexeme
A. object
D. DFA
B. code
34. is a process of finding a parse tree for
a string of tokens. C. error
A. Parsing D. classes
B. Analysing
40. Choose the correct answer
C. Recognizing
A. The analysis part constructs the target
D. Tokenizing
program
35. Top down parser can’t handle B. The synthesis part constructs the tar-
A. Left Recursion (LR) get program
B. Left Factoring (LF) C. The synthesis part constructs the as-
C. Both LR and LF sembly code
D. only LR D. None of these
53. Output file of Lex is the input file is D. Instructions and data in assembly
code mnemonics
NARAYAN CHANGDER
Myfile?
A. Myfile.e 59. A program P has M1 and M2, the two
B. Myfile.yy.c source modules contained in two different
files. When is the reference resolved if M1
C. Myfile.lex contains reference to a function defined in
D. Myfile.obj M2?
54. parsing methods cannot handle left re- A. Edit time
cursion B. Load time
A. Bottom-up C. Compile time
B. Top-down D. Link time
C. Both the options
60. How many phases are involved in the anal-
D. None of the mentioned
ysis phase?
55. hold the data that is local to the exe- A. 6
cution of the procedure.
B. 3
A. Global variable
C. 4
B. Temporary variable
D. 5
C. Local variable
D. Static variable 61. Simplify the given grammar:S→aXbX→aXb
|ε
56. To evaluate the expression, a stack is
used. A. S→aXb | ab, X→ aXb | ab
63. Peep-hole optimization is a form of 69. Compiler translates the source code to
A. loop optimization A. Executable code
NARAYAN CHANGDER
B. handle
A. Common sub-expression elimination
C. production
B. Dead-code elimination
D. handle pruning
C. Renaming of temporary variables
D. All the above 81. For a context-free grammar, left hand side
of production rules should contain
76. It checks whether the parse tree con-
structed follows the rules of language. A. Single nonterminal
A. Lexical Analyzer B. Set of both terminals and nonterminals
B. Syntax Analyzer
C. Semantic Analyzer C. Set of terminals
77. The specific task storage manager per- 82. Regular set for the regular expression b+
forms denotes
A. allocation/ de-allocation of storage to A. zero or more occurrences of b
programs
B. one or more occurrences of b
B. protection of storage area allocated to
a program from illegal access by other C. only one occurrence ofb
programs in the system D. none of the mentioned
C. the status of each program
D. both ( a ) and ( b ) 83. Annotated parse tree is generated by the
A. Parser
78. is a data structure used by the com-
piler to keep track of semantics of the vari- B. Semantic Analyzer
ables. C. Scanner
A. Symbol table
D. Code generator
B. Operator table
C. Literal table 84. The symbol ==> means
D. Operand table A. derives in one step
85. Regular expression for all strings starts 91. Blank spaces and comment lines will be
with ab and ends with bba is. eliminated by the compiler during
A. lexical analysis
86. Lexical analysis is about breaking a se- 92. S → aSa| bSb| a | b; The language gener-
quence of characters into ated by the above grammar is the set of
97. A compiler needs to collect and use infor- B. Those that use dynamic scoping
mation about the names appearing in the
C. Those that support recursion
source program. This information is en-
tered into a data structure called a D. Those that allow dynamic data struc-
ture
A. Symbol table
B. Lexical analysis 103. The parsing table is generally a di-
C. Syntactic analysis mensional array.
NARAYAN CHANGDER
D. Records A. one
B. two
98. Conversion from one type to another is
said to be if it is done automatically C. three
by the compiler. D. four
A. explicit
104. Access link points to the
B. implicit
C. both A. Current activation record
109. How many common phases are there in a 115. In LR parser, LR stands for
compiler? A. Left to Right derivation
A. 1 B. Left to Right with Rightmost derivation
B. 2
C. 6 C. Left to Right with Leftmost derivation
D. 8 D. none of above
110. Which one has the highest precedence in 116. Usually the “Three address code” con-
a regular expression tains address two for the and one for
A. Kleen closure the result.
B. Concatenation A. operand
C. Union B. operator
D. Epsilon C. result
D. statement
111. Widening Conversion, a type conversion
rule, is used to preserve in language. 117. Parser are expected to parse the whole
A. semantic code
B. information A. TRUE
C. type B. FALSE
D. syntax C. MAY BE
D. Cant say
112. Given the following expression gram-
mar:E → E * F | F+E | FF → F-F | idwhich 118. A LEX program is compiler by
of the following is true? A. a LEX compiler only
A. * has higher precedence than + B. a C compiler only
B. -has higher precedence than * C. a LEX compiler and C compiler
C. + and-have same precedence D. none of the mentioned
D. + has higher precedence than *
119. Procedure calls and returns are usually
113. What is the output of lexical analyzer? managed by a run time stack called the
A. A parse tree A. control stack
B. A list of tokens B. return address
NARAYAN CHANGDER
C. data located in other procedure A. cubic
D. All the above B. quadratic
124. Derivation produced by top-down parser 130. It is a part of operating system and is re-
is sponsible for loading executable files into
memory and execute them.
A. leftmost
A. Loader
B. rightmost B. Interpreter
C. either left or right C. Cross-compiler
D. none D. Preprocessor
131. Which action remove handle from stack 137. In this phase, it takes the optimized rep-
and push its corresponding Non terminal? resentation of the intermediate code and
maps it to the target machine language.
143. A program that converts the assembly 149. Syntax directed translation subroutines
language to machine-level language. generate code.
A. Assembler A. intermediate
B. Compiler B. source
C. Interpreter C. object
D. LInker D. error
144. P-code is used for
NARAYAN CHANGDER
150. In this phase, token arrangements are
A. Stack-based machine checked against the source code grammar.
B. Accumulator based machine A. Lexical Analyzer
C. Two operand addresses B. Syntax Analyzer
D. None of the other options C. Semantic Analyzer
148. The character sequence forming a token 154. Local and loop optimization in turn pro-
is called as vide motivation for
A. pattern A. data flow analysis
B. symbol B. constant folding
C. lexeme C. peep hole optimization
D. input D. DFA and constant folding
167. In regular expressions, the operator ‘*’ 173. If P & R are regular and also given that
stands for? if PQ=R, then
A. Concatenation A. Q has to be regular
B. Selection B. Q cannot be regular
C. Addition C. Q need not be regular
D. Q has to be a CFL
D. Iteration
174. When is the type checking usually done?
NARAYAN CHANGDER
168. Choose the examples for terminals
A. During syntax directed translation
A. Operator symbols
B. During lexical analysis
B. Digits 0, 1, 2..9 C. During code optimization
C. punctuation marks D. During syntax analysis
D. all the mentioned 175. What is the other name for predictive
169. The specific task storage manager per- parser?
forms A. LL (1)
A. Allocation/ deallocation of programs B. Non-Recursive Descent Parser
B. Protection of storage area assigned to C. Both
the program D. None of the above
C. Both of the mentioned 176. Each time a procedure is called, space for
D. None of the mentioned its local variable is pushed onto
A. buffer
170. a grammar E→ E+E|E*E|id is
B. registers
A. ambiguous C. stack
B. unambiguous D. memory
C. partially ambiguous 177. Which of the given statement is true?
D. none A. All the Cyclic Directed Graphs have
topological sorting
171. Compiler can check error.
B. All the Acyclic Directed Graphs have
A. Logical topological sorting
B. Syntax C. All Directed Graphs have topological
C. Both A and B sorting
D. None D. All the cyclic directed graphs have non
topological sorting
172. What does a Syntactic Analyser do?
178. Optimization is done to
A. Maintain Symbol Table A. Improve the system performance
B. Collect type of information B. Reduce the program size
C. Create parse tree C. Reduce the compilation time
D. None of the mentioned D. All the above
190. Which of the following language is a 196. In a bottom up evaluation of a syntax di-
parser generator? rection definition, inherited attributes can
A. LEX
B. YACC A. Always be evaluated
NARAYAN CHANGDER
191. Compiler is a program that takes source has synthesized attributes
program as input and produce as out- D. None of these
put.
A. machine code 197. Which of the following file is an output
of the assembler?
B. object code
A. Program file
C. assembly code
B. Object file
D. none of the above
C. Data File
192. An NFA’s transition function returns D. Task File
A. A Boolean value
198. Directed Acyclic Graph (DAG) representa-
B. A state tion of a basic block allows
C. A set of states A. Automatic detection of local common
D. An edge sub expressions
D. Cache A. Interpreter
B. Assembler
203. words of a language constitute
C. Compiler
A. set of terminals
B. set of non terminals D. Preprocessor
212. Rightmost derivation is sometimes called 218. In LEX, rule section starts and ends with
derivations.
A. canonical A. %%
B. RMD
B. {%
C. LMD
C. %}
D. Low
D. ##
213. Which phase of the compiler is also
NARAYAN CHANGDER
known as Scanner? 219. It reads a statement from the input, con-
A. Syntax Analysis verts it to an intermediate code, executes
B. Lexical Analysis it, then takes the next statement in se-
quence.
C. Semantic Analysis
A. Assembler
D. Code generation
B. Compiler
214. LEX compiler generates
A. yy.lex.c C. Interpreter
B. lex.yy.c D. LInker
C. executable code
220. Which of the following function is called
D. object code the canonical collection of LR(0) item.
215. The idea of cache memory is based A. FIRST
A. On the property of locality of reference B. GOTO
C. COMPUTE
B. On the heuristic 90-10 rule
C. On the fact that references generally D. FOLLOW
tend to cluster
221. Any finite sequence of alphabets.
D. On all the above
A. Alphabets
216. A compiler is faster than interpreter
A. True B. Strings
B. False C. Numbers
C. None of these D. Special Symbols
D. none of above
222. Which of the following statement is true
217. In which parsing, the parser constructs for Dead State?
the parse tree from the start symbol and
transforms it into the input symbol. A. It cannot be reached anytime
A. Bottom-up parsing B. There is no necessity of the state
B. Top-down parsing C. If control enters no way to come out
C. None of the above from the state
D. Both a and b D. If control enters FA deads
223. Type checking can be of two types viz: 229. An example of a high-level programming
and language is:
227. Which derivation is generated by the 233. What is Syntax Analyser also known as
bottom-up parser? A. Hierarchical Analysis
A. Right-most derivation in reverse B. Hierarchical Parsing
B. Left-most derivation in reverse C. None of the mentioned
C. Right-most derivation D. Hierarchical Analysis & Parsing
D. Left-most derivation
234. Which is taken as input for the synthesis
228. How many parts of compiler are there? phase?
A. 1 A. Source code
B. 2 B. Object code
C. 6 C. Intermediate code
D. 7 D. Optimized code
NARAYAN CHANGDER
242. Regular expression (a|b)* denotes
A. exactly 3 address A. One or more occurrences of a or b
B. at the most 3 address
B. One or more occurrences of a and b
C. no unary operators
C. Zero or more occurrences of a or b
D. none of these
D. Zero or more occurrences of a and b
237. Semantic Analyser is used for?
243. Symbol table is a data structure which
A. Generating Object code contains
B. Maintaining symbol table
A. a record for each identifier
C. Generating Object code & Maintaining
B. attributes of each identifier
symbol table
C. both the options
D. None of the mentioned
D. none of the mentioned
238. This phase scans the source code as a
stream of characters and converts it into 244. An identifier is a
meaningful lexemes.
A. keyword
A. Lexical Analyzer
B. operator
B. Syntax Analyzer
C. lexeme
C. Semantic Analyzer
D. token
D. Code Generator
245. lex specifications are demarcated by
239. Parenthesized numbers are used to rep-
resent into the triple structure. A. %
A. pointer B. {%
B. stack C. %}
C. queue D. %%
D. value 246. A computer program that links and
240. If Left Recursion is available, then oc- merges various object files together in or-
curs. der to make an executable file.
A. stack A. Assembler
B. cycle B. Compiler
C. queue C. Interpreter
D. symbols D. LInker
247. A keeps track of what is currently in 253. An assembler is a program which con-
each register. verts
249. Words such as if, then, else are examples C. Variation of updating techniques
for D. Variation of Deleting Techniques
A. terminals
255. In the activation record, local variables
B. non-terminals
can be accessed from frame pointer with
C. productions offset value
D. start symbol A. positive
250. What does the second L in LL(1) repre- B. negative
sents?
C. May be positive or negative
A. Scanning Left to Right
D. Cannot be accessed
B. Left Most Derivation
C. Left Hand Side 256. provides easy transformation on ba-
D. Left Most Non-Terminal sic blocks.
NARAYAN CHANGDER
259. LR stands for the form and
A. left to right scanning A. Name and information
B. left to right reduction B. Name and function
C. leftmost to rightmost derivation C. Name and data
D. left to right scanning and right most D. Name and procedures
derivation in reverse
266. It is a tool that produces input for compil-
260. A system program that set-up an exe- ers.
cutable program in main memory ready for
execution is A. Loader
A. loader B. Interpreter
B. linker C. Cross-compiler
C. assembler D. Preprocessor
D. None of the above
267. Scissoring enables
261. Replacing expensive operations with sim-
A. A part of data to be displayed
pler ones is called
A. Strength reduction B. Entire data to be displayed
B. Copy propagation C. Full data display on full screen
C. Constant folding D. No data to be displayed
D. Dead code elimination 268. Choose the properties of three address
262. The graph that shows basic blocks and code from the given options
their successor relationship is called A. Has at most 2 operators
A. DAG B. assignment operator is mandatory
B. Flow chart
C. Has maximum of 3 operands
C. Control graph
D. all the mentioned
D. Hamilton graph
269. The memory manager must have
263. Which is the last phase of the compiler?
A. Code optimization A. space efficiency
B. Code generation B. program efficiency
C. Intermediate code generation C. low overhead
D. Syntax analyzer D. all the above
11. Peripheral Management 16. Which one is true about Open source soft-
A. Provides a method to communicate ware from the following?
with the system A. It is very expensive.
B. Manages your programs B. It is made to make profit.
C. allows the os to manage the hardware C. It made for the betterment of other
devices people.
D. Allows users to have different ac-
D. Well tested and reliable and updates
NARAYAN CHANGDER
counts
will be regularly be issued.
12. Which one of these best describes com-
pression? 17. Which of the following is not a feature of
an OS?
A. Making a file bigger.
A. User Interface
B. Keeping files the same size.
B. Systems Design
C. Making a file smaller.
C. User Management
D. none of above
D. Memory Management
13. Which one of these best describes open
source software? 18. Which type of software would a game
A. A type of operating system. be?
B. Free software downloaded from the in- A. Utility software.
ternet.
B. An operating system.
C. Software bought from a shop.
C. Application software.
D. none of above
D. none of above
14. What software would be used to create a
website 19. Question 7:To allow a user to interact with
an Operating System-it must have a ?
A. Image editing software
(1-3)
B. Word processor
A. User Connection
C. Presentation software
B. User Interface
D. Web authoring software
C. Virtual Connection
15. Emulated computer environment that sim-
ulates hardware and can be used for D. Remote Access
running OS’s separate from the physical
20. Evaluate your system and make recom-
(host) computer. Replicates the function-
mendations for fixing any errors found
ality of a physical machine
A. Multi-tasking machine A. Search Tools
A. Mobile OS D. ruined
32. Which kind of software will offer a free 37. User Interface of MS-DOS is
trial for a short time before you need to A. Command line interface
pay?
B. Menu-driven interface
A. Open source software
C. Graphical user interface (GUI)
B. Freeware
D. none of above
C. Proprietary software
D. Shareware software 38. Which is not a task performed by the op-
erating systems?
NARAYAN CHANGDER
33. This following is an example of a periph- A. Managing RAM
eral (7-9)
B. Sending Error Messages
A. Processor
C. Saving files to the Hard Drive
B. Main Memory (RAM)
D. Sending Emails
C. Hard Disk Drive
D. ROM 39. How many instructions can be carried out
per pulse of the clock?
34. A black box; A. 1
A. is instructions that control processing B. 1000
B. is software not fully understood by C. 100000
most users
D. 10000000
C. are programs or sets of instructions
D. are physical units that make up a sys- 40. Programs and other operating information
tem used by a computer is called
A. Software
35. These are programs typically used to cre-
ate attractive, visually interesting presen- B. Hardware
tations C. Binary Code
A. Illustration programs D. Peripherals
B. Presentation graphics 41. What part of the system software enables
C. Image Editor multi tasking?
D. Adobe Photoshop A. Memory management
36. Define operating system B. File management
A. Program that coordinate all activities C. Processor management
among computer or mobile device hard- D. Peripheral management
ware.
42. These are programs that make copies of
B. Program that control activities of the files to be used in case the originals are
basic input output in the computer devices lost or damaged
A. Backup programs
C. Program that setup all the wire and
power off the computer hardware de- B. Antivirus
vices. C. Utility Software
D. none of above D. None of the above
53. It is the outermost layer of the operating 58. These are designed to run all of its appli-
system that provides a way for you to cations and services thru a web browser.
communicate with the operating system.
A. Real-time OS
A. Kernel
B. Internet/Web OS
B. Shell
C. Multi-user OS
C. File system
D. Network OS
D. none of above
NARAYAN CHANGDER
59. File Management
54. What is Encryption software used to do?
A. Provides a method to communicate
A. Permanently change data with the system
B. Revert data to something it wasn’t be- B. Provides options to manage your files
fore and folders
C. Change data so it is unreadable by an C. allows the os to manage the hardware
interceptor devices
D. Change data so it is readable by an in- D. Allows users to have different ac-
terceptor counts
55. Simple applications that can be down- 60. is an electronic component that store
loaded cheaply; do not have capabilities of instructions waiting to be executed by the
full version. processor
A. App A. Random fetching memory
B. Application B. Random execute memory
C. Operating System C. Random access memory
D. Software Program D. Random devices
56. This type of visual display lets you use a 61. A web browser is an example of?
mouse to interact with the workspace on
A. Operating system software
the computer screen.Lesson 7-1
B. Application software
A. graphical user interface (GUI)
C. The Internet software
B. desktop
D. A touch screen interface
C. operating system
D. BIOS 62. Which of the following components or pe-
ripherals might be listed in the minimum
57. Memory-management technique that uses requirements for an application?
hard drive space as additional RAM
A. Video system
A. Virtual Machine
B. CD drive
B. Virtualization
C. Network connection
C. Virtual Memory
D. All of these may be part of the mini-
D. Virtualbox mum requirements for some application
63. This method of backup takes longer to per- 69. Question 3:A Virtual Machine is said to
form (7-9)
73. What type of software works with users, 78. Which of the following is NOT The role of
application software, and computer hard- the operating system:
ware to handle the majority of technical A. Providing the user interface
details
B. Managing programs
A. Application
C. Preventing basic security
B. Operating System
D. Managing hardware
C. Linux
NARAYAN CHANGDER
79. To scramble data so that it is unreadable
D. System software is a form of ?
74. Network Data can be protected using A. Compression
during transmission, so that if the data B. Encryption
was accessed by intruder a key will be C. Backing up
required to decipher the message (KLO
1.6.a) D. Defragmentation
B. interact with menu and images. 81. Below are 2 advantages and 1 disadvan-
tage for Command Line Interface.Choose
C. play with the games. the disadvantage
D. interfere the graphic. A. Takes up less memory
76. What are the storage locations inside a B. Takes less processing power
CPU called? C. Can be very confusing to a beginner
A. Registers D. none of above
B. RAM slots 82. This is a rectangular frame that lets you
C. Control Memory view programs or documents.Lesson 8-1
94. This is a list of shortcut commands that ap- 99. This was one of the first operating sys-
pears when an area of the screen is right- tems ever written.Lesson 7-2
clicked.Lesson 8-1 A. Linux
A. pull-down menu B. UNIX
B. pop-up menu C. Microsoft Windows
C. command menu D. Macintosh OS
D. startup menu 100. These coordinate computer resources and
NARAYAN CHANGDER
provides an interface between users and
95. When a computer is “swapping”, it is
the computer and run applications
A. moving data from the hard drive to a A. Operating systems
removable drive
B. Utilities
B. moving data from memory to the swap
C. Device Drivers
file on the hard drive
D. Translators
C. moving data between registers in
memory 101. Which of the following is an example of
D. none of the above a peripheral?
A. Processor
96. This is a utility program of Windows Op- B. RAM or Main Memory
erating System that removes unnecessary
files C. Hard disk drive
105. Which of these constrains we can over- 110. A(n) interface controls how users en-
come by changing the network topology ter data and instructions into a computer
from full mesh to ring topology (KLO and how information is displayed on the
115. What does the term” Defragmentation” B. Free software downloaded from the in-
mean? ternet.
A. Putting the fragmented data together C. Software bought from a shop.
B. Makes space on the HDD by getting rid D. none of above
of any unused
121. Question 11:This following is an example
C. Scans your computer for viruses. of a peripheral (7-9)
D. none of above A. Processor
NARAYAN CHANGDER
116. I use what application to go to web- B. Main Memory (RAM)
pages? C. Hard Disk Drive
A. Wifi D. ROM
B. Internet Explorer / Firefox 122. A Virtual Machine is said to
C. Google Chrome/Safari A. Allow the user to play games with Vir-
D. Ethernet Cable tual Reality Glasses
B. Allow the user to virtually use an Oper-
117. This type of back-up is slowest to restore
ating System
from? (7-9)
C. Allow a MAC to run on Windows
A. Full
D. Hides the complexities of the hard-
B. Fragmented ware from the user
C. Incremental
123. Question 1:What type of Software is
D. Differential needed to control the computer’s hard-
118. Key job of the operating system. Al- ware? (1-3)
lows programs to be stored safely and ef- A. Programming Software
ficiently. Restricts each program to access- B. Systems Software
ing and amending its own area of data.
C. Application Software
A. Processor scheduling
D. Bespoke Software
B. Interrupt service routines
124. Delete temporary files.
C. Memory management
A. File Compression Programs
D. Backing store management
B. Backup and recovery utilities
119. What type of software is needed to con- C. Clean Up Utilities
trol the computer’s hardware? (1-3)
D. Security programs
A. Programming Software
125. Why do files have an extension e.g.
B. Systems Software
.jpeg
C. Application Software
A. So they can be downloaded quicker.
D. Bespoke Software
B. So they can be saved correctly.
120. Which one of these best describes propri- C. So the OS know which software to
etary software? open them in.
A. A type of operating system. D. none of above
126. A hard disk drive contains C. Only needed if you connect to the In-
A. disks ternet
128. This programs organizes, analyzes, and A. To keep the computer maintained and
graphs numerical data in working order
A. Presentation B. To control the running of the computer,
B. Word Processors manage apps, users and resources
C. Image Editor C. To prevent the computer from getting
D. Spreadsheet a virus
136. This testing is carried out by the software C. Embedded operating systems
developer’s in-house testing team.It is es- D. None of the above
sential because it often reveals both errors
and omissions in the system requirements 142. Choose the best answer. It is an inter-
definition. face that displays text, and its commands
are usually typed on a command line using
A. Beta testing
a keyboard.
B. Alpha testing
A. Command prompt
NARAYAN CHANGDER
C. Black box testing
B. Graphical User Interface
D. White box testing C. Text-based User Interface
137. A type of software used to create and D. none of above
manipulate documents that contain text
and graphics. 143. A type of operating system which allows
more than one program to run at the same
A. Database time.
B. Spreadsheet A. Multi-tasking operating system
C. Word Processor B. Multi-user operating system
D. Graphics and Multimedia Software C. Real time operating system
138. An example of software would be D. Distributed operating system
A. Application Software
B. Program that control the user and
B. Antivirus maintain the devices input and output.
C. Virtualization C. Program that control the ability of the
D. Utility Software user and people that use the computer
and it devices.
149. Unencrypted messages are called which? D. none of above
(1-3)
154. Which one of these best describes a
A. Plaintext Graphical user Interface?
B. Ciphertext A. They are easy to use because they
C. Keytext make use of icons.
NARAYAN CHANGDER
B. Suite software?
C. Utility A. It has been thoroughly tested.
D. Spreadsheet B. It can be changed by anyone.
C. It is expensive.
158. Which of these is a benefit of a command
line interface? D. none of above
A. More control over OS. 164. What are the two main categories of soft-
B. Bright coloured icons. ware?
C. More apps. A. Applications & Systems
D. none of above B. Systems & Utilities
C. Utilities & Applications
159. RAM is what kind of memory?
D. Applications & Operations
A. Permanant
B. Forever 165. Ahmad use this utility program so that
the OS accesses data more quickly and pro-
C. Slow grams run faster.
D. Temporary A. Power source utility
160. Uses data structures consisting of data B. Disk defragmenter utility
fields and methods together with their in- C. Disk cleanup utility
teractions (objects) to design programs
D. Run away and never come again.
A. Procedural programming
166. To scramble data so that it is unreadable
B. Object-oriented programming
is a form of ? (4-6)
C. Declarative programming
A. Encryption
D. Functional programming
B. Compression
161. Which one of these best describes backup C. Defragmentation
utilities?
D. Backing up
A. Taking a copy of all of your files and
settings in case they are lost. 167. Which of these is not applications soft-
ware?
B. Re-organising your files into a sensible
order. A. Spreadsheet
C. Deleting any unnecessary files to B. Database
make space on the hard drive. C. Word Processor
D. none of above D. Anti-Virus
168. A type of specialized suite that includes 173. What is the purpose of a device driver?
a variety of programs designed to make
A. used to keep your computer files well-
computing easier and safer.
NARAYAN CHANGDER
B. location Area Node
179. Allows the user to compress the size
C. Limited Area Network
of large files for easier storage sending
data. D. Local Area Network
A. Compression Software 185. These are general-purpose programs that
B. Antivirus Software creates text-based documents.
C. Computer games A. Word Processors
189. What does the word autonomous mean? 194. Which one is not a computer management
A. to act on their own without human in- software?
190. What does the term ICT stand for? 195. In an operating system that provides a
GUI, this is the background on which all
A. Information and Cultural Technology
work is performed.Lesson 8-1
B. Information and Communication Tech-
nology A. screen
D. interace C. single-user
199. Events that occur between the time you 204. The CPU is called the of the com-
turn the computer on and when it becomes puter.
ready to use.
A. arm
A. Boot process B. mother
B. Program check C. brains
C. Start-up D. leg
D. Operating System Set-up
NARAYAN CHANGDER
205. An assembler translates assembly code
200. A Virtual Machine is said to (7-9) language into
A. Allow the user to play games with Vir- A. High Level Language
tual Reality Glasses B. Machine Code
B. Allow the user to virtually use an Oper- C. Processor Code
ating System
D. Mnemonics
C. Allow a MAC to run on Windows
206. Define multitasking.
D. Hide the complexities of the hardware
from the user A. Allows a single user to work on two or
more programs at the same time.
201. Software is used to control hardware de- B. Allows only one user to run one pro-
vices and allow an OS use the hardware gram at a time.
A. Device Management C. Supports two or more processors run-
B. Device Driver ning programs at the same time.
C. Device System D. Enables two or more users to run pro-
gram simultaneously.
D. Hardware Peripheral Device
207. Question 5:Dividing processor time be-
202. Which one of the following is a compres- tween processes so that they appear to
sion software? multitaskis known as:(1-3)
A. OptimFROG A. Time Slicing
B. MacOS B. Fish Slicing
C. Steam C. Time waiting
D. none of above D. Idle Time
203. This method of backup is quicker to per- 208. A is a network node connecting
form once an initial backup file is created two networks that use different protocols.
(7-9) (KLO 1.5)
A. Incremental A. Host
B. Full B. hub
C. Fragmented C. Gateway
D. Differential D. router
209. Which of the following is not type of Ap- 214. Which of the following is NOT a function
plication Software of Operating System?
219. What are the two broad categories of 224. Which of these is an example of a periph-
computer software? eral device?
A. System Software ANDUtility Software. A. Processor
B. Main Memory (RAM)
B. Utility Software ANDApplication Soft- C. Hard Disk Drive
ware.
D. Monitor
C. System Software AND
225. A collection of programs that manage
NARAYAN CHANGDER
D. Application Software ANDCAD, CAM and coordinate the activities taking place
Software. within a computer system
220. Disk Cleanup, Task Manager and File Re- A. Payroll System
covery are considered to be B. Library System
A. root directories C. POS System
B. file management systems D. Operating System
C. Windows utility programs 226. What rearranges parts of the file on the
D. Accessibility Utilities disk drive to move them all to the same
area for quicker access?
221. Which one of these best describes appli- A. Firewall
cation software? B. Disk Defragmentation
A. Antivirus software. C. File Compression
B. Software that allows you to make D. Encryption
slideshows and type letters.
227. Designed for use with smart phones.
C. Software that keeps your computer
system healthy. A. iPhone OS
230. Which method of backup takes longer to 235. What type of back-up is slowest to re-
perform? store from?
231. With a command-line interface, 236. Data Harvesting Scandle who is respon-
sible
A. user can give command by lining up the
instructions. A. Facebook
B. a user can command anyone to help B. Cambridge analytica
them. C. Both
C. user can interfere with any command. D. None
NARAYAN CHANGDER
C. Clean Up Utilities D. None of the above
D. Security programs
247. This interface requires the user to type in
242. The discs that are used to store instruc- codes or words
tion in a magnetic hard drive are called A. Command Line
A. usb B. Graphical
B. ssd C. Menu Driven
C. platter D. none of above
D. actuator
248. “Software which can be used, modifed
243. Which type of operating system is used and improved by anyone and can be re-
to control large equipment and to regulate distributed freely”Above statement refers
factory operations? Lesson 7-1 to:
A. real-time A. Proprietary System
B. single-user/single-task B. Open source system
C. single-user/multitasking C. Freeware System
D. multi-user D. Shareware System
244. Which of the following best describes a 249. Two types of system software are
command line interface? A. application software and utility pro-
A. It is made up of colourful icons to click grams
on. B. Web browsers and application soft-
B. It is operated using special commands. ware
C. operating systems and utility pro-
C. It is operated by touching the screen grams
with your finger. D. operating systems and Web browsers
D. none of above
250. What is the name of the default browser
245. Which one of these is not a feature of and that comes with the Macintosh Operating
Operating system (OS)? System?
A. File management. A. Opera
B. Use of Utility software. B. Safari
C. A very fast clock speed. C. Spotlight
D. none of above D. Firefox
NARAYAN CHANGDER
D. Reduces the size of a file
268. It is a type of program that protects com-
263. The von Neumann architecture proposes puter systems from viruses and other dam-
the design for a stored program computer aging programs.
where both and are stored in the A. Antivirus
same memory.
B. Utility software
A. instructions & data
B. data & power C. File compression programs
272. These are programs that reduce the size 277. A set of instructions that tell the com-
of computer files puter what to do.
A. driver C. Software
D. Ooutput
B. kernel
C. platform 279. A collection of related data
A. Data Type
D. manager
B. Information
274. A is a thick magnetic disk encased in C. Blog
a thicker protective shell. It consists of
several aluminum platters, each of which D. Database
requires a read/write head for each side. 280. Which of the following is an Output de-
A. Hard Disk Drive vice?
283. is an assembled group of data. Al- 288. A foreground task has more than a
lows easy and efficient storage, retrieval background task.
and modification of data. (KLO 1.4)
A. buffers
A. Memory
B. microseconds
B. BIOS settings
C. registers
C. Server
D. time slices
D. Database
NARAYAN CHANGDER
289. With the Macintosh Operating System
284. The operating system lets you change where do you go in order to make any
some features of the , such as the look changes to your computer (desktop back-
of the background or the placement of the ground, printer settings, trackpad ges-
icons.Lesson 7-1 tures, etc )?
A. options A. System Preferences
B. programs B. Finder
C. desktop C. Mission Control
D. memory D. Launchpad
285. Choose the best answer. The following 290. holds many components of the sys-
are considered as roles of the operating tem and provides connectors for other pe-
system except for: ripherals.
A. Management of the processor. A. USB
B. Management of the RAM. B. Touch screen
C. Management of input/output. C. Motherboard
D. Management of the motherboard. D. CPU
286. Each platter on a magnetic hard drive is 291. It is an online diary or commentary
broken down into tracks. What part of the
A. Article
track is data stored into?
B. Channel
A. Section
C. Site
B. Sector
D. Blog
C. Track Segment
D. Quadrant 292. Which of these is a main function of an
Operating System (OS)?
287. Smaller files take up less
A. Provides a platform to run apps.
A. Storage place
B. Provides a permanent storage of data.
B. Load more quickly
C. Streaming and downloading C. Provides temporary memory.
D. none of above D. none of above
NARAYAN CHANGDER
305. During the execution phase in the CPU, A. single user
calculations may need to be performed. B. single processing
Which part of the CPU does this?
C. multiuser
A. Arithmetic Logic Unit (ALU)
D. multiprocessing
B. Control Unit (CU)
311. Which method of backup is quicker to per-
C. Accumulator (ACC)
form once an initial backup file is created?
D. Memory Address Register (MAR)
A. Full
306. This type of program can check a disk and B. Differential
fix any problems it finds.Lesson 8-2
C. Fragmented
A. antivirus program
D. Incremental
B. system utility program
312. Halim wants to play interactive 3D
C. disk scanner programm
games using desktop computer. What
D. operating system program adapter that Halim should install?
307. Which is the fastest type of cache mem- A. Sound card
ory? B. Network card
A. Level 1 C. Video card
B. Level 2 D. Joystick card
C. Level 3
313. Function of system software is to serve
D. Level 4 as between user, application software
and computer
308. These allows the devices to communicate
with the operating system of the com- A. interface, hardware
puter B. control, application
A. Operating system C. interface, application
B. Utilities D. control, hardware
C. Device Drivers
314. Three functions of the operating system
D. Translators
A. User Interface, multitasking, commu-
309. An example of the computer’s hardware nicates with hardware via device drivers
would be
A. MS Word B. User Interface, multitasking, saving
C. fetch, decode and execute instructions 320. Files can be grouped together into
these.Lesson 7-2
D. Macintosh OS D. protector
318. A single user/ operating system al- 323. This is also known as a photo editor, this
lows a single user to work on two or more specialized graphics program edits or mod-
programs that reside in memory at the ifies digital photographs.
same time. A. Presentation
A. multitasking
B. Spreadsheet
B. interfacing
C. Image Editor
C. command-based
D. Word Processor
D. throttle
324. A type of system software that allows a
319. Select a device which contains an embed-
user to perform maintenance-type tasks.
ded system
A. Toaster A. System software
B. Kettle B. Utility software
C. Microwave Oven C. Operating system
D. Iron D. Desktop stand-alone
NARAYAN CHANGDER
C. UNIX
A. Software already available for pur- D. LINUX
chase
332. An application designed to be down-
B. An online collection of software
loaded to a handheld device.
C. combination of hardware and systems
A. system unit
software that supports the running of ap-
plications B. malware
D. none of above C. mobile app
D. Instagram
327. Utility Programs that:Detect and correct
logical errors on hard disk 333. A signal from a software program, hard-
A. Program Uninstaller ware device or internal clock to the CPU.
B. Disk Scanning Program A. process
C. Disk Defragmenter B. Instruction
D. Data Recovery Utility C. processor scheduling
D. Interrupt
328. Which of the following is NOT a function
of an operating system 334. What is the name given to software that
A. Managing resources can be used by many people for a wide
range of tasks?
B. Providing user interface
A. Custom-written
C. Perform specific operations
B. Integrated
D. Running applcations
C. General-purpose
329. Windows XP, Windows 7, and iOS 12
are examples of: D. Special-purpose
336. Which of the following is NOT a definition 341. Fill in the blank:Open Software
of System Software? A. Source
347. Which of the following tasks is NOT per- 352. Which of the following is an example of
formed by the operating system? Lesson specialized programs combined in a unified
7-1 package
A. managing computer memory A. Windows 10
B. managing the CPU B. Microsoft Word
C. managing the formatting in a letter C. Internet Explorer
D. managing input devices D. Microsoft Office
NARAYAN CHANGDER
348. These programs convert programming in- 353. Is a standard security technology for es-
structions written by programmers into a tablishing an encrypted link between a
language computers understand and pro- server and a client typically a web server
cess (website) and a browser; or a mail server
and a mail client (e.g., Outlook). (KLO
A. Converter
1.3.4)
B. Linguistic
A. SSL (Secure Sockets Layer)
C. Translator
B. Mac OS
D. None of the above
C. Real Time OS
349. The BIOS (Basic Input Output System) is D. Window XP
stored in
354. An incremental backup..
A. RAM
A. Makes copies only of the new files
B. ROM
B. Saves your backup to secondary stor-
C. Virtual Memory
age
D. Cache
C. Makes copies of all files
350. Define cold boot. D. Makes a copy of the entire drive
A. Turning on a computer that has been
355. Type of scheduling algorithm where the
powered off completely.
queue is sorted by expected execution
B. Using the operating system to restart time. New jobs are added accordingly to
a computer. the queue.
C. Always restart the computer. A. Shortest job first
D. Turning on computer without connect- B. shortest remaining time
ing the plug.
C. First come first served
351. It is the two or three or four letters af- D. Multi-level feedback queues
ter the dot in a filename. It also indicates
what kind of file you are dealing with. 356. An operating system that organizes and
coordinates how multiple user access and
A. File name share resources on a network. This de-
B. File extension scription refers to
C. File size A. Mobile OS
D. File management B. Desktop OS
B. Graphical C. Multi-user OS
C. Menu D. Internet/Web OS
367. The instructions in a form that the proces- 373. These are programs typically used to cre-
sor can execute is called ate sophisticated commercial websites.
A. Machine Code A. Game Design Programs
B. Assembly Language B. Presentation Graphics
C. High Level Language C. Illustration Programs
D. Complier D. Web Authoring Programs
368. This type of back-up is quicker to restore
NARAYAN CHANGDER
from? (7-9) 374. The purpose of a disk defragmenter is to
A. Incremental
A. Recover deleted files from the hard
B. Full disk
C. Fragmented
B. To move applications from RAM to the
D. Differential hard disk
369. UNIX is an example of this type of oper- C. To put together sections of files which
ating system.Lesson 7-1 are physically separated on a hard disk
A. real-time D. To remove files which are no longer
B. single-user/single-task needed
C. single-user/multitasking 375. Can computers operate without a operat-
D. multi-user ing system?
370. Name of the software which controls A. Yes
hardware devices? B. No
A. Device management C. Sometimes
B. Device system D. WOAH
C. Peripheral firmware
D. Device driver 376. One of the disadvantages of using mobile
devices is (KLO 1.3.2)
371. What software would be used to create A. always connected
a logo
B. Constant Interruption
A. Image editing software
B. Word processor C. Possibility of Privacy and security Leak
C. Presentation software
D. Both B & C
D. Web authoring software
372. What allows a user to interact with the 377. This is used in creating layout for a mag-
Operating system? azine.
382. Which is NOT considered an operating 387. What is the purpose of Utility software?
system? A. To keep the computer maintained and
A. Windows in working order
B. Mac OS B. To control how the computer operates
C. Linux
C. To manage resources available to
D. Microsoft Excel hardware
383. This controls the computer and manages D. none of above
its work.Lesson 8-1
388. is any pocket-sized card that has
A. CPU embedded integrated circuits (U23 KLO
B. OS 4.1.f)
NARAYAN CHANGDER
A. Program Uninstaller 395. This is the program that helps to boot
B. Disk Scanning Program up the computer. Usually stored on flash
memory so that it can be updated. Also al-
C. Backup Utility
lows settings such as boot order of disks
D. Data Recovery Utility to be changed and saved by the user
B. Android D. conversion
C. Windows Phone 408. Google Docs, Microsoft Office 365 and
D. a-phone Zoho Office are examples of
410. Which is NOT a resource the OS man- 415. Give two examples of utility software
ages?
A. Word and anti-virus
A. Processor B. Compression software and Power-
B. Memory point
C. Input/Output C. Disk defragmenter and file manage-
ment software
D. Topology
D. none of above
NARAYAN CHANGDER
411. A small program that allows a specific pe-
ripheral device to communicate with a com- 416. Splits memory and/or programs into log-
puter system ical blocks containing modules or routines
B. Firmware B. Segmentation
8. The is a sequence of steps that enable 13. If project is the enhancement of existing
the designer to describe all aspects of the system, which model is best suited?
software to be built. A. Waterfall model
A. model process B. Prototyping model
B. design & model process C. Iterative enhancement model
C. design process D. Spiral model
NARAYAN CHANGDER
it is a sequential design process in which
9. Behavioral Model can be represented in progress is seen as flowing steadily down-
which Diagram wards.
A. Data Flow Diagram A. Spiral Model
B. State transition Diagram B. Evolutionary Development Model
C. Iterative Enhancement Model
C. None of the above
D. Waterfall Model
D. All of the above
15. Which of the following are valid step in
10. Software engineering approach is used to SDLC framework?
achieve: A. Requirement Gathering
A. Better performance of hardware B. System Analysis
B. Error free software C. Software Design
C. Reusable software D. All of the above
19. Which phase of the RUP is used to estab- 24. Your group plans to build a model plant.
lish abusiness case for the system? When should you decide upon the criteria
you will use to test your technological de-
A. Use Case, Sequence 25. White Box techniques are also classified
B. Class, Object as
C. Activity, State Chart A. Design based testing
D. All B. structural testing
21. Which one of the following is one of the C. Error guessing testing
Manifesto of Agile Development D. None of the mentioned
A. Comprehensive documentation
26. Which of these are considered a functional
B. Contract negotiation requirement?
C. Responding to change A. Security
D. None of the above B. Availability
22. Using RMIT Library website, to search C. Inputs
for the topic ‘management’, but excluding
D. Response time
‘project management’, use:
A. management NO “project manage- 27. First level of prototype is evaluated by
ment” .
B. management WITHOUT “project man- A. Developer
agement”
B. Tester
C. management MINUS “project manage-
C. User
ment”
D. System Analyst
D. management NOT “project manage-
ment” 28. On which of the following factors does the
23. Which of the following is not defined in a quality of the software produced depend?
good Software Requirement Specification A. On the infrastructure provided to the
(SRS) document? developers
A. Functional Requirement B. On the technologies used to develop
B. Nonfunctional Requirement the software
C. Goals of implementation C. On the skills and knowledge of the de-
velopers
D. Algorithm for software implementa-
tion D. All of the above
29. Which of the following is not a diagram 35. Agile Software Development is based on
studied in Requirement Analysis?
A. Use Cases A. Incremental Development
B. Entity Relationship Diagram B. Iterative Development
C. State Transition Diagram C. Linear Development
D. Activity Diagram D. Both Incremental and Iterative Devel-
opment
NARAYAN CHANGDER
30. Which of the following items is not an en-
gineering layer for software
36. The spiral model was originally proposed
A. Process by-
B. Manufacturing A. Barry Boehm
C. Tools B. Pressman
D. Methods C. Royce
31. Build and fix model has D. Pressman
A. 2 phases
37. A set of inputs, execution preconditions
B. 3 phases and expected outcomes is known as a
C. 7 phases A. Test plan
D. 4 phases B. Test case
32. Cost estimation for a project may include C. Test document
A. Software Cost D. Test Suite
B. Hardware Cost
38. A software application which uses non-
C. Personnel Costs numerical algorithm to solve complex prob-
D. All of the above lem.
A. Run chart
D. Capability Model Maturity Instructions
B. Bar chart
C. Control chart 50. Decomposition technique takes ap-
proach to software project estimation.
D. None of the mentioned
A. Tower hannai
45. It represent relationships between in- B. Split-up
stances of types (a person works for a
company, a company has a number of of- C. Divide and Conquer
fices. D. Merge
NARAYAN CHANGDER
present in Adaptive Software Develop-
C. Rapid Application Design.
ment(ASD)?
D. Recent Application Development.
A. analysis, design, coding
B. requirements gathering, adaptive cy- 58. What is incorrect about structural design?
cle planning, iterative development
A. Structural design introduced notations
C. speculation, collaboration, learning and heuristics
D. all of the mentioned B. Structural design emphasis on proce-
dural decomposition
53. My new computer has a very proces-
sor. C. The advantage is data flow represen-
tation
A. quick
B. high speed D. It follows Structure chart
62. Which of the following UML diagrams has 67. Following are the phases of Project Man-
a static view? agement Life Cycle. Arrange them in cor-
rect orderDesign, 2. Marketing, 3. Analy-
64. What is true about generic software prod- 69. How many diagrams are here in Unified
uct design process? Modelling Language?
A. It begins with SRS A. 1
B. It ends with Product Design Problem B. 2
C. Analysis is done and end product is C. 3
project mission statement
D. 9
D. None of the mentioned
70. A is tested to ensure that information
65. All listed are techniques to elicit require- properly flows into and out of the sys-
ments EXCEPT tem.
A. Interviewing A. boundary conditions
B. Scenarios B. local data structure
C. Questionnaire C. module interface
D. Ethnography D. paths
66. The linear sequential model of software 71. A program which helps locate, identify and
development is also known as the rectify errors in a program
A. Classical life cycle model A. Loader
B. Waterfall model B. Debugger
C. Spiral model C. Linker
D. both a and b D. Trace
72. what’s the meaning of stakeholders? 77. Prototyping life cycle model is appropriate
when a project suffers from which one of
A. people who are effect or affected pos-
the following risks?
itivley or negatively
A. Schedule slippage
B. people are only customers and buy or
sell items B. Manpower turnover
C. people who are called VCs and moti- C. Incomplete and uncertain require-
vate the companies ments
NARAYAN CHANGDER
D. people are hold every thing on the com- D. Poor quality of outsourced work
pany to make them feel happy
78. Select the developer-specific require-
73. Which document is created by system an- ment?
alyst after the requirements are collected A. Portability
from Various stakeholders?
B. Maintainability
A. Software requirement specification
C. Availability
B. Software requirement validation
D. Both Portability and Maintainability
C. Feasibility study
79. It encompasses a set of umbrella activities
D. Requirement Gathering
that are applicable across the entire soft-
74. In XP Increments are delivered to cus- ware process.
tomers every weeks. A. Process Framework
A. One B. System
B. Two C. Software Process
C. Three D. none of above
D. Four 80. Test suite is
75. During software development, which fac- A. Set of test cases
tor is most crucial? B. Set of inputs
A. People C. Set of outputs
B. Product D. None of the above
C. Process
81. Each iteration in the incremental model
D. Project passes through the
87. A system analyst does not need to con- A. states and Statements
sider ? B. rules and Actions
A. . Technical feasibility C. conditions and Actions
B. . Economics feasibility D. Stubs and Entry
NARAYAN CHANGDER
94. Effort is measured in terms of C. 2-Level
A. Person-months D. 3-Level
B. Rupees 100. SRS stands for
C. Persons A. Software Requirements Specification
D. Months B. System Requirements Specification
C. Software Requirements Solution
95. In software engineering, defects that are
discovered are to fix. D. None of these
A. earlier; more expensive 101. What are the types of requirements?
B. later; more expensive A. Availability
C. by customers; more difficult B. Reliability
D. by developers; more difficult C. Usability
D. All of the mentioned
96. What is the purpose of building a proto-
type? 102. Which model shows the flow of object in-
A. to test the product and make sure that teractions?
it is the best solution to the problem A. Sequence model
B. to make sure that the product is in com- B. Subsystem model
pliance with government regulations C. Dynamic model
C. to determine the design constraints D. Both Sequence and Dynamic model
for the product
103. RUP stands for created by a division
D. none of above of
97. A data model contains A. Rational Unified Program, IBM
A. Data Object B. Rational Unified Process, Infosys
B. Attributes C. Rational Unified Process, Microsoft
C. Relationships D. Rational Unified Process, IBM
D. All of the mentioned 104. Project risk factor is considered in?
A. Spiral Model
98. The tools that support different stages of
software development life cycle are called B. Waterfall Model
C. Prototyping Model
A. CASE Tools D. Iterative enhancement Model
116. Why do you think iteration is important 121. What is another name for a rough draft
for design? or skeletal version of a program?
A. To frequently reanalyze the problem A. model
B. To generate and improve solutions B. prototype
only once for better output C. version
C. All of the mentioned D. archetype
D. None of the mentioned 122. If user participation is available which
NARAYAN CHANGDER
model is to be chosen?
117. The modification of the software to
A. Waterfall model
match changes in the ever changing en-
vironment, falls under which category of B. Iterative enhancement model
software maintenance? C. Spiral model
A. Corrective D. RAD model
B. Adaptive 123. In which step of SDLC actual program-
C. Perfective ming of software code is done?
A. Maintenance and Evaluation
D. Preventive
B. Development
118. Equivalence class partitioning is related C. Design
to
D. Analysis
A. Structural testing
124. QFD in requirement engineering stands
B. Blackbox testing for
C. Mutation testing A. Quality function design
D. All of the above B. Quality factor design
C. Quality function development
119. Prototyping in software process may in-
volve D. Quality function deployment
127. The work products produced during re- 132. A software program designed or used to
quirement elicitation will vary depending perform task such as processing program
on the code to machine code
137. A view point may differ from person to 142. What is software quality?
person A. Satisfying client needs
A. True B. Proving Best Lunch
B. False C. Conducting Semester Exam
C. Viewpoint D. Reopening university And Colleges
D. None
143. It is a framework that is used to struc-
NARAYAN CHANGDER
138. Software developed to be sold to a range ture, plan, and control the process of de-
of different user veloping an information system.
B. Implement the simplest solution to 153. Select the option that suits the Manifesto
meet today’s problem for Agile Software Development
NARAYAN CHANGDER
159. Dependency models the relationship C. Draining the water
A. has-a D. none of above
B. is-a
165. A software requirements specification
C. uses-a (SRS) document should avoid discussing
D. none of above which one of the following?
A. Functional requirements
160. A decision table facilitates conditions to
be related to: B. Non-functional requirements
A. Action C. Design specification
B. Program D. Constraints on the implementation
C. Table 166. is done in the development phase by
D. Stub the debuggers.
A. coding
161. Which of the following is NOT the activi-
ties for project management? B. Testing
A. Estimating development time C. Debbuging
B. Training and handover D. Implementation
C. Ensuring good communication and a 167. What is the simplest model of software
healthy work environment development paradigm?
D. Managing budgets A. Spiral model
162. Which model in system modelling depicts B. Big Bang model
the static nature of the system? C. V-model
A. Behavioral Model D. Waterfall model
B. Context Model
168. What are the main goals of software en-
C. Data Model gineering?
D. Structural Model A. Produce a reliable software
163. Which principle refers to the lifelong B. Produce a cost-effective software
learning of a software engineer? C. Produce reliable and cost-effective
A. Self software
B. Product D. All wrong
NARAYAN CHANGDER
187. Which one of the statements is not cor-
A. Embedded rect during requirements engineering?
B. AI A. Requirements are difficult to uncover
C. System B. Requirements are subject to change
D. Tactical C. Requirements should be consistent
183. An intellectual property that applies to in- D. Requirements are always precisely
ventions. known
A. Copyright 188. Which diagram in UML shows a complete
B. Patent or partial view of the structure of a mod-
eled system at a specific time
C. Trade Secrets
A. Sequence Diagram
D. Trademark
B. Collaboration Diagram
184. While estimating the cost of software, C. Class Diagram
Lines of Code (LOC) and Function Points
(FP) are used to measure which one of the D. Object Diagram
following? 189. Who writes the Software Require-
A. Length of code mentSpecifications Document (SRS)?
B. Functionality of software A. System Developer
C. Size of Software B. System tester
D. None of the above C. System analyst
D. User of the system
185. The spiral model of software develop-
ment 190. Scenario-based models represent
A. Ends with the delivery of the software from the user’s point of view,
product A. Software specifications
B. Is more chaotic than the incremental B. Software requirements
model
C. Software design
C. Includes project risks evaluation dur-
D. None of the mentioned above
ing each iteration
D. All of the above 191. Based on software requirements, busi-
ness process, business rules, software de-
186. A stage in which individual components sign and customer specifications, the soft-
are integrated and ensured that they ware coding begins. This is part of
195. The control unit, arithmetic logic unit and D. workflow diagram
memory are together called Central Pro-
cessing Unit or CPU. 200. Which of the following is not a Software
Configuration Management Activity?
A. yes
B. no A. Configuration item identification
NARAYAN CHANGDER
SRS?
C. sequence diagrams
A. Cost D. collaboration diagrams
B. Design Constraints
209. The fundamental notions of software en-
C. Staffing gineering does not account for?
D. Delivery Schedule A. Software Security
204. is a Personnel cost attribute B. Software reuse
213. What is NOT an Agile methodology? 219. Software is the set of instructions or pro-
A. Extreme programming (XP) grams that make a computer function. It
cannot be touched or seen.
NARAYAN CHANGDER
226. How is Incremental Model different from B. Unpredictable Load
Spiral Model?
C. Performance
A. Progress can be measured for Incre-
D. Availabilty
mental Model
B. Changing requirements can be accom- 232. manage the system development, as-
modated in Incremental Model sign staff, manage the budget and report-
C. Users can see the system early in In- ing, and ensure that deadlines are met
cremental Model A. Project managers
D. All of the mentioned B. Network engineers
227. WAN means C. Graphic designers
A. Wide Area network D. Systems analysts
B. Wire area network
233. Hardware cannot be touched, only soft-
C. World area network ware can be touched.
D. Non of the above A. Yes.
228. Software Engineers shall B. No.
A. act consistently with public interest C. I don’t know.
B. act in a manner that is in the best in- D. none of above
terests of his expertise and favor
C. ensure that their product only meet 234. Which is NOT a software characteristic?
SRS A. Software does not wear out
D. all of the above B. Software is flexible
229. Which is not a software life cycle model? C. Software is not manufactured
A. Waterfall model D. Software is always correct
B. Spiral model
235. Product Requirement, Efficiency Require-
C. Prototyping model ment, External Requirement Comes under
D. Capability maturity model A. Function Requirement
230. Aggregation represents . B. Non Functional Requirement
A. is a relationship C. Both Functional and Non Functional
B. part of relationship D. none of above
236. The system engineering process usually C. Delivery within budget and schedule
begin with D. All of the mentioned
C. Determines whether or not the pro- 252. Which of the following does not affect
gram works the software quality and organizational
D. Implements the program code performance?
A. Market
247. .Which of the following is not a UML dia-
gram? B. Product
A. Class diagram C. Technology
B. Object Diagram D. People
NARAYAN CHANGDER
C. Interface diagram
253. Prevention costs include
D. Use case model
A. a)quality planning
248. The use case diagram
B. b)formal technical reviews
A. Specifies the functional decomposition
of a system C. c)test equipment and training
C. Documents
D. All of the above
D. All of the above
256. In cause effect graphing technique, cause
251. The interviews, which are held between
& effect are related to
two persons across the table is
A. Written A. Input and output
257. What among the following statement is 262. Aside for the technical skills, which is not
true? include in a software engineer skills
258. The ability to encourage the technical peo- A. Determines what the program will do
ple to produce their best ability is known B. Determines how the program will work
as .
A. Organization C. Determines whether or not the pro-
B. Motivation gram works
C. Ideas or innovation D. Adds new features to the delivered
D. None of the above program
259. I can’t use my mobile phone. The bat- 264. & are two kinds of software prod-
tery’s ucts.
A. over A. CAD, CAM
B. flat B. Firmware, Embedded
C. exhausted C. Generic, Customised
D. none of above D. None of the mentioned
260. What are the attributes of Good Soft- 265. Refers to the legal right of the owner of
ware? intellectual property.
A. Software functionality A. Fair Use
B. Software maintainability
B. Public Domain
C. Software development
C. Copyright
D. Both Software functionality and main-
D. I don’t know
tainability
261. Activity diagram, use case diagram, col- 266. Which tools are helpful in all the stages
laboration diagram, and sequence dia- of SDLC, for requirement gathering to test-
gram? ing and documentation?
NARAYAN CHANGDER
tion as a whole. tomer
NARAYAN CHANGDER
290. Cause effect graphing techniques is one B. 4GT
form of C. AUP
A. Maintenance testing D. All of the mentioned
B. Structural testing
296. It is a system development methodology
C. Function testing which is also a waterfall development pro-
D. Regression testing cess that emphasizes an extremely short
development cycle.
291. The best architectures, requirements,
A. Iterative Enhancement Model
anddesigns emerge from self-organizing
teams is the myth B. Spiral Model
A. True C. Rapid Application Development Model
B. False
D. Prototyping Model
C. Cant say
D. none of above 297. It is a quality of a systems analyst that
has the ability to articulate and speak, and
292. is not suitable for accommodating any knack of working in all levels of manage-
change? rial positions of the organizations.
A. RAD Model A. Understanding
B. Waterfall Model B. Teaching and selling ideas
C. Build & Fix Model C. Thorough knowledge of computers
D. Prototyping Model D. Communication skills
293. Someone who wants to know how and 298. RAD model was proposed by
why things work. They also design and A. Lucent Technologies
build things.
B. Motorola
A. scientist
C. IBM
B. ME!
D. Microsoft
C. Engineer
D. none of above 299. Site for Beta testing is
A. Software company
294. Which two of the following models will
not be able to give the desired outcome if B. User’s site
user’s participation is not involved? C. Any where
A. Waterfall & Spiral D. All of the above
310. The aspect of the feasibility study which 315. are the features of software.
determines whether the current work prac- A. Software is developed or engineered
tices and procedures are adequate to sup-
port the new system is termed B. Software doesn’t wear out
NARAYAN CHANGDER
D. economical feasibility sponsible to do the requirements model-
ing?
311. FAST stands for A. Software engineer or an Analyst
A. Functional Application Specification B. System Engineer
Technique
C. Network administration
B. Fast Application Specification Tech-
D. None of the mentioned above
nique
C. Facilitated Application Specification 317. verification is ?
Technique A. Making sure that it is what the user re-
D. None of the mentioned ally wants
B. Checking that we are building the right
312. What is the first activity in Software system
Project Planning?
C. Checking that we are building the sys-
A. Determination of software scope tem right
B. Determination of budget D. Performed by an independent test
C. Find out the team size team
D. None of these 318. Which metric gives the idea about the
contents on a web page?
313. Which of the following is a characteristic
of an Agile leader? A. Word Token
A. Disinterested B. Word Count
B. Task focused C. Word Size
C. Process oriented D. Word Length
D. Supportive 319. which of these abstractions class con-
sist?
314. The purpose and character of the use, in-
cluding whether such use is of a commer- A. Attributes
cial nature or is for nonprofit educational B. operation
purposes.
C. set of objects
A. Fair Use
D. all of the above mentioned
B. Public Domain
320. it shows the breakdown of the software
C. Copyright into components that are implemented by
D. I don’t know a single developer or development team.
331. Which one of the following characteris- 336. External Entities may be a:
tics of software products being developed A. source of input data only
is not a symptom of software crisis?
B. source of input data or destination of
A. Fail to meet user requirements. results
B. Expensive. C. destination of results only
C. Highly interactive. D. repository of data
D. Difficult to alter, debug, and enhance. 337. Which of the following is not an effective
NARAYAN CHANGDER
software project management focus:
332. CMM stands for A. Process
A. Capability Management Module B. Product
B. Conservative Maturity Model C. Popularity
C. Capability Maturity Module D. People
D. Capability Maturity Model 338. Which is one of the most important stake-
holder from the following?
333. Why is UML used? A. Entry level personnel
A. Because it is a graphical language that B. Middle level stakeholder
can be used to model object oriented sys- C. Managers
tems
D. Users of the software
B. Because it provides the software de-
velopment community with a common lan- 339. The process of developing a software
guage product using software engineering princi-
ples and methods is referred to as, .
C. Because it is similar to java
A. Software myths
D. All of the above
B. Scientific Product
334. Testing is the activity of software which C. Software Evolution
can be avoided. D. None of the above
A. False 340. A software provides the framework
B. True from which a comprehensive plan for soft-
ware development can be established.
C. Can’t say
A. people
D. Non of the above
B. product
335. Which of the following is an important C. process
factor that can affect the accuracy and ef- D. none of the mentioned
ficacy of estimates?
341. Size can be measured in
A. Project size
A. SLOC
B. Planning process B. LOC
C. Project complexity C. SSLOC
D. Degree of structural uncertainty D. SALOC
342. DFD’s come under which phase of the D. System is automatically updated every
Software Analysis and Design? 5 seconds
343. Which Agile methodology advocates the C. Software Requirement specification &
use of problem domain? Validation
346. An example of a functional requirement 351. Your teacher needs to calculate grades for
is your class. What type of application soft-
ware would he/she MOST LIKELY use?
A. Access to the customer order system
A. Spreadsheet
B. System should be available in English
and Spanish B. Word processing
352. Which of the following are the valid rela- A. Yes, because you’re inserting data into
tionships in Use Case Diagrams the computer.
A. Generalization B. No, because you’re not introducing
data into the computer.
B. Include
C. I don’t know.
C. Extend
D. none of above
D. All of the mentioned
358. and are the two issues of Require-
NARAYAN CHANGDER
353. Function count method was developed by ment Analysis.
A. B.Beizer A. Performance, Design
B. B.Boehm B. Stakeholder, Developer
C. M.Halstead C. Functional, Non-Functional
D. Alan Albrecht D. None of the mentioned
354. The deployment diagram 359. Following is/are points of software def-
A. Models the physical components of an inition
architecture A. Instructions
B. Defines the installation procedures for B. Data structures
the software C. Documents
C. Models the business units in which the D. All of the above
software will be deployed
D. Defines the deployment schedule for 360. What is a Software?
an incremental installation A. Software is set of programs
B. Software is documentation and config-
355. Which of the following activities of a
uration of data
Generic Process framework provides a
feedback report? C. Software is set of programs, documen-
tation & configuration of data
A. Communication
D. None of the mentioned
B. Planning
C. Modeling & Construction 361. Which of the following life cycle model
can be chosen if the development team has
D. Deployment less experience on similar projects?
356. An testing focuses on the construction A. Spiral
and design of the software. B. Waterfall
A. unit testing C. RAD
B. integration D. Iterative Enhancement Model
C. validation
362. Which of the following is not considered
D. All as a risk in project management?
NARAYAN CHANGDER
375. In order to represent a complicated pro-
cess you would use? B. defects
A. Class diagram C. bugs
B. Use case diagram D. errors
C. Activity diagram 381. A field of science that focuses on the
D. Venn diagram study of software is called:
A. ISO/IEC 9126
376. Interrupts a program on a specific line of
code, allowing the program is an example B. SWEDISH BOOK
of which type of IDE tool? C. SRS
A. Debugger D. IEEE
B. Trace
382. Which one is not the characteristics of
C. Breakpoint software
D. Variable Watch A. Invisibility
377. Software consists of B. Complexity
A. Set of instructions+Operating Proce- C. Longevity
dure D. Tangibility
B. Programs+Documentation+Operating
383. which diagram is used to show inter-
Procedure
actions between messages are classified
C. Programs+Hardware manuals as?
D. Set of programs A. statechart
378. What is the first step in the softwarede- B. Collaboration
velopment lifecycle? C. objectlifeline
A. System Design D. activity
B. Coding
384. Which one of the following is not a phase
C. System Testing of Prototyping Model?
D. Preliminary Investigation and Analysis A. Quick Design
385. Which of the following does not apply to 390. Statistically, the maximum percentage of
agility to a software process? errors belong to the following phase of
SDLC
NARAYAN CHANGDER
cussed in Controlled Requirements Expres-
sion (CORE)., ,
402. Requirements elicitation means
A. Functional, Non-Functional User
A. Gathering of requirements
B. User, Developer
B. Capturing of requirements
C. Known, Unknown
D. All of the mentioned C. Understanding of requirements
D. All of the above
397. SQA Full form
A. Software Quality Assurance 403. Must established a map called a software
B. Software quality Appliance project plan that defines the software en-
gineering work to be done.
C. Software Quality Account
A. planning
D. Software Quality Affect
B. communication
398. IEEE 830-1993 is the recommended IEEE
standard for C. feedback
A. Testing D. analysis
B. Software Design 404. Which of the following is not achieved by
C. Software Requirement Specification an automated estimation tools?
D. Both B and C A. Predicting staffing levels
399. It verifies that system protection mecha- B. Predicting software cost
nism prevent improper access or data al- C. Predicting software schedules
teration.
D. Predicting clients demands
A. recovery testing
B. security testing 405. What best describes the purpose of an
C. performance testing Activity Diagram?
406. Agile Software Development is based on 412. The concurrent development model is
A. Incremental Development A. Defines events that trigger engineer-
411. What do you understand by software? 416. What are the types of software develop-
A. Software is documentation and config- ment requirements?
uration of data
A. Availability
B. Software is set of programs
B. Reliability
C. Software is set of programs, documen-
tation & configuration of data C. Usability
D. None of the mentioned D. All of the mentioned
NARAYAN CHANGDER
D. All C. Software is always correct
D. Software is flexible
418. Testing of software with actual data and
in actual environment is called 424. Classes and interfaces are a part of
A. Alpha testing A. Structural things
B. Regression testing B. Behavioral things
C. None of the above C. Grouping things
D. Beta Testing D. Annotational things
419. An abstract representation of a process. 425. Which one of the items listed below is not
A. Software Engineering one of the software engineering layers?
B. Software Process A. Process
C. Software Specification B. Manufacturing
D. Software Process Model C. Methods
D. Tools
420. A node with indegree =! 0 and out de-
gree=0 is called 426. systems are required to operate as dis-
A. Source node tributed systems across networks that in-
clude different types of computer and mo-
B. Destination node
bile devices refer to
C. Predicate node
A. Heterogeneity
D. None of the above
B. Security and trust
421. A set of activities that ensure that soft- C. Business and social change
ware correctly implements a specific func-
tion. D. All
D. 4 B. validation
C. Stress testing
430. Identify the disadvantage of Spiral
Model. D. None
A. Doesn’t work well for smaller projects 435. Arrange the tasks involved in require-
ments elicitation in an appropriate man-
B. High amount of risk analysis ner.i. Consolidationii. Prioritizationiii. Re-
C. Strong approval and documentation quirements Gatheringiv. Evaluation
control A. iii, i, ii, iv
D. Additional Functionality can be added B. iii, iv, ii, i
at a later date
C. iii, ii, iv, i
431. Which of the following document contains D. ii, iii, iv, i
the user system requirements?
A. SRD 436. Aggregation models the relationship
B. DDD A. has-a
C. SDD B. is-a
D. SRS C. uses-a
438. Alpha testing is done by 444. Size and Complexity are a part of
A. Customer A. Product Metrics
B. Tester B. Process Metrics
C. Developer C. Project Metrics
NARAYAN CHANGDER
cause?
A. System Software
A. focuses about long-term success
B. Application Software
B. takes care of any production issues
C. Scientific Software
C. all choices
D. None of the above
D. none of above
446. “Are we building the product right?
440. A description of each function presented means
in the DFD is contained in a A. validation
A. data flow B. Verification
B. process specification C. both
C. control specification D. none
D. data store 447. Utility program is under
441. A data abstraction is a named collection A. AI
of data that describes a data object B. System software
A. data manipulation C. Embedded
B. data hiding D. All
C. Both A and D 448. Estimation of size for a project is depen-
D. data abstraction dent on
A. Cost
442. SRS document is for:
B. Schedule
A. “What” of a system?
C. Time
B. “How” to design the system? D. None pf these
C. Costing and scheduling of a system
449. A is a logical grouping of database
D. System’s requirement objects, usually to facilitate security, per-
formance, or the availability of database
443. Boundary value analysis belong to? objects such as tables and indexes.
A. White box Testing A. Tablespace
B. Black box Testing B. Segments
C. Black box Testing & White box Testing C. Extents
D. none of above D. Blocks
NARAYAN CHANGDER
ing data.
467. In Software Process, are considered
C. I don’t know.
as the stakeholders
D. none of above
A. Customers
462. testing requires the tester to under-
stand what the program is supposed to do, B. End-Users
but not how it works, they are unable to C. Project Managers
“see inside” the program.
D. All of the above
A. validation
B. Black box 468. How many phases are there in Scrum?
C. integration
A. Two
D. None
B. Three
463. Which one is the superlative for:I am /
at programming (good) C. Four
A. I am better at programming D. Scrum is an agile method which means
B. I am the best at programming it does not have phases
C. I am gooder at programming
469. In a DFD external entities are repre-
D. none of above sented by a:
464. A context diagram is used: A. rectangle
A. as the first step in developing a de- B. ellipse
tailed DFD of a system
C. diamond shaped box
B. in systems analysis of very complex
systems D. circle
C. as an aid to system design
D. as an aid to programmers 470. is to use hypermedia to present text,
graphics, audio, and video content to the
465. Software engineers are by their nature end-user.
A. Content Sensitive
A. Aesthetic people
B. Continous Evolution
B. narrow-minded people
C. both A and B C. Data Driven
D. Constructive People. D. Security
471. Being a software manager, when you C. Simple development learning cycle
will decide the number of people required D. Non of the above
for a software project?
NARAYAN CHANGDER
A. a)rework
C. Attributes
B. b)repair
D. All of the mentioned
C. c)failure mode analysis
489. From the following which quality deals
D. All a, b, c
with maintaining the quality of the soft-
484. Which of the following statements re- ware product?
garding Build & Fix Model is wrong? A. Quality assurance
A. No room for structured design B. Quality control
B. Code soon becomes unfixable & un- C. Quality efficiency
changeable D. None of the above
C. Maintenance is practically not possi-
ble 490. The software that supports a computer’s
basic functions, such as scheduling tasks,
D. It scales up well to large projects executing applications, and controlling pe-
485. Which step among these follows the ripherals.
wrong sequence in software engineering A. Software Application
design process? B. Utility Software
A. Analyze problem C. Operating System
B. Generate candidate architecture D. I don’t know
C. Finalize design
491. is graphical representation for speci-
D. Select detailed design fying which actions to perform depending
on given conditions.
486. The result of the requirements engineer-
ing task is an analysis model that de- A. Decision Tree
fines which of the followingproblem do- B. Decision table
main(s)? C. Flowchart
A. information D. System Chart
B. functional
492. what’s the job(s) that included on implem-
C. behavioral ntation phase?
D. all of the above A. web Developer
487. Which of the following is not a type of B. mobile developer
maintenance? C. disktop applications developer
A. Translation D. all choices
493. Changes keywords and annotation to dif- C. Process allows team to streamline
ferent colours is an example of what IDE tasks
tool?
NARAYAN CHANGDER
504. Which is not a functional testing tech- following is not one that falls into such cat-
nique? egory?
A. Decision table A. Translation
B. Regression testing B. Correction
C. Boundary value analysis C. Adaptation
D. None of the above D. Prevention
505. SDLC stands for 511. A node with indegree 0 and out de-
gree=0 is called
A. System Development Life cycle
A. Source node
B. Software Design Life Cycle B. Predicate node
C. Software Development Life Cycle C. Destination node
D. System Design Life Cycle D. None of the above
D. all A. independently
B. together
517. Quality Management in software engi-
neering is also known as C. both A and B
A. SQA D. None
520. Starting from least to most important, B. Mexico City is more big than London.
choose the order of stakeholder.i. Man-
agersii. Entry level Personneliii. Usersiv. C. Mexico City is bigger than London.
Middle level stakeholder D. none of above
NARAYAN CHANGDER
527. Which two models doesn’t allow defining C. n+4 test cases
requirements early in the cycle?
D. None of the above
A. Waterfall & RAD
533. Which of the following is not an exam-
B. Prototyping & Spiral
ple of infrastructure components that may
C. Prototyping & RAD need to be integrated into the software ar-
D. Waterfall & Spiral chitecture?
A. Communications components
528. Which one is not a step of requirement
engineering? B. Database components
A. Requirements elicitation C. Interface components
B. Requirements analysis D. Memory management components
C. Requirements design 534. In the requirement analysis which model
D. Requirements documentation depicts the information domain for the
problem?
529. Compilers, Editors software is included in
A. Data models
which type of software?
B. Class-Oriented models
A. System software
C. Scenario-based models
B. Application software
D. Flow-oriented models
C. Scientific software
D. All wrong 535. RAD software process model stands
for?
530. A relational database system needs to
A. Rapid Application Development
maintain data about the relations, such as
the schema of the relations. This is called B. Relative Application Development
A. Metadata C. Rapid Application Design
B. Catalog D. Recent Application Development
C. Log 536. Which of the following is not generic
D. Dictionary product?
537. A step in waterfall model that involves a 542. The Linear Sequential or Classic Life Cycle
meeting with the customer to understand is also called.
the requirements.
B. Application software C. 2, 4, 5, 1, 3, 6
C. Scientific software D. 4, 2, 5, 1, 6, 3
D. None
553. A system analyst is on location with the
548. Occurs when outputs of a system are specialist or the users of the system to
routed back as inputs as part of a chain elicit requirements. This Requirement Elic-
of cause-and-effect that forms a circuit or itation technique is:
loop. A. use of questionnaires
NARAYAN CHANGDER
A. planning B. field observation
B. analytical C. interviewing
C. feedback D. brainstorming
D. communication
554. “Are we building the right product? ”
549. Which is not one of the types of proto- means
type of Prototyping Model? A. requirement analysis
A. Horizontal Prototype B. verification
B. Vertical Prototype C. Validation
C. Diagonal Prototype D. all
D. Domain Prototype
555. Which of these does not account for soft-
550. Unit testing is carried out during which ware failure?
phase of the waterfall model? A. Increasing Demand
A. Implementation phase B. Low expectation
B. Testing phase C. Increasing Supply
C. Maintenance phase D. Less reliable and expensive
D. Design phase
556. Which of these software engineering ac-
551. Which of these is not a similarity be- tivities are not a part of software pro-
tween the v-shaped model and the water- cesses?
fall model?
A. Software development
A. It is easy to understand
B. Software dependence
B. Have requirements
C. Software validation
C. Little flexibility
D. Software specifications
D. Testing is applied throughout
557. Which one is the most important feature
552. Arrange the following steps to form a ba- of spiral model?
sic/general Engineering Process Model.i.
A. Quality management
Test ii. Designiii. Installiv. Specificationv.
Manufacturevi. Maintain B. Risk management
A. 2, 4, 5, 1, 6, 3 C. Performance management
B. 4, 2, 5, 1, 3, 6 D. Efficiency management
568. During validation 573. What is the purpose of Use Case dia-
gram?
A. Process is checked
A. Functional decomposition
B. Product is checked
B. Identification of functional require-
C. Developer’s performance is evaluated ments
C. To define sequences of actions
D. The customer checks the product
D. To identify nultiplicities
NARAYAN CHANGDER
569. The Unified Modeling Language (UML) 574. The operation phase of the waterfall
has become an effective standard for soft- model is a synonym for which one of the
ware modelling.How many different nota- following phases?
tions does it have?
A. Coding and unit testing phase
A. Three B. Integration and system testing phase
B. Four C. Maintenance phase
C. Six D. Design phase
D. Nine 575. The use case is a template driven descrip-
tion of an interaction between
570. Among following which is NOT an objec-
tive of validation? A. An actor and the software
B. Design and testing
A. Ensure requirements meet business
needs C. Coding and debugging
B. Promote agile method D. Preliminary investigation and analysis
NARAYAN CHANGDER
B. Repeatable
591. User requirements are expressed as C. Managed
in Extreme Programming.
D. Optimizing
A. implementation tasks
597. The design phase
B. functionalities
A. Determines whether or not the pro-
C. scenarios
gram is feasible
D. none of the mentioned
B. Determines which classes are needed
592. A node with indegree=0 and out degree and what they will do
0 is called C. Determines whether or not the pro-
A. Source node gram works
B. Destination node D. Implements the program code
C. Transfer node 598. Internet Explorer and Google Chrome are
D. None of the above examples of
A. Utilities
593. User requirements are expressed as in
Extreme Programming B. Operating System
A. implementation tasks C. Web Browsing Software
B. functionalities D. Applications Software
C. scenarios 599. Decision-Table is a way
D. none of the mentioned A. Of representing multiple conditions
594. odd one in Building Blocks of UML B. Of representing the information flow
A. Things C. To get an accurate picture of the sys-
tem
B. Relationships
D. All of these
C. Diagrams
D. Rules 600. Which requirements are related to sys-
tem attributes such as reliability and re-
595. Is this a valid example of the sponse time.
Input-Process-Output Model? In- A. Non-functional requirements
put:Text and numbers typed on key-
board.Process:Calculations performed in B. Functional Requirements
a spreadsheet.Output:Bank record. C. Domain Requirements
A. Yes. D. Software Requirements
601. The battery isn’t completely flat, but its 606. What is the process of analyzing, docu-
very menting, tracking, prioritizing and agree-
ing on the requirement and controlling the
611. Solve the Decision Table Example:Select 616. Software engineering involves
the largest of three distinct numbers A, B, A. Using engineering tools and tech-
CFind out how many conditions and actions niques in software development
in given data?
B. Using scientific way to software devel-
A. Condition=3 and Action=3 opment
B. Condition=6 and Action=3 C. Both A and B
C. Condition=4 and Action=4 D. Non of the above
NARAYAN CHANGDER
D. Condition=3 and Action=6 617. Selection of a model is based on
A. Requirements
612. In which process the developers discuss
B. Development team & Users
with the client and end users and know
their expectations from the software? C. Project type and associated risk
A. Requirement gathering D. All of the mentioned
622. How many number of maturity levels in C. A decision table is directly understood
CMM are available? by the computer
625. Is part of the initial design stage of any 630. The course generated code and you must
project/plan. It is conducted in order test an uncover error in that code.
to objectively uncover the strengths and
A. construction
weaknesses. In addition, a of a proposed
project or an existing business. B. modeling
A. System Process C. communication
B. Project Management D. feedback
C. Feasibility Study
631. Software project management consists of
D. I don’t know
the following activities
626. Which, of the following is not true about A. Project planning
the description of a decision table?
B. Scope management
A. A decision table is easy to modify
C. Project estimation
B. A decision table is easy to understand
D. All the above
632. It is a systems methodology where a pro- 637. When evaluating information, use the
totype is built, tested and then reworked CRAAP principle, which stands for:
as necessary until an acceptable outcome A. Cost, Relevant, Authority, Accuracy,
is achieved from which the complete sys- Purpose
tem or product can be developed.
B. Currency, Role, Authority, Accuracy,
A. Waterfall Model Purpose
B. Prototyping Model C. Cost, Relevant, Authority, Accuracy,
NARAYAN CHANGDER
C. Spiral Model Perspective
D. Evolutionary Development Model D. Currency, Relevant, Authority, Accu-
racy, Purpose
633. What does the study of an existing sys-
tem referto? 638. Incremental model needs
A. Details of ER diagram A. bigger development team
B. Feasibility Study B. requirements is not the prime concern
C. System Analysis
C. Well understood requirements
D. System Planning
D. none of above
634. Which one of the following is not an
639. Which design model elements are used to
Umbrella Activity that complements the
depict a model of information represented
five process framework activities and help
from the user view?
team manage and control progress, qual-
ity, change, and risk. A. Architectural design elements
A. Reusability management B. Component-level design elements
B. Risk management C. Data design elements
C. Measurement D. . Interface design elements
D. User Reviews 640. Which one is the comparative for:is Intel
is / (fast) than AMD for gaming?
635. Class responsibility collaborator (CRC)
modeling describes, A. is Intel is faster than AMD for gaming?
653. a. Which of the following would not be A. Object Oriented Design (by Booch)
an appropriate class name? B. Use Cases (by Jacobson)
A. student C. Fusion (by Coleman)
B. Tony D. Object Modeling Technique (by Rum-
C. teacher baugh)
D. staff 659. is the process of translating a task
into a series of commands that a computer
NARAYAN CHANGDER
654. Which SDLC activity does the user initi-
will use to perform that task.
ates the request for a desired software
product? A. Project design
A. Requirement gathering B. Installation
B. Implementation C. Systems analysis
C. Disposition D. Programming
D. Communication 660. What is the recommended distribution of
effort for a project?
655. For a function of n variables robustness
testing of boundary value analysis yields: A. 40-20-40
B. 50-20-30
A. 4n+1
C. 30-40-30
B. 4n+3
D. 50-30-20
C. 6n+1
D. None of the above 661. Which of the following is not a point of
concern for Software engineering?
656. A program which allows previously com-
A. Quality of Software
piled code, from software libraries, to be
linked together is an example of which IDE B. Time taken to complete the software
tool. C. User Interface of the software
A. Linker D. Customer satisfaction
B. Loader 662. A project usually has a timeline chart
C. GUI Creation which was developed by
D. Editor A. Henry Gantt
B. Barry Boehm
657. A structured set of activities required to
develop a software system. C. Ivar Jacabson
A. Software Engineering D. None of the mentioned
B. Software Process 663. Class diagram, component diagram, ob-
C. Software Specification ject diagram, and deployment diagram are
D. Software Process Model A. structural
B. behavioral
658. What kind of approach was introduced
for elicitation and modelling to give a func- C. Non structural
tional view of the system? D. Non behavioral
664. The longer a fault exists in software 670. The Nonfunctional components consist of
A. the more tedious its removal becomes
NARAYAN CHANGDER
in the DFD is contained in C. Design
687. The process of establishing what services 693. A data store in a DFD represents:
are required and the constraints on the A. a sequential file
system’s operation and development.
699. Which one is not a type of require- 704. Which of the following is the BEST ap-
ments? proach for estimation?
A. Known requirements A. Expert opinion
B. Unknown requirements B. Analogy
NARAYAN CHANGDER
705. Class diagrams and collaboration dia-
700. The testing in which code is checked grams are the examples of, .
A. Black box testing A. Class models
B. White box testing B. Scenario-based models
C. Red box testing C. Behavioral models
D. Green box testing D. All of the mentioned above
701. The formal methods model of software 706. Most Effective way to convey informa-
development makes use of mathematical tion to and within a development team is
methods to A. Online meets
A. Define the specification for computer- B. Shared documents
based systems C. Sending a mail
B. Develop defect free computer-based D. Face to face
systems
707. Inspections and testing are what kinds of
C. Verify the correctness of computer- Quality Costs?
based systems
A. Prevention
D. All of the above
B. Internal Failure
702. Involving the team in Planning and Es- C. External Failure
timating and providing early feedback on
D. Appraisal
Delivery Velocity is BEST used to mitigate
what kind of risk? 708. A Swimlane Diagram is a,
A. Schedule flaws A. Useful variation of the activity diagram
B. Requirements creep
B. Represents the flow of activities de-
C. Employee turnover
scribed by the use case
D. Poor productivity C. Indicate which actor responsibility for
the action described by an activity rectan-
703. An analysis package is
gle
A. Analysis modeling categorization D. All of the mentioned above
B. Group of analysis package
709. Multiplicity for an association
C. Both A and B
A. association is the number of instances
D. None of the mentioned above with a single instance
NARAYAN CHANGDER
15. Which protocol would you use to create a
C. projector copy of the email from your email server?
D. photo copier A. FTP
B. IMAP
10. Computer devices attached to a network
are called C. POP3
A. Nodes D. HTTP
21. data is transmitted along thin glass fibre A. Network Interface Card
tubes B. Router
A. Tubes C. Switch
B. Fibre D. Airpods
C. ADSL
27. Peripherals are basically
D. Telkom
A. devices connected to a computer sys-
tem to add functionality.
22. Which device is used to transmit data from
one LAN to another LAN B. systems without compute systems
that function alone.
A. Router
C. are used to transform computer sys-
B. Bridge
tems.
C. Modem
D. will work only without computer sys-
D. Repeater tems.
23. Which protocol governs the way we trans- 28. What is Networking?
fer and load hypertext?
A. Networking is consists of two or more
A. FTP computers.
B. SMTP B. Networking is a business that you need
C. POP3 if you want to be rich.
30. In this network, each node is daisy- 35. Jimmy is required to set up a computer net-
chained together where the end of the net- work in school laboratory. Which of the
work comes back around to the first node. following network types is he setting up?
A. bus network A. Large Area Network (LAN)
B. ring network B. Local Area Network (LAN)
NARAYAN CHANGDER
36. A computer that is connected to a network
31. Which of these is a problem that could oc- is called a
cur within a network?
A. Stand alone
A. Sharing software and data
B. Mainframe computer
B. A virus spreading from computer to
C. Workstation or node
computer
D. Personal computer
C. Sharing hardware
D. none of above 37. Which is the largest network size that can
cover areas such as a state, country, and
32. It is any software designed to damage or the world?
to disrupt a system. A. PAN
A. Malicious software (malware) B. LAN
B. Adware C. MAN
C. Spyware D. WAN
44. Which of the following is a program capa- 49. In which OSI layer does routing occur?
ble of continually replicating with little or A. Network
no user intervention?
B. Data Link
A. Virus
B. Trojan horses C. Physical
C. Rootkit D. Transport
D. Worms 50. What does NIC stand for?
45. Company that has a permanent, fast con- A. Network interface Connector
nection to the internet and that sells inter-
net access and services for a monthly fee B. Network interface cord
NARAYAN CHANGDER
A. Public
D. Transmission Control Protocol / Inter-
net Protocol B. Private
C. Local
52. Which one is not a web browser
D. none of the above
A. Internet Explorer
58. Anything that is connected to a network is
B. Microsoft Onenote
considered to be a ?
C. Google A. node
D. Google chrome B. router
53. Provides only one type of resource to its C. computer
clients, such as printing D. switch
A. dedicated server 59. Limewire, Kazaa and Bearshare are all ex-
B. database amples of
C. non-dedicated server A. Brand names of networking hardware
products
D. cloud server
B. Web sites that store MP3 music files
54. What is not function of protocol? and Malware
A. Set the rules of data packet convertion C. Wireless network communication pro-
tocols
D. Software applications for peer-to-peer
B. Rules for routers
connection (P2P) file sharing
C. Set the rules attachment of the source
and destination of each packet 60. Other term for Switch?
D. Manage IP address assignment A. Bridge
B. Hub
55. “The world’s largest computer network
C. Router
which connects millions of computer all
over the world.” This is the definition for D. Cable
61. Which one is a type of Topology?
A. Communication A. Seashell
B. Network B. Tower
C. Internet C. Tree
D. World Wide Web D. Node
62. The highest in specifications/capacities/Speed B. If the central hub crashes the whole
in a network. It stands at the heart of network breaks
most networks?
B. A microphone D. Modem
66. What does the Router not look for when A. Local Area Network (LAN)
choosing a route? B. Personal Area Network (PAN)
A. The fastest route C. Wireless Local Area Network (WLAN)
B. The route with the least traffic D. Campus Area Network (CAN)
C. The cheapest route 72. every computer looking to access the In-
D. none of above ternet would be known as this
A. client
67. Which of these is a disadvantage of the
ring topology? B. desktop
73. The network size which connects two or D. Expensive machine for technicians to
more personal devices is called a use
A. PAN
79. A series of number used to identify a net-
B. LAN work device.
C. MAN A. IP Address
D. WAN
B. IM Address
74. A (n) is a collection of computers and
NARAYAN CHANGDER
C. MAC Address
devices connected together via communica-
tions devices and transmission media. D. OP Address
A. network 80. The largest network! It connects millions
B. Internet of computers together.
C. web page A. Internet
D. IP address B. Domain
75. What provides a port for a computer to C. Hyperlink
connect to a LAN?
D. Search Engine
A. Modem
B. RJ-11 81. What are the some factors that determine
whether a communication system is LAN
C. NIC
or WAN?
D. CAT 5
A. Size, geographical area and ownership
76. You need to connect more than two
computers in a network.
B. Platform, size and device
A. Network Interface Card
C. Device, geographical area and size
B. Network Cable
D. Platform, users and size
C. Network Hub
D. none of above 82. is a web browser
77. retreieve emails from server A. Internet
A. HTTP B. DIS
B. FTP C. Google
C. SMTP D. Google chrome
D. IMAP/POP
83. Which field is computer networks origi-
78. What is the purpose of a server on a net- nated from?
work?
A. Government
A. Connects all PCs together
B. Military
B. Central hub for a network
C. Media
C. Powerful computer than provides ser-
vices D. Police
D. You need high end computers to keep A. WAN, MAN, LAN, PAN
everything working B. LAN, PAN, WAN, MAN
87. is an international network of comput- C. PAN, MAN, LAN, WAN
ers. D. PAN, LAN, MAN, WAN
A. Network
93. Which device is not intelligent as it sends
B. WWW data to all computers on a network which
C. Internet causes a reduction in network speed?
D. Local Area Network A. Switch
B. Router
88. What does VPN stand for?
C. Hub
A. Virtual Private Network
D. Network Interface Card (NIC)
B. Virtual Public Network
C. Visual Private Network 94. Which one is the network type which al-
ways open for all?
D. Virtual Pirate Network
A. Network
89. Which network hardware is said to be in-
telligent as it can send data to the intended B. Indonet
computer and not every computer C. Internet
A. Hub D. Intranet
NARAYAN CHANGDER
D. Computer Topology A. LAN
B. WAN
96. What is an advantage of a LAN?
A. You can save money by sharing periph- C. PAN
erals like printers. D. none of above
B. It is limited to a small area.
C. Can cover near infinite geographical 102. What is meant by a data packet? (6-9)
distance. A. A unit of data that travels along a net-
D. Expensive to setup. work
97. Smartphones and smart watches communi- B. The number of error found in data
cate using when it has been transmitted
98. A is a connected system of objects or 103. Two or more computers connected to-
people. gether over a wide geographical area (e.g.
county, country, globe). What type of net-
A. Node work is this?
B. Data Transmission
A. LAN
C. Network
B. School Network
D. Operating System
C. WAN
99. Firewalls
D. The Internet
A. are software on the computer
B. protect the network 104. Transfer files to and from another com-
C. help you lock your modem/router puter.
105. Type of networks covers a large geo- 110. A type of tool used for verifying correct
graphical area and usually consists of sev- electrical connections of wires in a cable is
eral smaller networks, which might use known as:
109. Which data transmission service is run 114. Group of devices connected with one an
through your TV cable connection? other
115. Refers to the actual connections (wires, 120. The biggest WAN
cables, etc.) of how the network is ar- A. Internet
ranged. Setup, maintenance, and provi-
B. Intranet
sioning tasks require insight into the phys-
ical network. C. Extranet
A. Physical Network Topology D. none of above
B. Hardware Connections 121. Data communication system within a
building or campus is
NARAYAN CHANGDER
C. Logical Network Topology
D. Planned Connections A. MAN
B. LAN
116. The server
C. PAN
A. Receives something from the server
D. WAN
B. Provides something for the client
122. Radiowaves transmit data
C. Prints things
A. Through a Wired connection
D. Gives you internet
B. Wirelessly
117. A protocol used to transfer data from one C. Locally
computer to another through a network, D. Louder
such as the Internet
A. FTP 123. Physical pieces used to transport data
from one computer to another computer or
B. HTP peripheral on the network
C. DTTP A. media
D. HTTPS B. backbone
118. The computers in Prime Medical Hospital C. gateway
building are linked so that the staff can D. switch
share the files and printers.This kind of
network is an example of 124. The most common network topology, is
laid out so every node in the network is
A. PAN directly connected to one central hub via
B. LAN coaxial, twisted-pair, or fiber-optic cable.
C. WAN A. Star Topology
D. none of above B. Tree Topology
C. Mesh Topology
119. A computer has the ability to:
D. Ring Topology
A. It has the ability to store, retrieve, and
process data. 125. A device that connect LANs using the
same protocol is called?
B. It has the ability to store, retrieve, and
pastas data. A. Switch
C. It has the ability to stage, retrieve, and B. Bridge
process data. C. Router
D. none of above D. Gateway
126. When there’s speed limit on computer C. Wide are network (WAN)
networking? D. Metropolitan area network (MAN)
NARAYAN CHANGDER
138. computer network that connects com- B. a job where you make fishing nets
puters within a limited area such as a
home, school, computer laboratory, or of- C. 1 computer not connected to anything
fice building, using network media D. 2 or more computers connected to-
A. LAN gether
150. The main advantages of a star network 155. Which of the following connections has
are: the fastest speed to send and receive large
amounts of data?
A. Cheap to set up
A. dial-up
B. Easy to implement
C. Proceses data very fast B. satellite
D. A, B C. wireless
D. leased line
151. The network protocol that breaks mes-
sages into packets, reassembles the pack-
156. IP protocol is used in which layer
ets at the destination, and takes care of
errors. A. Physical layer
A. Telnet B. Network layer
B. TCP C. Transport layer
C. DSL
D. Application layer
D. UDP
157. Arrange the Following Types of Net-
152. An organisation has several offices with
works according to their size, from largest
a linked network in the local town. What
to smallest?
kind of network would this be?
A. LAN, MAN, WAN
A. LAN
B. WAN B. MAN, LAN, WAN
C. Mesh C. WAN, LAN, MAN
D. GAN D. WAN, MAN, LAN
NARAYAN CHANGDER
159. directing them between devices A. File Network
B. Computer Network
A. transport layer
C. Folder Network
B. internet layer
D. Cable Network
C. link layer
D. application layer 165. Which cable sends data as light?
A. Copper
160. What is a hardware device that con-
B. Fibre Optic
verts data so that is can be transmitted
from computer to computer over telephone C. Ethernet
lines? D. none of above
A. topology 166. Which one of the following types of net-
B. protocol work connections can give you the highest
C. router data transfer rates?
A. wired
D. modem
B. cellular
161. Select one of server application in an of-
C. broadband
fice
D. wireless
A. Game Server
B. Image Server 167. Which of the following uses light for
transmitting data?
C. Print Server
A. STP Twisted Pair
D. Application Server
B. UTP Twisted Pair
162. is a needed requirement to make an inter- C. Copper Cable
net connection? D. Optical Fiber
A. Pencil
168. ‘Witches use switches’ helps us to re-
B. Table member that
C. Modem A. Switches forward data ‘intelligently’
D. Camera B. Switches work by magic and spells
163. Which type of topology is best suited for C. Switches are efficient, but not as much
large businesses which must carefully con- as hubs
trol and coordinate the operation of dis- D. Swiches use CAT5 Ethernet and
tributed branch outlets? witches usually have a cat
180. The following are examples of popular 185. This refers to the main cabling of a net-
Web browsers, EXCEPT work that all of the segments connect to
A. Microsoft Internet Explorer which can carry 10 times more megabits
than a segment
B. Mozilla Firefox
A. backbone
C. Google Chrome
B. line
D. Yahoo!
C. router
NARAYAN CHANGDER
181. Which of the following tools would be D. gateway
used for attaching RJ-45 connectors to a
twisted-pair Ethernet cable? 186. Mention which one from this type is
A. Cable Tester working specifically to users of an orga-
nization !
B. Needle-Nose Plier
A. Network
C. Punchdown Tool
B. Indonet
D. Crimper
C. Internet
182. is a network that covers geographic D. Intranet
that are larger, such as Cities
A. LAN 187. What is the advantage of STP cable over
UTP cable?
B. WAN
A. STP is smaller and more flexible than
C. PAN UTP
D. MAN B. STP cable is less susceptible to EMI
and other interference than UTP
183. allows information to be delivered to
other computers or electronic devices that C. STP cable is less expensive to deploy
are connected than UTP
A. network D. STP cable has a lower attenuation than
UTP
B. web browser
C. hub 188. What is the meaning of CSS?
D. country A. Computer Solves Something
B. Computer Systems Servicing
184. Which of the following is a software that,
once installed on your computer, tracks C. Computer Shop Service
your internet browsing habits and sends D. Computer Service Special
you popups containing advertisements re-
lated to the sites and topics you’ve vis- 189. The maximum length limit for unshielded
ited? twisted-pair cable is meters?
A. Backdoors A. 50
B. Adware B. 80
C. Malware C. 100
D. Bots D. 120
201. What is the network device that ampli- 206. What do networks allow you to share?
fies and restores signals for long distance
A. information
transmission.
B. dinner
A. Bridge
C. cars
B. Switch
D. desks
C. Router
D. Repeater 207. the acronym for hyper text transfer pro-
NARAYAN CHANGDER
tocol secure
202. the protocol for file transfer
A. https
A. http
B. http
B. https
C. html
C. ftp
D. pdf
D. pdf
208. What is Bandwidth
203. Which is the slowest way for transmit-
A. Indie band made up of larger members
ting data to the internet?
A. Fiber Optic lines
B. The number of connections a location
B. Cable Lines has
C. DSL Phone lines C. The amount of data that can be trans-
mitted over WiFi
D. none of above
D. The amount of data that can be trans-
204. Parallel Data Transmission is where mitted along a communication channel
A. 1 bit is transmitted at a time
209. A device that is connected and controlled
B. 8 bits are transmitted at the same time by many computers on a network
A. shared peripheral
C. data can only be transmitted in one di-
B. laptop
rection at a time
C. router
D. 8 elephants are ridden at the same
time D. switch
205. in a multiplayer game center, we can 210. What does a DNS do?
found 2 or more devices which help to con-
A. translate a domain name into the cor-
nect multiple devices and makes it work as
rect IP address
a single netwok. What are they?
B. translate an IP address into a domain
A. WIFI
name
B. Hub
C. Gives names to websites which aren’t
C. NIC named
D. Satellite D. Leaves websites alone
211. UTP is a cable type normally associated 216. a protocol used by the World Wide Web
with? that defines how messages are formatted
and transmitted, and what actions web
221. Which of the following statements about 226. A computer networking device that con-
a network is FALSE? nects network segments
A. Viruses can spread to other computers A. switch
throughout a computer network
B. backbone
B. Resources such as printers can be
shared C. modem
C. Files cannot be shared between users D. router
NARAYAN CHANGDER
D. You can communicate with other users 227. DHCP is the abbreviation of
using e-mail and messaging
A. Dynamic Host Control Protocol
222. Which statement is correct? B. Dynamic Hyper Control Protocol
A. The more bandwidth you have, the
C. Dynamic Host Configuration Protocol
worse the connection will be
B. A switch is more efficient than a hub D. Dynamic Hyper Configuration Protocol
C. A hub is more expensive than a switch
228. Which protocol is used to exchange infor-
mation on the Internet?
D. Changing your password will not help
secure your account A. IPX/SPX
NARAYAN CHANGDER
A. Router D. Link
B. Switch 248. Which of the following is a web
C. Hub browser?
D. Modem A. Internet
B. DIS
243. providing networking services to applica-
tions C. Google
A. transport layer D. Google chrome
B. internet layer 249. SMTP is used for ..
C. link layer A. .. Retrieving emails
D. application layer B. .. Sending emails from one server to
another
244. Network connections are created using
C. .. Maintaing CPU performance
A. wires and cables
D. .. Downloading files
B. files and resources
250. Which of these is not an advantage of
C. computers and printers
networking computers?
D. none of above
A. Printers can be shared
245. The network size that is bigger than a B. Fewer cables are needed
LAN and can cover a city or a village is a
C. Files are easier to share
D. Install can be done on many comput-
A. PAN
ers at once
B. LAN
251. The internet is owned by
C. MAN
A. no one
D. WAN
B. the USA
246. This is a type of computer network that C. NATO
spans a small area, building or group of
buildings. It is usually owned, managed, D. the government
and controlled by a single entity or organi- 252. This device that changes computer net-
zation. work signals so they can travel along
A. Computer Networks phone or cable lines to the internet.
B. Local Area Network A. Router
C. POP3 A. Router
B. Hub
D. HTTP
C. TCP IP
257. A private computer network within an or- D. MAC
ganisation.
A. Internet 263. The suite of protocols and programs that
supports low-level network communica-
B. Intranet tion.
C. Extranet A. HTTP
D. Outernet B. P2P
C. gateway C. SSID
D. TCP/IP D. Hub
264. A computer network is computers 269. What is an example of an intermediary
connected together network device?
A. 2
A. PC
B. 2 or more
B. printer
NARAYAN CHANGDER
C. A large number
C. network switch
D. none of above
D. mouse
265. You configured a wireless network for
your neighbor, and he wants to imple- 270. passes data over the physical network
ment security measures beyond the stan-
A. transport layer
dard wireless encryption. What options
does he have? B. internet layer
A. Use NAT. C. link layer
B. DNS D. application layer
C. Enable DHCP.
271. Other term for LAN Card?
D. Use MAC filtering.
A. Interconnect Card
266. Defined as a subset of telecommunication
B. Network Interface Card
involving the transmission of data to and
from computers and components of com- C. Internet Local Card
puter systems
D. Local ArpaNet Card
A. Telecommunication
B. Data communication 272. Which of these is NOT an advantage of a
network?
C. Communication
A. Sharing peripheral devices such as
D. Network
printers and scanners
267. an application used to search and find in- B. Possible to communicate globally
formation on the Internet
C. Can protect against viruses
A. wifi
D. PCs can be backed up and updated by
B. server one central PC
C. web browser
273. How do wired networks connect to other
D. search engine
devices?
268. A small network hardware device that A. Radio frequencies
joins multiple computers together within
the same LAN. B. Microwave signals
A. Router C. Ethernet cables
B. Switch D. Barbed wire
277. Consider a number of computers are in 282. The Internet was originally developed by
a network, and one computer crashes. In whom?
which of the following network topologies A. computer hackers
will the entire network also go down?
B. a corporation
A. Ring
C. the U.S. Department of Defense
B. Star
D. the University of Michigan
C. Bus
D. Tree 283. What type of signals are transmitted
across fibre optic cables?
278. Technology that carry information, such
A. Electric
as sound, by systematically modulat-
ing properties of electromagnetic energy B. Light
waves transmitted through space.
C. Sound
A. Transistors
D. Radio
B. Radio Waves
C. Telephone Cables 284. Disadvantages of networks?
285. A network that has a large capacity, cov- 290. The term of sending data from your com-
ers a large geographical area, and com- puter to another computer on a network
bines multiple communication channels is or the internet is:
known as what type of network?
A. Create
A. MAN
B. Download
B. SAN
C. Modify
C. WAN
D. Upload
NARAYAN CHANGDER
D. LAN
286. A network that allows data to be trans- 291. Which of the following is an advantage
mitted from one device to another without of computer networks?
cables or wires A. They are portable and easy to carry
A. wireless network around with you
B. cloud network B. Viruses can spread quickly across a
C. local area network network
D. near field network C. Specialist IT staff are needed to main-
tain them which is expensive
287. computer that provides data to other
computers. It may serve data to systems D. Sharing devices such as printers saves
on a local area network (LAN) or a wide money
area network (WAN) over the Internet.
292. The full form of word MAC in MAC ad-
A. satellite dress is
B. hub
A. Mode Access capacity
C. server
B. Media Access Control
D. queue
C. Mode alias control
288. You can establish a Virtual Private Net-
work (VPN) connection D. Media Access capability
A. Only when using wireless connections 293. used for non-profit organization sites
to the Internet
A. .com
B. Only when using Ethernet connections
to the Internet B. .org
C. Only when connected to the Internet C. .net
D. None of these answers D. .edu
289. Which one is inccorect option to connect
294. which one is NOT a web browser
workstation with server?
A. Mozilla Firefox
A. Cable
B. Radio Transmitter B. Safari
C. Infra Red C. Google
D. Bluetooth D. Google Chrome
295. Which of the following is an example of 300. Computer networks allow users to
a WIRED connection? share:
C. 3G C. input devices
D. power
D. Bluetooth
301. What is a disadvantage of a client-server
296. A worldwide collection of networks that network?
connects millions of businesses, govern-
ment agencies, educational institutions, A. Cheap to set up
and individuals. B. If the server goes down, the network
goes down
A. World Wide Web
C. Each client manages its own security
B. Internet
D. The network can be managed centrally
C. ARPANet
D. ICANN 302. Which network topology requires a cen-
tral controller or hub?
297. Which type of network needs a ‘hub’ or A. Star
‘switch’? B. ring
A. Star C. Bus
B. Ring D. mesh
C. Bus 303. http://www.classzone.com is an exam-
D. none of above ple of what?
A. a URL
298. What is FTP used for?
B. an access code
A. To send information across the inter-
net in packets C. a directory
D. a server
B. To ensure that information is sent to
the correct computer 304. Any portion of a network that is sepa-
C. To send mail across the internet rated (by a switch, bridge, or router) from
other parts of the network.
D. To copy files from one computer to an-
other A. segment
B. backbone
299. encrypts all information sent and re-
C. hub
ceived
D. bus
A. HTTP
305. What is a network in which resource
B. FTP
sharing, processing and communications
C. HTTPS control are completely decentralized?
D. SMTP A. Client/Server Network
NARAYAN CHANGDER
work. D. Modem
A. Logical Network Topology
312. WiFi is a?
B. Planned Network
A. Type of computer
C. Physical Network Topology
D. Hardware Network B. Type of network cable
307. How many layers are there in the OSI ref- C. Popular technologies and standards
erence model? for wireless computer networking
A. 7 D. Computer programs that help people
B. 4 make money on the Internet
B. 2 A. Mesh
C. 3 B. Ring
D. 4 C. Star
D. Tree
318. Computer networks share
A. Files 324. ISP
320. Radio waves and microwaves are used in 326. network that covers a broad area using
which of the following communications? leased telecommunication lines
A. Voice over IP A. LAN
B. IP Telephony B. MAN
C. Wireless C. WAN
D. Enterprise D. NET
321. What do we need to set in our computer 327. A group of 2 more computer systems
in a network? linked together.
A. WAN A. Network
B. LAN B. Bandwidth
B. Desktop C. TCP
D. POP3
C. school network
NARAYAN CHANGDER
D. none of above 334. Advantages of the network?
A. Expensive Hardware
329. provides many different services to its B. Specialist staff required
client computers such as file retrieval,
printing, and emailing C. Communication
NARAYAN CHANGDER
A. It connects LANs via the public infras- D. Network disabled
tructure (internet)
356. What is failover?
B. It is wireless
A. Having a parallel server that ‘kicks in’
C. It only covers a limited area if the other server breaks
D. It will only support a small number of B. Taking a back up every time new data
users is saved
351. Which one is the advantage using com- C. Sending the entire day’s files to a tape
puter network? drive
A. Unprotected file access D. Never use ‘password’ as a password
B. Need more time for set up 357. Which is not true?
C. Expensive A. HTTP is a vehicle for accessing WWW
D. Faster Speed
B. SMTP is main protocol used in email
352. A collection of related webpages and as-
sociated items, such as documents and pho- C. FTP used for transferring files from
tos, one host to another
360. In this network type, each computer can 365. In this network, each node is connected
be both a server and a client. What type to a central device or hub.
of network am I?
NARAYAN CHANGDER
D. Services 377. What is the DNS record type that spec-
ifies an alias name of another address
372. which type of computer on a network pro- record?
vides something such as file space? A. MX
A. Client B. NS
B. Server C. CNAME
C. Peer D. SOA
D. Node
378. What is a node?
373. What is a client? A. Only the computers in a network
A. Powerful Computers that provide ser- B. Resources connected to servers such
vices to other computers as printers and scanners
B. Computers that ask for the services a C. The switch or hub
server provides
D. Anything in a network
C. Physical connection between devices
379. What is Hypertext used for?
D. A circuitboard with the components to
send/receive data A. Creating websites
B. Sending emails
374. the way that each node is physically con-
nected to the network C. Saving programs
A. topology D. Storing data
B. net design 380. A computer network permits sharing of
C. peer-to-peer A. Resources
D. protocol B. Information
375. It is the practice of testing a computer C. both a & b
system, network or Web application to D. none of these
find vulnerabilities that an attacker could
exploit. 381. Wireless connections happen by way of
A. Eavesdropping A. radio waves.
B. Hacking B. cables.
C. Impersonation C. Cat 5.
D. Penetration testing D. tubes.
382. A network in a home is what type of net- 388. Which is a con of a Peer-to-Peer server?
work?
A. They cannot connect to the internet
393. The basic advantages of the computer 399. The amount of information (aka traffic)
network is carried on a network at one time.
A. Hacking A. Bandrate
B. easy to communicate B. Bandwidth
C. network down C. Mobile Data
D. none of above D. Internet speed
400. For Network Configurations, it is impor-
NARAYAN CHANGDER
394. Computers that request or order informa-
tion from a server tant to consider the size and geographical
area of a network.
A. client
A. Yes
B. server
B. No
C. routers
C. Maybe
D. requester D. It doesn’t really matter.
395. Which of these is NOT an authentication 401. What network covers a LARGE geograph-
method ical area?
A. password A. LAN
B. PIN B. WAN
C. Fingerprint scanner C. BAN
D. Wifi D. KAN
396. Which cable sends data as electricity? 402. What is the meaning of the CAN net-
A. Copper work?
A. Canadian Agency Network
B. Fibre Optic
B. Caribbean Area Network
C. Ethernet
C. Campus Area Network
D. none of above
D. Caliology Area Network
397. name for the thin tubes of glass used by
much of the Internet to send data quickly 403. Which network would be best for a Col-
over long distances underground lege?
A. MAN
A. ethernet
B. LAN
B. wifi
C. WAN
C. hub
D. CAN
D. fiber optic
404. Which network device is primarily used
398. Google Chrome is an example of to connect network segments?
A. Email A. switch
B. Search engine B. . patch panel
C. Web browser C. hub
D. Hardware D. Router
NARAYAN CHANGDER
A. cloud computing
B. Internet service provider 423. Which term describes the interference
when electrical impulses from one cable
C. world wide web
cross over to an adjacent cable?
D. packet storage
A. cross over
418. What does LAN stand for? B. cross talk
A. Local Arena Network C. RFI
B. Local Area Network D. none of above
C. Long Area Network
424. What is the name given to a com-
D. Local Arena Name puter/device that is NOT connected on
ANY network?
419. Which network device sends data to ev-
A. Computer
ery device that is connected to it?
B. Device
A. Hub
C. Standalone device
B. Router
D. Standalone
C. Switch
D. Modem 425. It is a type of computer network that
spans a larger area, such as an entire re-
420. What are MAC addresses used to iden- gion, state, or even country.
tify?
A. Computer Networks
A. Hardware
B. Local Area Network
B. Networking software
C. Wide Area Network
C. DSI-Ware
D. Wi-Fi
D. Firmware
426. is the IEEE designation for which network
421. devices are connected in a circular layout type?
A. Ring A. Ethernet
B. Bus B. Token Ring
C. Star C. Bus
D. none of above D. Wireless
427. Scenario:A small office wants to connect 432. Another way to connect to a Wireless
two computers together to share the odd Network is by way
file every now and again. Which topology
430. You can make telephone calls over the In- 435. What is a LAN?
ternet using a technology called A. Network that covers a Large area, for
A. Intertel example a city
B. Telenet B. Network that covers an area such as a
C. VoIP country
D. Skynet C. Network that covers a small geo-
graphic distance
431. This Topology structure gets its name
from how the central node functions as a D. Network that links countries together
sort of trunk for the network, with nodes
436. Which of the following connectivity op-
extending outward in a branch-like fash-
tions gives you the best mobility?
ion
A. Tree Topology A. Cellular
B. Ring Topology B. Wireless
C. Mesh Topology C. Wired
D. Star Topology D. Broadband
437. A type of cable widely used to connect 442. Each of the following reasons are issues
computers on a network with using email, except:
A. Ethernet A. emails are not private
B. normal cable B. emails can be sent immediately
C. wires C. not everyone has access to a computer
D. none of the above
D. you don’t know if the recipient has
NARAYAN CHANGDER
438. I can use wireless connections in my net- read the email
work. Which topology am I using?
443. An ISP provides access to the infras-
A. Ring tructure for the users.
B. Star A. Internet
C. Bus B. Protocols
D. none of above C. Router
A. A selection of letters that help comput- 444. A is a computer that serves up infor-
ers to communicate with each other. mation to other computers on a network.
B. A selection of numbers that help com- A. Mainstay
puters to communicate with each other. B. Laptop
C. A way of finding your local computer C. Desktop
shop.
D. Server
D. A type of code used to program a com-
puter. 445. uses encrypted data before it is sent
over a public network
440. select the invalid IP/Logical address from
A. WAN
the following
B. SAN
A. 192.168.100.10
C. VPN
B. 0.0.10.20
D. MAN
C. 329.12.203.10
446. Bluetooth allows for the exchange of
D. 192.194.120.23
data across each of the following, except:
441. A switch is a device A. Long Distances
A. that connects all the devices in the net- B. Short Distances
work.
C. Wired Devices
B. that manages all the softwares in the D. Wireless Devices
network.
C. that manages all the devices in the net- 447. A wide area network (WAN)
work. A. connects two or more LANs together
D. none of above B. means Wi-Fi can be used
C. is easier to use than a LAN 453. A software or hardware that checks in-
D. connects two or more computers to- formation coming from the Internet and de-
pending on the applied configuration set-
B. HTML B. Star
C. UTP C. Bus
452. What command to check internet connec- 457. What kind of cable would you use to con-
tion with Command Prompt? nect a modem to a router?
A. PING A. Eithernet cable
B. iperf B. Phone cable
C. redgedit C. VGA cable
D. telnet D. TCP Cable
NARAYAN CHANGDER
C. configuration
459. It describes the configuration of a commu-
nication network? D. Channels
480. This network connects devices using ra- 485. Which type of network cable is commonly
dio signals. used in backbone networks and telephone
companies?
A. bus network
A. CAT
B. ring network
B. Fiber Optic
C. star network
C. Coaxial
D. wireless network
D. RJ11
NARAYAN CHANGDER
481. A network that separates an organiza-
tion’s private network from a public net- 486. What does ISP stand for?
work is a/an: A. Internet Service Protocol
A. firewall B. Internet Service Provider
B. extranet C. Internet Service Person
C. perimeter D. Internet Service Price
D. internet
487. It is a computer network covering a small
physical area, like a home, office, or small
482. What is a MAC address?
group of buildings, such as a school, or an
A. A set of integers that identify a com- airport?
puter on a network
A. Peer to Peer Network
B. A unique identifier for all computers on
B. Local Area Network
a network
C. Metropolitan Area Network
C. A unique identifier for all ports on a
network D. Wide Area Network
D. A unique identifier for all devices con- 488. The layout of how computers are con-
nected to a network nected is
483. What are the Three common types of A. network
computer Networks? B. type
A. ROM, MAN, FAN C. topology
B. MAN, LAN, WAN D. none of above
C. RAN, PAN, RAM
489. Customers in Martin’s company can ac-
D. NONE OF THE ABOVE cess certain parts of the company network
from their own company computer outside
484. What topology (server) has terminators of Martin’s company. This is an example
at the ends of the server? of a/an:
A. Ring A. extranet
B. Bus B. internet.
C. Mesh C. intranet.
D. Star D. throughput.
490. What can Client servers do that Peer-to- 496. The place where two or more net-
Peer servers cannot? works connect and is a critical device that
keeps data flowing between networks
NARAYAN CHANGDER
502. Which of these is not a network security C. Bill Gates
measure?
D. Vint Cerf
A. Restricting access levels
508. I am usually built into the motherboard
B. Passwords to log on
and have a cat cable plugged into me-what
C. Encryption of WiFi signals am I?
D. Yale locks on the computer room A. Graphics card
503. What is the software called that’s de- B. Network interface card (NIC)
signed to exploit a computer user and is C. Audio card
a broad term covering computer viruses,
D. Router
worms, Trojan, adware, etc.?
A. A Backdoors 509. Transfer of electronic mail.
B. B Spyware A. Telnet
C. C Malware B. FTP
D. D Key-logger C. SMTP
D. MIME type
504. Which of the following can you do on the
Internet? 510. What is a technology used in a cellular
A. All of them telephone network?
B. Online shopping A. Bluetooth
C. Video calling B. fiber-optic
D. Streaming music C. Global System for Mobile Communica-
tions (GSM)
505. What is a Router? D. Wi-Fi
A. A computer or device
511. ICANN manages
B. The physical layout of computers on a
network. A. Router package, IP address manage-
ment
C. A device that transfers data from one
network to another in an intelligent way B. IP address assignment, Domain Name
registration
D. A Local Area Network
C. Content of the website, Domain Name
506. The capacity of data transfer in a sys- registration
tem. D. Router package, content of the web-
A. Bandwidth site
NARAYAN CHANGDER
524. The following device is not very intelli- B. Web browser
gent but allows computers to form a seg-
ment of a network: C. URL
A. Hub D. Web space
B. Router 530. What are the benefits of computer Net-
C. Modem work
D. NIC A. Share applications
534. Which of the following is the smallest 540. Which of the following is an example of
computer network? network topology?
NARAYAN CHANGDER
546. Which of the following is not a type of B. resources
virus?
C. cables
A. Boot sector
D. none of above
B. Polymorphic
552. Coaxial cable used in networking are usu-
C. Multipartite
ally terminated with which connector?
D. Trojans
A. RF
547. Network components are connected to B. RJ45
the same cable in the topology.
C. Netbui
A. Mesh
D. BNC
B. Bus
C. Star 553. What is formed when Bluetooth devices
are paired with one another?
D. Ring
A. Local are network (LAN)
548. A network of personal computers, each B. Wide are network (WAN)
of which acts as both client and server, so
that each can exchange files directly with C. Personal area network (PAN)
every other computer on the network D. Metropolitan area network (MAN)
A. peer-to-peer network
554. one of the most common network topolo-
B. client network gies found in most offices and home net-
C. server network works.
D. social network A. STAR TOPOLOGY
B. RING TOPOLOGY
549. A network in which devices can function
as clients or servers C. BUS TOPOLOGY
A. client/server network D. none of above
B. dedicated network 555. Which device is used to connect LANs to
C. non-dedicated network each other?
D. gateway network A. Routers
567. A device used to connect several comput- 572. This layer is concerned with specify-
ers to form a LAN is called? ing the characteristics of the transmission
medium, the nature of the signals, the data
A. Switch
rate, and related matters. This is defined
B. Bridge as a:
C. Router A. Physical layer
D. Gateway B. Network layer
NARAYAN CHANGDER
568. Home networks are more likely to use a C. Transport layer
D. Application layer
A. router 573. Each device connected to the network is
B. switch called a
C. hub A. node
D. none of above B. hub
C. computer
569. Which of the following does a computer
need to connect to a network or other com- D. stand alone machine
puter devices?
574. Which is the correct answer to the be-
A. ethernet card low:”A computer that does not communi-
B. NIC card cate with other devices”
A. LAN
C. IP Address
B. WAN
D. WiFi
C. Stand-Alone
570. What is a group of computers that
D. Server
are connected and communicate with each
other? 575. Define what is a LAN?
A. bus network A. Normally find within a business and
B. computer network school
587. Email services means 592. Which one from this list is a file server?
A. transmission of messages from one A. Gmail
user to another user. B. Google Drive
B. a group of email addresses used for C. Google Classroom
mass distribution of a message
D. Google Meet
C. that files can be uploaded and down-
loaded 593. Which layer does TCP operate on
NARAYAN CHANGDER
D. none of above A. Application
B. Transport
588. Which of the following network topolo-
gies contains a backbone which runs the C. Network
length of the network? D. Link
A. Star
594. What is a Firewall in Computer Net-
B. Bus work?
C. Mesh A. A web browsing Software
D. Ring B. The physical boundary of Network
C. An operating System of Computer Net-
589. What this the acronym of TVL? work
A. Technical Vacation Living D. A system designed to prevent unautho-
B. Technic Volcanizing Living rized access
C. Technical Vocational Livelihood 595. The physical topology of a network
D. Technology Vocation Livelihood refers to the layout of cables, computers
and other peripherals.
590. Which of these is an advantage of the A. Network topology
star topology?
B. Physical Topology
A. Devices do not rely on each other to
C. Logical Topologies
function
D. none of above
B. It looks nice
C. A central server is not needed 596. In this type of network topology, each
node of the network is connected to a cen-
D. Only one cable is needed to connect ev- tral node, which is known as a hub?
erything together
A. Mesh
591. How many devices do you need to create B. Ring
a LAN?
C. Bus
A. 2 or more
D. Star
B. 100
597. the study of the arrangement or map-
C. 50
ping of the elements (links, nodes) of a
D. Only 1 network, especially the physical (real) and
logical (virtual) interconnections between 602. Mention a computer which could manages
nodes. network resources.
598. network that allows information to be 603. The arrangement of devices in a network
shared between devices over LAN is called a Network
A. wifi A. GPS
B. hotspots B. Topology
C. Architecture
C. ethernet
D. Hub
D. server
604. An IP address is a numeric quantity that
599. Is a group of computers that use a set
identifies (Select all correct answers )
of common communication protocols over
digital interconnections for the purpose of A. A network adapter to other devices on
sharing resources located on or provided the network
by the network nodes B. The manufacturer of a computer
A. Computer network C. The physical location of a computer
B. Hardware network D. None of these answers
C. Product Network 605. If you need to log on to a Domain, what
D. Device Network type of network are you using?
A. Stand Alone
600. Which of these is an advantage of the bus
topology? B. Ad-hoc
A. It is easy and cheap to set up C. Client / Server
B. It is useful for large companies D. Peer to peer
C. You can pick people up 606. Bonus:When I was 6, my sister was half
D. Anyone can join my age, now that I’m 60 How old is my
sister?
601. It is a set of networks, using the Inter- A. 57
net Protocol and IP-based tools such as
B. 30
web browsers and file transfer applica-
tions, that is under the control of a single C. 27
administrative entity? D. 42
A. Externet
607. The translates internet domain and
B. Intranet host names to IP address.
C. Internet A. routing information protocol
D. Extranet B. domain name system
NARAYAN CHANGDER
614. What is Latency?
C. Router
A. Distance from sender to reciever
D. none of above
B. Speed of the processor in your com-
609. These are key elements of protocol, ex- puter
cept
C. Delay between action and result
A. Syntax
D. Speed of character being put on the
B. Data screen from the keyboard
C. Timing
615. Connection among devices within these
D. Semantic
type of networks can be choose the
610. Data transmission can be in the forms of Best answer!
A. up or down.
A. Parallel and perpendicular B. wireless or wired.
B. Parallel and Serial C. horizontal or vertical.
C. Serial and continuous
D. responsive or non-responsive.
D. Serial, parallel and continuous
616. This is built-in to your router to prevent
611. Which of the following networks is LEAST unauthorized users from accessing the net-
likely to be a WAN? work.
A. The Internet A. Firewall
B. A school network
B. Router
C. A network of bank cash dispensers
C. Switch
D. none of above
D. Hub
612. You deploy a server running Window
Server 2016 and install the Remote Ac- 617. a combination of normal HTTP inter-
cess server role. You need to configure the actions, but with a different default
router to enable intranet access internet TCP port and an additional encryp-
and navigate to multiple website Which tion/authentication layer between the
should you configure? HTTP and TCP
A. WAP A. HTTPS
B. DHCP B. HTML
C. VPN C. FTPS
D. NAT D. USPS
618. Which network size covers small areas 623. artificial body placed in orbit around the
such as homes, schools, and buildings? earth or moon or another planet in order to
collect information or for communication
C. Bus networks can be slow due to colli- 627. What is an advantage of a WiFi net-
sions work?
D. Bus networks cannot use Ethernet ca- A. Slower transfer speeds
ble B. More convenient and easier to set-up
622. Your friend Maria asks you which of the C. Less secure
following are the most secure. What do D. Faster transfer speeds
you tell her?
628. Which of the following device is used to
A. 802.11n
connect two systems if the systems use
B. Infrared different protocols?
C. Cellular A. Hub
D. UTP B. Bridge
629. Which of these normally has a computer B. 2 or more computers connected to-
network? gether
NARAYAN CHANGDER
C. Home
D. none of above 633. This network connects computers and de-
vices in a small geographical area.
630. Every internet user needs an ad- A. local area network
dress.
B. wide area network
A. MAC
C. server
B. DNS
D. protocol
C. VPN
D. IP 634. It is a computer network that covers a
broad area (i.e. any network whose com-
631. Which is more suitable for smaller net- munications links cross metropolitan, re-
works? gional, or national boundaries?
A. LAN Servers A. Local Area Network
B. Peer-to-Peer Servers B. Wide Area Network
C. Client Servers C. GAN Network
D. Minecraft Servers D. Intranetwork
B. revolution A. Scaling
C. solution B. Mirror Reflection
D. permission C. Rotation
C. Balance B. Equal
D. Consistency C. Negative
B. Number of pixels on the screen 13. If point are expressed in homogeneous co-
C. Number of pixels in vertical direction ordinates then the pair of (x, y) is repre-
sented as
D. Number of pixels in horizontal direc-
tion A. (x’, y’, z’)
B. (x, y, z)
8. A is represented by a dot or square on
a computer monitor display screen. C. (x’, y’, w)
A. Vector D. (x’, y’, w)
B. Bitmap 14. Circle is represented using equation
C. Pixel A. f (x, y) = x2 + y2 r2
D. none of above B. f (x, y) = x2 + y2 + r2
9. The matrix representation for scaling in ho- C. f (x, y) = x2 + y2 r
mogeneous coordinates is D. f (x, y) = x2 + y2 + r
A. P’=S*P
15. A ploygon in which the line segment join-
B. P’=R*P ing any two points within the polygon lies
C. P’=dx+dy completely inside the polygon, is called
polygon.
D. P’=S*S
A. Convex
10. In Bresenham’s line algorithm, if the dis-
tances d1 < d2 then decision parameter Pk B. concave
is C. closed
A. Positive D. Complete
16. The formula for finding initial decision pa- C. line clipping
rameter p0 in Bresenham’s circle generat- D. curve clipping
ing algorithm
A. 1-R 22. RBG setting/mode are used for
B. 3-2R A. Printing
NARAYAN CHANGDER
D. Red Green and Black monitor colors
17. is a free graphics editor. It is similar to the
Paint application but has some additional 23. path of a point
features such as support for transparency, A. Line
color balance and image rotation.
B. Shape
A. Kolour paint
C. Space
B. Pinta
D. Form
C. Paint
D. none of above 24. Primary colors
A. orange, blue, yellow
18. Which of the following is a technique to
blend two or more images to form a new B. red, violet, orange
image? C. orange, green, violet
A. Modeling D. yellow, red, blue
B. Morphing 25. What is a disadvantage of a bitmapped im-
C. Animation age?
D. Warping A. They don’t look as realistic as vector
graphics.
19. Which one is a photo shop file?
B. They are not as colourful.
A. .pbs
C. They have a small file size
B. .psf
D. They have a large file size because in-
C. .psd formation has to be stored about every
D. .pdx pixel
21. Cohen-Sutherland clipping is an example of 27. Refers to the sharpness and clarity of an
image, measured in terms of ppi and dpi.
A. polygon clipping A. Resolution
B. text clipping B. Pixel
B. Color space 34. What are the default units for coordinates
in Graphics?
C. Chromatic Adaptation
A. inches
D. None of the above
B. pixels
29. If an image has a height of 2 inches and as- C. centimeters
pect ratio of 1.5, what will be its width
D. millimeters
A. 6
35. represent images through the use of
B. 3 geometric objects (lines, curves, etc)
C. 1.5 A. Fractal graphics
D. 0.75 B. Raster graphics
39. Which transformation distorts the shape 44. Images used to enhance the appearance of
of an object such that the transformed a variety of projects, including drawings,
shape appears as if the object were com- photographs, cartoons, charts, and maps.
posed of internal layers that had been A. Graphics
caused to slide over each other?
B. Resolution
A. Scaling down
C. Pixels
B. Shearing
D. All of the above
NARAYAN CHANGDER
C. Scaling up
45. is combining parts of different images
D. Rotation to create a single image.
40. is memory (to save each pixel’s color A. Composite
& position for full image demonstration) B. Slice
A. CPU C. Filter addition
B. GPU D. Retouching
C. Monitor 46. What are the TWO main types of digital
D. Frame buffer graphics?
A. Vector and Graphites
41. If a 1024 x 768 image is to be resized to
one that is 640 pixels wide with the same B. Bitmap (raster) and Vector
aspect ratio, what would be the height of C. Bitmap (raster) and Graphites
resized image in pixels. D. Bits (maps) and Raster
A. 256
47. Which one is an Illustrator file?
B. 480
A. .il
C. 512
B. .ai
D. 856 C. .pdf
42. Which algorithm is a faster method for cal- D. .ia
culating pixel positions?
48. Which of the following is true about the
A. Bresenham’s line algorithm ‘paint’ method?
B. Parallel line algorithm A. can be called directly from your Java
program
C. Mid-point algorithm
B. automatically called in response to cer-
D. DDA line algorithm
tain messages
43. The following are the basic components of C. not the central drawing method for the
OpenGL, EXCEPT: application window
A. GLU D. none of these options are true
B. GLUT 49. GUI means
C. STDIO A. Graphical user Interface
D. GLX B. Graphical user Interaction
61. The two-dimensional rotation equation in 67. What do you do to select an icon?
the matrix form is A. Left click
A. P’=R*P B. Right click
B. P’=P+T C. Double click
C. P’=P*P D. Scrolled
D. P’=R+P
68. To set the background color, the following
NARAYAN CHANGDER
62. LCD means command is used:
A. Liquid Crystal Display A. glClearColor(r, g, b, alpha)
B. Liquid Crystal data B. glClear(GL COLOR BUFFER
BIT)
C. Liquid Chrome data
C. glBackColor(r, g, b)
D. None
D. glColor3f(r, g, b)
63. The hardware device contains
69. Drawing or painting programs that are
A. Color printer/Black white printer
specifically designed for touching up or
B. Plotters modifying images, such as original digital
C. Both a & b images and digital photos.
D. Ctrl + I A. Type
B. Width
66. The algorithm which displays line-type at-
tributes by plotting pixel spans is C. Color
83. Several graphic image file formats that are 89. A positive value of the rotation angle
used by most of the graphic system are A. rotates an object in the clockwise di-
A. GIF rection
B. JPEG B. rotates an object in the counter-
C. TIFF clockwise direction
NARAYAN CHANGDER
84. Which of the following is not a line-type?
A. Dashed line 90. Bitmap graphics is also called
88. In which system, the Shadow mask meth- 94. Which one of the following is the primarily
ods are commonly used used output device?
A. Raster-scan system A. Video monitor
B. Random-scan system B. Scanner
C. Only b C. Speaker
D. Both a and b D. Printer
NARAYAN CHANGDER
D. None of the above
C. they can be converted across plat-
107. Which option is used to specify how the forms more easily
canvas is modified?
D. they can be printed in any size
A. Crop
113. Modify an object by either scaling, dis-
B. Anchor
torting, skewing, rotating, or flipping.
C. Cross Process
A. Group
D. Constrain Proportions
B. Fill
108. this uses several design elements to C. Edit
draw a viewer’s attention.
D. Transform
A. Emphasis
114. The device which is used to position the
B. Movement
screen cursor is
C. Variety
A. Mouse
D. Unity
B. Joystick
109. It refers to recording data on a recordable C. Data Glove
or rewritable DVD.
D. Both a and c
A. DVD Authoring Software
B. DVD Burning 115. Pixels are arranged in
128. All of the following are true EXCEPT 133. Which of the following capabilities is not
A. Line art images are stored in the form supported by the Graphics class?
of data points A. drawing filled rectangles
B. No loss of image quality when resizing B. shifting the origin in the coordinate
a line art image frame
C. The file size of a line-image is bigger C. rotating the coordinate frame
than the same image in a bitmap file D. different font sizes
NARAYAN CHANGDER
D. A line art-image is also known as a 134. Which term is used to describe how solid
vector-drawn an object appears?
129. We want to save an animated logo with a A. Background
very low file size. We used color palette B. Opacity
of 256 colors.Which if the following file C. Clarity
format allows as to do that?
D. Resolution
A. png
135. The area inside a shape.
B. jpg
A. Fill
C. gif
B. Stroke
D. bmp
C. Align
130. When using a graphics editing program, D. Zoom
which option allows you to adjust the
136. If lighting is disabled, which function
space around an image?
specifies the color of the vertex?
A. Anchor points
A. glClearColor()
B. Constrain proportions B. glDisplayfunc()
C. Image Size C. glColor()
D. Canvas size D. None of These
131. The Cohen-Sutherland algorithm divides 137. What does glMaterialf( ) do?
the region into number of spaces. A. Turns material properties on.
A. 8 B. Defines the material properties of a
B. 6 drawn object for visual effects
C. 7 C. Switches to material mode to add vi-
sual effects.
D. 9
D. Gets the current material properties of
132. The object space or the space in which the a drawn object
application model is defined is called 138. What makes up a raster image?
A. World co-ordinate system A. Dots
B. Screen co-ordinate system B. Paint
C. World window C. Pixels
D. Interface window D. Pretzels
143. program or collection of programs that al- 148. GUI stands for
lows computer users to do the following,
A. Graphics uniform interaction
create image files, draw and edit images
and manipulate graphic files B. Graphical user interaction
A. graphic software C. Graphical user interface
B. paint D. None of the above
C. MS paint
149. Circle is a
D. none of above
A. Eight way symmetric
144. A single tiny dot used as a unit of mea-
B. Four way symmetric
sure and to define images on a computer
screen. Short for picture element. C. Both a & b
A. Bitmap D. Either a or b
NARAYAN CHANGDER
D. none of these
151. According to 8 Octant symmetry rule,
Which of the following will be a point in 157. Types of Computer Graphics are
5th octant corresponding to given point P A. Vector and raster
(a, b) in 1st octant of circle.
B. Scalar and raster
A. (a, -b)
C. Vector and Scalar
B. (-a, -b)
D. None of these
C. (b, a)
158. An area in design that may appear dif-
D. (-a, b)
ferent in size, texture, shape, or color to
152. Following is the Interpolating Curve attract the viewer’s attention.
A. Bezier Curve A. Emphasis
B. Hermite Curve B. Movement
C. Exponential Curve C. Balance
153. The navigator bar allows you to: 159. In which 3D projection, Lines parallel to
the projection plane normal are halved
A. Move around the screen
A. Cavalier
B. Change from color to black and white
B. Cabinet
C. Change the brightness of the screen
C. Isometic
D. Zoom in and out on the image
D. Trimetric
154. What is the Photoshop keyboard shortcut
160. Transformations can be applied on
for-Deselect All
A. Objects
A. Ctrl + A
B. Co-ordinates
B. Ctrl + D
C. Both Objects and Co-ordinates
C. Ctrl + C
D. None of the options
D. Ctrl + V
161. Amir is searching on his computer for a
155. refers to the relative size and scale of the file that he created and saved in Pixlr’s na-
various elements in a design. tive file format. Which type of file should
A. Emphasis he be searching for?
B. Proportion A. PSD
C. Hydrogen C. JPG
D. Mixture of all three D. TIFF
173. What is another name for Bitmap? 179. In graphical system, the array of pixels
A. Dotmap in the picture are stored in:
B. Vector A. Memory
C. Raster B. Frame buffer
NARAYAN CHANGDER
D. Flat File C. Processor
174. Which one of these is a fact about Vector D. All of the mentionedSHOW ANSWER
graphics?
A. They lose quality as they get larger 180. Computer Graphics displays the informa-
tion in the form of
B. They are made of pixels
A. Charts
C. They are small in file size
B. Graphs
D. They are realistic
C. Diagrams
175. Graphics created using lines and curves
defined by mathematical formulas. D. All of the above
A. Bitmap images 181. Raster Graphics Are Composed Of?
B. Vector images A. Paths
C. Both Bitmap and Vector
B. Palette
D. None of the above
C. Pixels
176. ) is the science of measuring light in D. None Of These
any portion of the electromagnetic spec-
trum. 182. In the initgraph() mode is related to
A. Colorimetry A. path
B. Photometry
B. resolution
C. Chromatic Adaptation
C. Both a and b
D. Radiometry
D. all of the above
177. Display card are
183. John has to create vector graphics that
A. VGA
can be opened by all of his clients, no mat-
B. EGA ter which design editors their companies
C. Both a & b use. Which file format should he use to
make sure they can all open his files?
D. None of the above
A. EPS
178. Which of the following is considered a
vector image file format? B. BMP
A. SVG C. TIFF
B. GIF D. PNG
184. The point that remains fixed during a ro- 190. Pixlr is
tational transformation is
A. a movie company
185. An ellipse can also be rotated about its 191. What is the smallest, most basic unit
center coordinates by rotating that nearly all computer graphics are made
from?
A. End points
A. Voxels
B. Major and minor axes
B. Pixies
C. Only A
D. None C. Pixels
D. Blobs
186. With what arguments(s) is the setColor
method of the Graphics class called? 192. When using Photoshop, each new image
A. a Color object is on a separate
B. three integers (red, green, blue com- A. File
ponents of a color)
B. Tool
C. a BasicStroke object
C. Layer
D. a Paint object
D. Filter
187. also known as Microsoft Paint
A. paint 193. What is an advantage of a vector im-
age?
B. Kolour paint
A. Images can be scaled up or down with
C. pinta no loss of quality
D. none of above
B. Individual pixels can be changed,
188. TIFF(Tagged Image File Format) are used which makes very detailed editing pos-
for sible
A. Vector graphics C. They have a large file size
B. Bitmap D. They look real
C. Both a & b
194. Which is the best line algorithm to bal-
D. None of these ance the processing load among the pro-
cessers?
189. A line drawn in the background color is
A. Visible A. Parallel line algorithm
195. The centre region of the screen and the 201. which opereator are used comparetwo
window can be represented as values at the same time
A. 0000 A. relational
B. 1111 B. logical
C. 0110 C. arthimetic
D. 1001 D. none of the these
202. A line can be represented by
NARAYAN CHANGDER
196. Which program is an example of graphics
editing software? A. One point
A. Google Slides B. Two points
C. Three points
B. Google Docs
D. Four points
C. Microsoft Outlook
D. Adobe Photoshop 203. What happens if the values of scaling fac-
tors sx and sy less than 1 (i.e., sx<1 and
197. A vector image is created using sy<1)?
A. coloured pixels. A. No change in the object’s size
B. dots. B. Reduce the object’s size
C. mathematics formulas. C. Increase the object’s size
207. Two successive translations are a) b) 213. A rectangular border around an image,
c) d) shape, or text that you can drag to rotate
or resize.
NARAYAN CHANGDER
B. half inside half outside
219. The graphics can be C. completely inside
A. Drawing D. can’t say anything
B. Photograph, movies
225. To change the height or width of an ob-
C. Simulation ject without retaining the original propor-
D. All of these tions.
229. What is photo compression? 235. Which image file format is a large raster
A. Reducing a picture’s file size file that is used when saving photographs
for print only?
241. There are 2 main categories of computer 247. Lighting and shading of the object to
graphics: make it look real called
A. Sharp graphics and fuzzy graphics A. rendering
B. GPEG and GIF B. shadowing
C. Raster graphics and bitmaps C. solid modeling
D. none of above D. texturing
NARAYAN CHANGDER
242. allows screen positions to be selected 248. By default, graphics coordinates in Java
with the touch of a finger. have the origin (0, 0) in the corner of
the drawing area.
A. Touch panels
A. upper-left
B. Image Scanner
B. upper-right
C. Light Pen
C. lower-left
D. Mouse
D. lower-right
243. Expansion of line DDA algorithm is
249. Intensity of the electron beam is con-
A. Digital difference analyzer trolled by setting voltage levels on the
B. Direct differential analyzer A. Control grid
C. Digital differential analyzer B. Focusing system
D. Data differential analyzer C. Deflection system
D. Phosphorous
244. The most commonly used input device is
A. Mouse 250. In mirror reflection transformation from
Y-axis, the point co-ordinate that remains
B. Keyboard same is
C. Scanner A. x-value
D. Printer B. y-value
245. The action of adjusting the magnification C. nothing is fixed
of a file by a percentage of its actual size. D. both are fixed
A. Zoom
251. Which choice lists common tools from
B. Distort graphics programs that are examples of
C. Fill blending tools?
264. What does the ‘c’ represent in the follow- 269. is a commonly used method of lossy com-
ing method call:g.fill3DRect(a, b, c, d, e); pression for digital images.
A. the x value starting position A. png
B. the y value starting position B. jpg
C. bmp
C. the width of the rectangle
D. psd
D. the height of the rectangle
270. To design everything from aeroplanes to
NARAYAN CHANGDER
265. The basic geometric transformations are consumer products specialists use
A. Translation A. ACD
B. Rotation B. DAC
C. CAD
C. Scaling
D. CDA
D. All of the mentioned
271. An outcode can have bits for two-
266. What should be done to rotate around a dimensional clipping and bits for three-
point that is not the origin? dimensional clipping.a) b) c) d)
A. Translate to origin, rotate about origin, A. 6, 8
then translate back to original position B. 2, 4
B. Rotations can only be performed C. 4, 6
around the origin. D. 1, 3
C. Perform a glRotate and specify the 272. I want to draw a pattern that has a verti-
point to rotate around cal symmetry, I can use the concept of
D. none of above to draw it in a easy way.
A. Rotation transformation
267. Mary is creating a memory book for her
B. Translation transformation
friend’s birthday. Which file type should
she use to print the pictures? C. Mirror Reflection from X-axis
A. SVG D. Mirror Reflection from Y-axis
C. Raster A. Resize
B. Crop
D. Vector
C. Dry Brush
268. On a black and white system with one D. Brighten
bit per pixel, the frame buffer is commonly
called as 274. can be used to determine the position
on the data tablet.
A. Pix map
A. Strip microphones
B. Multi map B. Signal strength
C. Bitmap C. Coded pulse
D. All of the mentioned D. Either Signal strength or coded pulse
NARAYAN CHANGDER
287. CAD stands for- C. Flip
A. Computer art design D. Zoom
B. Computer-aided design 293. An accurate and efficient raster line-
C. Car art design generating algorithm is
D. None of the above A. DDA algorithm
B. Mid-point algorithm
288. PNG is a
C. Parallel line algorithm
A. Image format
D. Bresenham’s line algorithm
B. High-level programming language
used to make mobile applications, or apps 294. Technically refers to any application that
contains more than one type of media, but
C. Coding festival is often used to refer to audio and video
content.
D. Internet meme
A. Graphics
289. Which of these file types is best for print- B. Multimedia
ing photographs?
C. Vector
A. TIFF
D. Bitmap
B. PNG
295. which number is green
C. BMP
A. 2
D. EPS
B. 3
290. Which of the following is a computer
C. 4
based presentation technique?
D. 5
A. Slides
B. Tutorial 296. The following are features in a painting
or drawing software EXCEPT
C. Multimedia
A. Support for third-party special-effect
D. Data processing
plug-in
291. It is the process of planning and arrang- B. Lathe and extrude features
ing graphics that deals in the arrangement C. Ability to paint with patterns and cli-
of visual elements on a page. part
A. Layout D. Ability to pour colour, pattern or gradi-
B. Graphics ent into any area
NARAYAN CHANGDER
D. word processing
C. (Xp+2, Yp+3/2)
309. Raster Graphics composed of
D. (Xp+1, Yp+3/2)
A. Pixels
B. Paths 315. To apply the midpoint method, we define
313. formed by the view window and the 319. What is the use of homogeneous coordi-
type of projection to be used. nates and matrix representation?
A. view plane A. To scale
B. CVV B. To rotate
NARAYAN CHANGDER
distance between the members of the language.
two clusters. C. Build emotions, language and under-
A. farest stands mathematical problems.
B. closest D. Create a robot friend for every fifth
C. average grader
B. Correlation C. Progression
13. In which phase of the ML pipeline do you D. Chemical Neural Network and Geolog-
analyze the business requirements and ical Neural Network
re-frame that information into a machine
18. It is a type of machine learning where
learning context.
an agent is put in an environment and he
A. Problem formulation learns to behave in this environment by
B. Model training performing certain actions and observing
the rewards which it gets from those ac-
C. Deployment
tions.
D. Data preprocessing
A. Supervised Learning
14. PCA works better if there is? (i) A linear B. Unsupervised Learning
structure in the data(ii) If the data lies on a
curved surface and not on a flat surface(iii) C. Reinforcement Learning
If variables are scaled in the same unit D. none of above
NARAYAN CHANGDER
C. variable combination
20. Half ranking can be added in
D. deep learning
A. Feature tree
B. Scoring and Ranking 26. Which term is defined as:”subfield of com-
C. class probability estimation puter science aimed at the development of
computers capable of doing things that are
D. None normally done by people”
21. Which is true about Random Forest (RF) A. Machine Learning
A. RF completely a different machine B. Deep Learning
learning technique
C. Artificial Intelligence
B. RF combines multiple decision trees to
make a decision D. Artificial Narrow Intelligence
C. RF cannot handle continuous data 27. Which of the following does not belong su-
D. none of above pervised learning?
A. Linear Regression
22. Support vector machine may be termed
as: B. Decision Trees
A. Maximum apriori classifier C. Isolation Forest
B. Maximum margin classifier D. Random Forests
C. Minimum apriori classifier
28. Which one of these is not an area of AI?
D. Minimum margin classifier
A. computer vision/image recognition
23. Which of these are not displayed when you B. voice recognition
see the import data result visualization?
C. web design
A. Unique values
D. robotics
B. Missing values
C. Standard deviation 29. When updating your weights using the
D. Mode loss function, what dictates how much
change the weights should have?
24. A basic unit of the brain, a cell designed to
A. Batch size
send information to other nerve cells, mus-
cle, or gland cells. B. Learning rate
A. Algorithm C. Initial weights
B. Machine learning D. Bias term
41. Which of these is not one of the three lay- D. recording information in machine
ers used in machine learning models? learning
A. input
47. is responsible for 2D structures
B. hidden
A. Numpy
C. output
D. activation, hidden, and output B. panda
C. matplotlib
42. Accurate Data
NARAYAN CHANGDER
A. information that isn’t always precise D. sklearn
B. information must be precise 48. In a Decision Tree Leaf Node represents
C. an educated guess
D. test the accuracy of your model A. One of the Class Label
43. Machine Learning is a branch of.. B. One of the complete observation
A. AI C. One of the attribute
B. Java D. None of the Mentioned
C. c
D. c++ 49. Which model is the best choice for fraud
detection?
44. is a branch of machine learning that
A. Precision = 0.8, Recall = 0.4
uses data, loads and loads of data, to
teach computers how to do things only hu- B. Precision = 0.4, Recall = 0.8
mans were capable of before.
C. Precision = 0.7, Recall = 0.7
A. Supervised Learning
D. none of above
B. Deep Learning
C. Unsupervised Learning 50. When preparing the dataset for your ma-
D. none of above chine learning model, you should use one-
hot encoding on what type of data
45. What year did Deep Learning break-
A. Continuous
throughs drove A.I. (Artificial Intelligence)
boom? B. Ordinal
A. 2010 C. Nominal
B. 2009 D. Numerical
C. 2001
D. 2008 51. The following is NOT an example of Re-
gression Problem
46. Predict
A. Sentimental Analysis
A. Give an expected result.
B. Customer Churn
B. information must be precise
C. Anomaly Detection
C. decides whether certain statements
need to be executed or not D. Housing Prices
52. Identify Performance measure P from 57. machine learning holds the advantage
following Traffic Pattern Analysis Algo- of being able to work with unlabeled
rithm. data.
63. What is an example of overfitting? 68. Which among these are the elements of
A. Low accuracy in unseen data in job ap- learning System?
plications A. Task
B. Very long and inefficient lines of code B. Experience
C. Error in compiling code
C. Performance Measure
D. All of the above
D. All the above
NARAYAN CHANGDER
64. Which of the following option is / are
correct regarding benefits of ensemble 69. To create an Automated ML run:
model? 1. Better performance 2. Gen- A. We need to select the algorithm first
eralized models 3. Better interpretability
B. We need to select the dataset first
A. 1 and 3
B. 2 and 3 C. We need to select the compute target
first
C. 1 and 2
D. none of above
D. 1, 2 and 3
65. Machine Learning has various search/ op- 70. Factors which affect performance of a
timization algorithms, which of the follow- learner system does not include
ing is not evolutionary computation? A. Representation scheme used
A. Perceptron B. Training scenario
B. Genetic Algorithm (GA)
C. Type of feedback
C. Neuro Evolution
D. Good data structures
D. Genetic Programming (GP)
71. number = [1, 2, 3, 4, 5]num-
66. Which of the following is another term for
ber.pop()print(number). What is the out-
chunk of data that you use to train one or
put?
more machine learning algorithms
A. Training set A. [1, 2, 3, 4, 5]
B. Data set B. [2, 3, 4, 5]
C. Corpus training C. [1, 3, 4, 5]
D. none of above D. [1, 2, 3, 4]
67. A Data Scientist wants to tune the hyper-
72. Data that describes other data. For exam-
parameters of a machine learning model to
ple, a digital image may include metadata
improve the model’s F1 score.Which tech-
that describe the size of the image, num-
nique CANNOT be used in Amazon Sage-
ber of colors, or resolution.
Maker to solve this problem?
A. Heuristic
A. Grid Search
B. Random Search B. Hexadecimal
C. Bayesian optimization C. algorithm
D. none of above D. metadata
73. How many examples are usually needed 78. Suppose you are working on stock market
to train a neural network? prediction, and you would like to predict
the price of a particular stock tomorrow
C. 2574 B. PCA
D. 2745 C. Both of these
NARAYAN CHANGDER
84. A Parent helps the child read a book, A. k-Nearest Neighbours
Which example of ML is this?
B. Decision Trees
A. Supervised
C. Naive Bayes
B. Unsupervised
D. Support Vector Machines
C. Reinforced
D. Deep Learning 90. Exmples of Machine learning
85. The A.I. robot uses the input to find a so- A. All of Them
lution for the given problem which is re- B. Speech to text
ferred to as
C. Google maps
A. output
D. Siri, Uber
B. formula
C. scenario 91. High entropy means that the partitions in
classification are
D. problem solving
A. pure
86. A set of instructions to follow in order to
B. not pure
solve a problem
C. useful
A. Neural network
D. useless
B. Algorithm
C. Neuron 92. Which of the following is ingredients of ML
D. Machine learning model
A. classification
87. What are ANNs used for?
B. Regression
A. Reproduce Human Spinal Functions
C. Grouping and average
B. Reproduce Human Foot Functions
D. Cluster Analysis
C. Reproduce Human Nervous System
D. Reproduce Human Brain Functions 93. How does an AI device learn and think?
NARAYAN CHANGDER
105. What is Recall? B. House price prediction
A. TP/TN-FN C. Speech recognition
B. TP/TP-FN
D. Amazon product suggestions
C. TP/TP+FN
111. Which is an example of Clustering?
D. TP/FN+TP-TN
A. k-means
106. This type of learning to be used when
there is no idea about the class or label B. a-means
of a particular data C. Computer generation
A. Supervised learning algorithm D. Artificial Reality
B. Unsupervised learning algorithm
112. Network connectivity that enables these
C. Semi-supervised learning algorithm objects to collect and exchange data.
D. Reinforcement learning algorithm A. Sensors
107. Type of machine learning algorithm used B. Local Area Network
to infer information from data without in- C. Internet of Things
put from humans. In other words, learning
without a teacher. D. none of above
A. Dataset 113. The most widely used metrics and tools
B. Supervised learning to assess a classification model are:
C. Unsupervised learning A. Confusion matrix
D. Classifiers B. Cost-sensitive accuracy
108. Which of the following is FALSE about Tu- C. Area under the ROC curve
ples in Python? D. All of the above-answer
A. Tuples are immutable
114. After training the ML model, we
B. Tuple items can be deleted using del see how accurately it predicts the an-
keyword swer/responds. For example-does it cry
C. Tuples can be declared as:x, y=1, 2 when I say something mean to it?
D. None of the above A. Recognition
B. Training
109. What is a popular python library used in
data science? C. Predictive models
A. Datatables D. Testing
NARAYAN CHANGDER
ture stock prices or currency exchange D. Deep Learning
rates”? 133. Train in machine learning
A. Recognizing Anomalies A. all the data collected
B. Prediction B. measure the accuracy of your model,
C. Generating Patterns create the model
D. Recognition Patterns C. test the accuracy of your model
D. learning new and different skills
128. TPR stands for
134. Which form of ML depends on the person
A. Traditional Positive Rate
rewarding the AI?
B. True Positive Rate
A. Supervised
C. True Parameter Rate
B. Unsupervised
D. Traditional Parameter Rate C. Reinforced
129. Which of the following methods do we D. Deep Learning
use to find the best fit line for data in Lin-
135. Data set which has d binary features con-
ear Regression?
tains concepts
A. Least Square Error
A. 2d
B. Maximum Likelihood B. 22
d
C. Logarithmic Loss C. 4d
d
D. Both A and B D. 42
130. What type of Machine Learning Algo- 136. Which clustering method takes care of ob-
rithm is suitable for predicting the depen- long dataset?
dent variable with two different values? A. k-mean
A. Logistic Regression B. Gaussian mixture model
B. Linear Regression C. Decision tree
C. Multiple Linear Regression D. All of the answers
D. Polynomial Regression 137. ROC stands for
131. Which among these is not a type of learn- A. Receiver Operating Characteristic
ing? B. Row Operating Characteristic
A. Supervised Learning C. Receiver or Characteristic
B. Unsupervised Learning D. Relational Operating Characteristic
138. Supervised learning, given: 144. file folder located on the bottom of your
A. desired output only desktop
NARAYAN CHANGDER
A. Cluster els3. Better interpretability
B. Class A. 1 and 3
C. Regression B. 2 and 3
D. none of above C. 1 and 2
D. 1, 2 and 3
151. In which layer does the AI system use
“Situation assessment “? 157. What are friends on social network sites
a part of?
A. Sensing
A. Upstanders
B. Reasoning
B. Citizen
C. Learning
C. Community
D. Acting
D. Bystanders
152. is the subset of objects or events de- 158. Which of the following is not available in
fined over a larger set. Confusion Matrix
A. Entropy A. TP
B. Hierarchy B. TN
C. Concept C. FP
D. Learning D. TF
153. A broad term that refers to computers 159. Appropriate chart for visualizing the lin-
thinking more like humans. ear relationship between two variables is
A. Artificial Intelligence
A. Scatter plot
B. Machine Learning
B. Barchart
C. Deep Learning
C. Histograms
D. none of above
D. None of Mentioned
154. Which of these is not a supervised learn- 160. Machine Learning type uses unla-
ing algorithm? belled data.
A. Representation Learning A. Unsupervised
B. Classification B. Supervised
C. Regression C. Semi-Supervised
D. none of above D. None
161. name = “Daniella”. name = name[1]. 166. Where did AI begin its journey?
print(name]. what is the output? A. Supervised
172. The variable is Sunshine is to be used 177. What does Machine Learning means?
to indicate whether or not the weather is
A. Teaching the machine
currently sunny or not. Which of the fol-
lowing is the most appropriate data type B. Learn & adapt
for is Sunshine?
C. Train the data
A. Boolean
D. Make machine like human
B. String
NARAYAN CHANGDER
C. Float 178. Siri, Cortana, and Alexa are examples of
D. Integer
182. Which is FALSE about Decision Tree 187. Which type of ML is the oldest?
A. We can extract RULES from the Deci- A. Supervised
NARAYAN CHANGDER
D. negative recall
199. What kind of distance metric(s) are suit-
194. KNN algorithm appropriate for able for categorical variables to finding the
closest neighbors
A. Lower number of features
A. Euclidean Distance
B. Large number of features
B. Manhattan distance
C. No such restriction on number of fea-
tures C. Minkowski distance
D. None of the Mentioned D. Hamming distance
195. is the simplest supervised machine 200. What is an example of something that is
learning algorithm used for classification NOT PII?
based on how its neighbors are classified. A. Social Security Number
A. ANN B. Eye color
B. KNN C. Email address
C. SVM D. Student ID
D. Clustering
201. For a fully-connected deep network with
196. A multi-layered perceptron is usually one hidden layer, increasing the number of
trained using: hidden units should have what effect on
bias and variance?
A. Margin maximization algorithm
A. Decrease bias, increase variance
B. Single linkage algorithm
B. Increase bias, increase variance
C. Belief propagation algorithm
C. Increase bias, decrease variance
D. Back-propagation algorithm
D. No change
197. If the given dataset contains 100 obser-
vations out of 50 belongs to class1 and 202. raw data with no connections and/or re-
other 50 belongs to class2. What will be lationships among data detected-usually
the entropy of the given dataset? requires large amounts of storage
A. 0 A. data collection
B. 1 B. structured data
C. -1 C. unstructured data
D. 0.5 D. cloud computing
C. Less time for information to travel to 210. The residual is the difference in between
and from your device
D. Enhanced computing performances A. actual value of y and the estimated
value of y
205. Siri, Alexa, and Google Home are all ex-
B. actual value of x and the estimated
amples of:
value of x
A. Robots
C. actual value of y and the estimated
B. Social Media Sites value of x
C. Customer Support Bots D. actual value of x and the estimated
D. Virtual Assistants value of y
206. What doe ENIAC stands for? 211. In supervised learning, the allow
the algorithm to find the exact nature of
A. Electric Number Intersect A Calculator the relationship between any two data
points.
B. Electronic Numerical Integrator and A. classifier
Computer
B. training data
C. Engineering Numbering Into Auto Cor-
C. labels
rect
D. None of the above
D. Enter Number In Auto Correct
212. Which language supports for ML
207. Which of the following clustering algo-
rithms is the most sensitive to outlier? A. Corba
214. State whether the statements are True C. Adding more layers
or False.Statement A:When the hypoth-
D. Adding more neurons per layer
esis space is richer, overfitting is more
likely.Statement B:When the feature
219. What kind of table compares classifica-
space is larger, overfitting is more likely.
tions predicted by the model with the ac-
A. False, False tual class labels?
B. True, False A. Chaos table
NARAYAN CHANGDER
C. True, True B. Confusion Matrix
D. False, True
C. Prediction plot
215. How do you reduce both types I and II D. Residual plot
errors from occurring?
A. It can’t be reduced 220. Automation, computers, and electronics
B. Increase the sample size A. Industry 1.0
C. Redo the tests B. Industry 2.0
D. Tamper with the data C. Industry 3.0
216. A machine learning problem involves four D. Industry 4.0
attributes plus a class. The attributes have
3, 2, 2, and 2 possible values each. The 221. The equation of line is
class has 3 possible values. How many
A. y=mx+c
maximum possible different examples are
there? B. m=ab+cf
A. 12 C. p=ann
B. 72 D. AI=DL+ML
C. 24
D. 48 222. I.B.M.’s system beat the world cham-
pion of chess, the grand-master.
217. Which of the following statements is/ A. Deep Sea
are true about the kernel in SVM? 1. Ker-
nel function map low dimensional data to B. Deep Ocean
high dimensional space2. It’s a similarity C. Deep Lake
function
D. Deep Blue
A. 1 is True but 2 is False
B. 1 is False but 2 is True 223. How can you prevent a clustering algo-
C. Both are True rithm from getting stuck in bad local op-
tima?
D. Both are False
A. Set the same seed value for each run
218. Which of the following best improves a
machine learning model? B. Use multiple random initialization
A. Using more training examples C. Both A and B
B. Training the model over more epochs D. None of the above
224. Which of the following is TRUE about Re- 229. an ML model needs this to generate data
inforcement Learning? to learn from.
A. Recognition
NARAYAN CHANGDER
A. -ve and-ve
A. Only for Classification
B. -ve and +ve
B. Only for Regression
C. +ve and +ve
C. Both Classification and Regression
D. +ve and ve
D. None of the Mentioned
243. What year did Machine Learning began to
237. When would you reduce dimensions in flourish?
your data? A. 1980
A. When data comes from sensor B. 1918
B. When you are using a Linux machine C. 1908
C. When your data set is larger than D. 1890
500GB
244. How many types of machine learning?
D. When you have larger set of features
A. 4
with similar characteristics
B. 3
238. clustering is like C. 2
A. naming things D. 1
B. creating clusters 245. Field of study that gives computers the
C. automatic regression ability to learn without being explicitly
D. automatic classification programmed.
A. Deep Learning
239. This is where we insert the initial data
B. Machine Learning
for the neural network.
C. Data Science
A. Input
D. supervised learning
B. Hidden Layer
246. mushroom.groupby([’gill-size’])[’class’].value
C. Output
counts().to frame()What will this
D. none of above code do?
240. What is Dcostrings Used in Python. A. Group mushroom by Gill Size and Class
A. Coding
B. Group mushroom by Class and Than
B. Comments Gill Size
C. Differentiation C. Will show error
D. Iteration D. Count the types of gill size and class
258. Which of the following is FALSE about 263. KNeighborsClassifier class can be im-
Random Forest and Adaboost? ported as:
A. Random Forest aims to decrease vari- A. from sklearn.ensemble import KNeigh-
ance and not bias borsClassifier
B. Adaboost aims to decrease bias not B. from sklearn.neighbors import KNeigh-
variance borsClassifier
C. Both Adaboost and Random Forest aim C. from sklearn.tree import KNeigh-
NARAYAN CHANGDER
to decrease both bias and variance borsClassifier
D. None of the above D. from sklearn import KNeighborsClassi-
259. which is not a factor that affect show fier
good a result is
264. is the classification Technique based
A. the hardness of the task on Baye’s Theorem.
B. the machine learning method A. Decision Tree
C. the time it took to program it B. SVM
D. the quality of the data C. Naive Bayes
260. A collection of individual models that D. Association
learn to predict a target by combining their
strengths and avoiding the weaknesses of 265. The goal of clustering a set of data is to?
each is called A. choose the best data from the set
A. A Collection B. divide them into groups of data that
B. An Ensemble are near each other
C. A Group C. determine the nearest neighbors of
D. A Fusion each of the data
D. predict the class of data
261. What is the name of the test that Alan
created to check whether something is hu- 266. Why is data cleaning important?
man or a computer?
A. To run proper analysis on the data
A. Test of Turing
B. To ensure the code runs
B. Turner Test
C. To get rid of outliers
C. Turing Machine
D. To fit the data to expectations
D. Turing Test
262. Which feature selection technique uses 267. Targeted marketing, Recommended Sys-
shrinkage estimators to remove redundant tems, and Customer Segmentation are ap-
features from data? plications in
A. Stepwise regression A. Unsupervised Learning:Clustering
B. Sequential feature selection B. Supervised Learning:Classification
C. Neighborhood component selection C. Reinforcement Learning
D. Regularization D. Unsupervised Learning:Regression
268. Several sets of data related to each other 273. AI that is designed to perform a single
used to make decisions in machine learning task e.g. being able to play chess or drive
algorithms. E.g. comments to make you a car
278. is the fundamental unit of brain. 284. Real-Time decisions, Game AI, Learning
A. Lypcoses Tasks, Skill Aquisition, and Robot Naviga-
tion are applications in
B. Andrite
A. Unsupervised Learning:Clustering
C. Neuron
D. Axon B. Supervised Learning:Classification
C. Reinforcement Learning
279. ‘Convert to CSV’ module is a part of
which section? D. Unsupervised Learning:Regression
NARAYAN CHANGDER
A. Data Input and Output
285. AUC stands for
B. Data Transformation
C. Model Training A. Automatic under curve
280. type of machine learning which models it- C. Addition under curve
self after the human brain. D. Association under curve
A. Algorithm
286. In which of the following learning the
B. Machine learning
teacher returns reward and punishment to
C. Neuron learner?
D. Neural network A. Active learning
281. Perceptron consist of: B. Reinforcement learning
A. One neuron C. Supervised learning
B. Two neuron
D. Unsupervised learning
C. Three neuron
D. Four neuron 287. regression is like a
282. Which of these libraries are used for ma- A. kid riding a bike
chine learning? B. shopping bill
A. TensorFlow C. treating a dog
B. NumPy
D. teaching a kid how to walk
C. Pyplot
D. Pip 288. Although machine learning is useful, it
can be difficult to implement. Which is NOT
283. Model evaluation metric is calculated as one common obstacle faced by businesses
True Positives / (True Positives + False looking to use machine learning tools?
Negatives). What is the name of this met-
ric? A. Not enough data to perform machine
learning processes.
A. Accuracy
B. Precision B. Lack of necessary skills
289. The neural net models use and 294. is the partition approach of grouping
principles to mimic the processes of the similar datas.
human brain, allowing for more general
299. Different learning methods does not in- 305. Which of the following method is not
clude? used in binary classification
A. Memorization A. Decision Tree
B. Analogy B. Neural Networks
C. Deduction C. Database
D. Introduction D. Support Vector Machine
300. Deep learning algorithm for sequential
NARAYAN CHANGDER
306. Which of the following is not type of
problem learning?
A. CNN A. Semi-unsupervised Learning
B. ANN
B. Unsupervised Learning
C. DBN
C. Supervised Learning
D. RNN
D. Reinforcement Learning
301. The predicted category or value of the
data (column to predict). 307. What is an example of PII?
A. Target A. Gender
B. Label B. Employer
C. Sample C. Driver’s License Number
D. none of above D. Age
302. A major benefit of a machine with AI is 308. is the graphical representation of all
possible solutions to a decision.
A. it could do a job too dangerous for a A. K-Means
human
B. KNN
B. it could love you like a brother
C. ANN
C. it could chop up your vegetables
D. Decision Tree
D. none of above
309. How many types are available in machine
303. Machine learning is an application of: learning?
A. Deep learning
A. 1
B. Artificial intelligence
B. 2
C. Expert systems
C. 3
D. Robotics
D. 4
304. Who is the “Father of Artificial Intelli-
gence”? 310. It produces the result for given inputs.
A. Mathew McConaughey A. Input
B. George McCarthy B. Hidden Layer
C. John McCarthy C. Output
D. John Lennon D. none of above
311. In which layer does the AI system use 317. Which of the following is ingredients of
“Image processing “? machine learning tasks
322. Which of the following statements about 327. Change the following datetime “2020,
supervised learning is correct 04, 24” to strftime(’%Y-%d-%B’) in
Python
A. Decision tree is a supervised learning
A. 2020-04-24
B. Supervised learning cannot use cross-
validation for training B. 2020-24-04
NARAYAN CHANGDER
C. Supervised learning is a rule-based al- C. 2020-April-04
gorithm D. 2020-24-April
D. Supervised learning can be trained 328. What is the purpose of restricting hypoth-
without labels esis space in machine learning?
323. It is an application of artificial intelli- A. Can be easier to search
gence (AI) that provides systems the abil- B. May avoid overfit since they are usu-
ity to automatically learn and improve ally simpler (e.g. linear or low order deci-
from experience without being explicitly sion surface)
programmed
C. Both of the above
A. Artificial Intelligence D. None of the above
B. Decision Tree
329. The goal of concept learning is to find
C. Machine Learning
A. hypothesis
D. Linear Regression
B. training data set
324. Which of the following yields discrete cat- C. testing data set
egorical outputs? D. concept
A. Anomaly detection
330. green flag in Scratch
B. Regression
A. allows you to edit the program
C. Classification
B. the output generated when you train
D. Feature Learning your machine learning algorithm with
data.
325. What does the ability to identify objects
that are next to each other and objects C. starts the program
that are far from each other? D. stops the program
A. Visualization 331. It is the training of machine using infor-
B. Representative mation that is unlabeled and allowing the
C. Correlation algorithm to act on that information with-
out guidance.
D. Isolation
A. Supervised Learning
326. A compute instance is a B. Unsupervised Learning
A. Managed service C. Reinforcement Learning
B. Not a managed service D. none of above
344. Open-source tool that can combine code, 349. Overtime you log onto a website, you
markdown, and visualizations together in leave a mark. Your “stuff” can be seen,
a single document. searched, copied, and forwarded to others.
This permanent mark you leave is known
A. Visual Studio
as what?
B. Visual Studio Code A. Digital Media
C. Jupyter Notebook B. Digital Footprint
D. none of above C. Cyberbullying
NARAYAN CHANGDER
D. Media
345. Which one of these is not an activation
function in a neural network? 350. What will happen when eigenvalues are
A. sigmoid roughly equal in PCA?
A. PCA will perform outstandingly
B. Hyperbolic Tangent
B. PCA will perform badly
C. ReLU
C. Can’t Say
D. cos(x)
D. None of above
346. If 20 is added to the data set below, 351. What would make a robot intelligent?
which statement will be true? 50, 55, 55,
60, 62 A. It responds to the environment.
B. It calculates mathematical problems
A. The median will be 20
faster than human minds.
B. The mode will increase C. It responds to the environment accord-
C. The mean will increase ing to previous experiences.
D. The mean will decrease D. It can jump 1.5 meters higher than hu-
mans.
347. It is a type of machine learning where it
352. AI is (pick best definition)
involves a guide. It is also a technique in
which we teach or train the machine using A. Computers that are robots
data which is well labelled. B. Computers that can talk
A. Supervised Learning C. Computers that mimic a human’s be-
haviour
B. Unsupervised Learning
D. Computers that mimic other comput-
C. Reinforcement Learning ers
D. none of above
353. All data is labeled and the algorithms
learn to predict the output from the in-
348. Do you have to make predefined classes
put data. In other words, giving concrete
for Clustering?
known examples to the computer.
A. Yes
A. Dataset
B. No B. Supervised learning
C. Maybe C. Unsupervised learning
D. Lil uzi vert D. Classifiers
C. The null is false, but we fail to reject it. 370. Which type of machine learning rewards
the machine for getting the correct an-
D. The null is true but we fail to reject it. swer?
A. Unsupervised Learning
365. A group of baking videos on youtube
B. Reinforcement learning
A. Cluster
C. Supervised Learning
B. Class
D. none of above
NARAYAN CHANGDER
C. Regression
D. none of above 371. Which of this is the laziest technique of
learning?
366. Which term is defined as:” an approach
to teach computers how to make decisions A. k-nearest neighbour
and predictions, by giving them the ability B. k-means
to learn from data.”
C. k-fold
A. Machine Learning
D. k-19
B. Deep Learning
C. Artificial Intelligence 372. Which of the following would not typi-
cally be a consideration in the equipment
D. Artificial Narrow Intelligence
replacement question?
367. data that is capable of being used A. Forecasts of future demand
data that has been processed so that it can
be analyzed or used in its current form B. Expertise workers had on the old
equipment
A. curation of information
C. The cost of the replacement equip-
B. big data ment
C. usable data
D. The cost to maintain the old equipment
D. useful data
373. Which of following is used in the Acting
368. A computer system can use it to perform level?
a task without using instructions from us,
relying on patterns and inference instead. A. Image Recognition
A. Algorithm B. Speech Recognition
B. Machine Learning C. Speech Generation
C. Deep Learning D. All of above
D. Neural Network 374. A boy is riding his bike and is repeat-
369. which of the following is not a perfor- edly falling, but with time he starts to stop
mance metric falling. Which example of ML is this?
A. Precision A. Supervised
B. Recall B. Unsupervised
C. Association rules C. Reinforced
D. Accuracy D. Deep Learning
375. is the process of dividing datasets 380. What is a way to prevent overfitting?
into different categories or groups by A. Abstraction
adding labels.
B. declined to buy banca 391. How do you choose the root node while
C. both bought banca and who declined constructing a Decision Tree?
to buy banca A. An attribute having high entropy
D. all customers of TCB B. An attribute having largest information
gain
386. If we decrease the input variable by one
unit in a simple linear regression model. C. An attribute having high entropy and
How many units of the output variable will Information gain
NARAYAN CHANGDER
change? D. None of the Mentioned
A. reduced by Intercept 392. What is data? I. Computer readable in-
B. increased by Intercept formation II. Information collected about
the physical world III. Programs that pro-
C. increased by Slope
cess images IV. Graphs and charts
D. reduced by Slope
A. II and IV
387. Artificial Intelligence is superset of & B. I and II
,
C. I, II, and IV
A. Machine Learning & Neural Networks
D. I, II, III, and IV
B. Machine Learning & Deep Learning
393. Which of the following is true about
C. Deep Learning & Neural Networks Lasso and Ridge Regression?
D. none of above A. Ridge regression uses subset selec-
388. Select the correct option for creating real- tion of features
time inferencing environments: B. Lasso regression uses subset selec-
A. Create manually from Azure ML studio tion of features
user interface C. Both uses subset selection of features
B. Create programmatically using code
C. Both D. None of them are used for subset se-
lection of features
D. None
394. Which of the following function is used
389. Which machine learning type is directly by Logistic Regression to convert the prob-
related to labels? ability in between [0, 1]
A. Supervised A. Sigmoid
B. Unsupervised B. polynomial
C. Reinforcement Learning C. square
D. deep-learning D. rbf
390. What is intelligence? 395. The k-means algorithm is a
A. Storing or keeping lots of information A. Supervised learning algorithm
B. The ability to acquire and apply skills B. Unsupervised learning algorithm
C. Being emotional C. Semi-supervised learning algorithm
D. Being heartless D. Weakly supervised learning algorithm
396. The model learns and updates itself C. It is based on Bayes’ theorem.
through reward/punishment in case of D. It is not used in data mining.
NARAYAN CHANGDER
D. a machine that improves performance C. Learning from environment
based on watching a human do the same
D. none of above
task
408. What are the different types of machine 413. The ability of a computer to understand
learning? human language is called
428. Which machine learning algorithm helps 433. In classification, output can only be
to see the algos graphically:
A. 1
A. Decision Tree
B. 2
B. KNN
C. 3
C. Support Vector Machine
D. 4
D. Random Forest Algorithm
434. Researcher adds a new feature to the lin-
NARAYAN CHANGDER
429. focuses on the development of com- ear regression model. What would be the
puter programs that can access data and impact on R-square?
use it learn for themselves.
A. R-square will not change
A. Deep Learning
B. R-square will increase
B. Data Science
C. R-square will decrease
C. Artificial Intelligence
D. There is not enough information to
D. Machine Learning make conclusions about R-square
430. Suppose there is a basket which is filled 435. Which of the following is also called as
with some fresh fruits, apple, banana, exploratory learning?
cherry, grape. the task is to arrange the
A. Supervised learning
same type of fruits at one place. here the
example of? B. Active learning
A. Supervised Learning C. Unsupervised learning
B. Unsupervised Learning D. Reinforcement learning
C. Reinforcement Learning 436. What is Gini Impurity?
D. Semi-supervised Learning A. Gini Impurity measures the disorder of
a set of elements
431. Machine Learning is a subset of
B. Its an impurity in tree
A. Deep Learning
C. Gini is the name of the person who in-
B. Data Science
vented the decision tree
C. Artificial Intelligence
D. None of the above
D. IoT
437. Many people question whether an AI can
432. Which of the following is a type of learn- make ethical decisions. What do we mean
ing that depends on features to group ob- by ETHICS?
jects?
A. The laws of particular country
A. Supervised Learning
B. The rules of behaviour imposed by a
B. Unsupervised Learning programmer or the AI creator
C. Reinforcement Learning C. A set of moral principles
D. none of above D. Human emotions
A. supervised learning 448. After the data has completed the feature
engineering operation, in the process of
B. unsupervised learning
constructing the model, which of the fol-
C. reinforced learning lowing options is not a step in the decision
D. unreinforced learning tree construction process?
A. Pruning
443. If we didn’t assign a base estimators to
the bagging classifier it will use by de- B. Feature selection
fault: C. Data cleaning
A. Linear regression D. Decision tree generation
449. A field in the dataset used in the machine 454. Random Forest concepts are used to over-
learning algorithm. E.g. happy and sad come
A. Dataset A. over fitting
B. unsupervised learning B. complications in data
C. supervised learning C. complexity in model
D. Classifiers D. data noise
455. What kind of learning algorithm for “Fa-
NARAYAN CHANGDER
450. data has both the input and out-
put parameters in a completely machine- cial identities or facial expressions”?
readable pattern. A. Recognizing Anomalies
A. Supervised B. Prediction
B. Labeled C. Generating Patterns
C. UnLabelled D. Recognition Patterns
D. None of the above 456. The most commonly used cost function for
linear regression is
451. Cross validation is used for
A. Bias
A. Comparing predictors
B. RMSE
B. Selecting parameters in prediction C. Variance
function
D. none of above
C. Selecting variables to include in a
model 457. X1, Y1 X2, Y2. Which type of regression
is this?
D. All of the mentioned
A. Linear Regression
452. Which of these words can define that
B. Logistic Regression
these are spam mails by our previous
records? C. Polynomial Regression
A. Greetings D. Stepwise Regression
460. which of the following is not a method of 465. Which of the following is the model used
cross validation? for learning?
464. In history of ML which among the follow- 469. ‘6. What year did Artifical Intelligence
ing is a discovered Test as first test of AI? first stirred excitement?
NARAYAN CHANGDER
D. All of above. A. Recall
471. Simple regression is a relationship be- B. Specificity
tween 2 or more variables C. F1 Score
A. Linear D. none of above
B. Non Linear
474. Which the following clustering algorithm
C. Categorical uses a dendogram?
D. Systematical
A. Complete linkage clustering
472. This requires computer scientists to B. K-means clustering
formulate general-purpose learning algo-
rithms that help machines learn more than C. DBSCAN
just one task. D. None of the above
17. Storage classes available with Amazon s3 22. Which of the following service provider
are- provides the highest level of service?
A. Amazon S3 standard A. SaaS
B. Amazon S3 standard-infrequent Ac- B. PaaS
cess C. IaaS
C. Amazon Glacier D. All of the mentioned
D. All of the above
NARAYAN CHANGDER
23. is a free tier eligible instance type
18. hides the limitations of Java behind a A. c5.large
powerful and concise Clojure API for Cas- B. t2.micro
cading.
C. t2.small
A. Scalding
D. m4.xlarge
B. HCatalog
C. Cascalog 24. Which among the following is true for EBS
Snapshort
D. All of the mentioned
A. EBS snapshots fully support EBS en-
19. A is a combination load balancer and cryption.
application server that is a server placed B. EBS snapshots partially only support
between a firewall or router. EBS encryption.
A. ABC C. EBS snapshots doesn’t support Encryp-
tion
B. ACD
D. Encryption doesn’t applicable to EBS
C. ADC
D. All of the mentioned 25. When companies store data using cloud
technologies, to keep things secure, the
20. Which of the following architectural stan- data will be
dards is working with cloud computing in- A. Qualified
dustry?
B. Decrypted
A. Service-oriented architecture
C. Protected
B. Standardized Web services
D. Encrypted
C. Web-application frameworks
26. Which of the following is NOT a Cloud com-
D. All of the mentioned puting challenge?
21. Why web-based business are more popu- A. security and legal risks
lar? B. defining a contract
A. advances in technology C. hiring IT-specialists
B. security D. lock-in risks
C. internet speeds
27. Please choose the advantage of Azure
D. All the above that best matches the description:storage,
speed or bandwidth can be increased when 32. is a utility which allows users to cre-
necessary ate and run jobs with any executables as
the mapper and/or the reducer.
29. A in VPC contains a set of rules, called 34. This is a logical unit of storage in Ama-
routes, that are used to determine where zon Web Services (AWS) object storage
network traffic is directed. service, Simple Storage Solution S3. Buck-
ets are used to store objects, which con-
A. Gateway table
sist of data and metadata that describes
B. Switch the data.
C. Router A. Caching
D. Route table B. Databases
30. WHICH OF THE FOLLOWING IS NOT AN C. Bucket Storage
AUTHENTICATION MECHANISM D. Virtual machine
A. OTP
35. Secondary storage is used for
B. OAuth
C. SSO A. Storing data being used by the com-
puter
D. SAML-TOKEN
B. Storing programs to be used immedi-
31. Cloud computing architecture is a combina- ately by the arithmetic and logic unit
tion of? C. Long-term storage of data
A. a) service-oriented architecture and
D. Storing programs being executed
grid computing
B. b) service-oriented architecture and 36. Amazon cloud services does not include
event-driven architecture. A. Elastic Compute Cloud
C. c) virtualization and event-driven archi-
B. Simple Queue Service (SQS)
tecture.
C. SimpleDB
D. utility computing and event-driven ar-
chitecture. D. Live Services
37. Cloud Computing refers to 43. Cloud computing has its root back in
A. Accessing the Hardware A. 1970s
B. Configuring the Hardware B. 1960s
C. Manipulating the Hardware C. 1950s
D. All of the above D. 2000s
38. Microsoft’s Hyper-V is a 44. The allows systems and services to be
NARAYAN CHANGDER
A. Application accessible within an organization.
B. Component A. Public Cloud
C. hardware B. Private Cloud
D. client C. Community Cloud
42. enables the migration of the virtual im- 48. is the largest Chinese cloud computing
age from one physical machine to another. company
A. visualization A. Alibaba
B. virtualization B. Rackspace
C. migration C. DigtialOcean
D. virtual transfer D. VMware
49. What is the term for delivering an applica- 55. When architecting cloud applications,
tion over the internet called? which of the following are a key design
principle?
NARAYAN CHANGDER
61. I have local network and data centre, But C. X-Ray
i like to integrate them into cloud account. D. none of above
What type of solution you will prefer for
it? 67. USB stands for
A. Hybrid A. Universal Serial Bus
B. Private B. Unified Serial Bus
C. Public C. Universal Signal Bus
D. Local network D. Unified Signal Bus
62. is a general, collective term that refers 68. Cloud computing is also a good option
to the delivery of anything as a service when the cost of infrastructure and man-
agement is
A. SaaS
A. low
B. PaaS
B. high
C. IaaS
C. moderate
D. XaaS
D. none of the mentioned
63. Which is not an advantage of Grid?
69. Which among the following is Edge Com-
A. Scalable puting Service of AWS
B. uses unused computing power A. AWS RDS
C. provide standard and high cpu B. AWS EBS
D. multi-tenancy C. AWS EC2
D. AWS Snow family
64. A is a party that can perform an inde-
pendent examination of cloud service con- 70. Amazon Web Services is an example of
trols
A. Infrastructure as a Service
A. Cloud service providers
B. Software as a Service
B. Cloud Broker
C. Platform as a Service
C. Cloud Consumer
D. None of these
D. cloud auditor
71. Which of these files can be created in
65. Cellular network is an example of Google Drive?
A. P2P computing A. Google Docs
B. Distributed computing B. Google Forms
75. SaaS does not necessarily mean that the A. Virtual Machine
software is? B. Virtual Machine Migration
A. dynamic C. Security Isolation
NARAYAN CHANGDER
B. The reliability of locally installed appli- tional scenery except
cations A. Lower cost
C. Scalable storage capacity B. Creation of virtual classroom
D. Needs to be installed on the computer. C. Increase learning time
84. What is the pricing model that enables the D. Better access to education and train-
cloud customers to pay for the resources ing
on a as-needed basis 90. Which of the following is the deployment
A. pay as you buy model?
B. pay as you go A. public
C. pay as you reserve B. private
D. pay as you decommision C. hybrid
85. When we create a Virtual Machine in D. all of the mentioned
Cloud, it called as which model? 91. has many of the characteristics of
A. Platform as a Service what is now being called cloud computing.
B. Infrastructure as a Service A. Internet
C. Software as a Service B. Softwares
D. Container as a Service C. Web Service
94. ensures that your group has this many 99. Simple Storage Service use for?
instance at any given time A. It allows the users to store and re-
B. NAS supports more files. 110. Which of the following behaves like the
entry point of the monitor and reroutes the
C. Block data transmission is optimized.
instructions of the virtual machine?
D. File sharing is optimized.
A. Dispatcher
105. Which of the following is highest degree B. Allocator
of integration in cloud computing?
C. Interpreter
A. IaaS
D. Both A and B
NARAYAN CHANGDER
B. Caas
C. Paas 111. What are clouds made out of?
108. enables batch processing, which 113. When you add a software stack, such as
greatly speeds up high-processing applica- an operating system and applications to
tions. the service, the model shifts to model
A. Scalability A. IAAS
B. Reliability B. PAAS
C. Elasticity C. SAAS
D. Utility D. CAAS
109. Which of the following belongs to the 114. is the central application in the AWS
SaaS mode of Apple CLOUD? portfolio.
A. Elastic Volume Service (EVS) A. Amazon Simple Queue Service
B. Elastic cloud server (ECS) B. Amazon Elastic Compute Cloud
C. Object Storage Service (OBS) C. Amazon Simple Notification Service
D. Facial recognition D. Amazon S3
117. Simple Cloud, jclouds and Libcloud are all A. Customers, or tenants, maybe differ-
examples of: ent individuals or groups within a single
company
A. Vendor-specific cloud APIs
B. Customers, or tenants, maybe differ-
B. Cross-platform APIs
ent individuals or groups from different
C. IaaS APIs companies.
D. Apache APIs C. Customers, or tenants within a single
118. A is a standard unit of software that company on a PC
packages up code and all its dependencies D. none of above
A. Docker
123. What is pay-as-you-go model?
B. NGINX
C. Container A. You need to pay everything upfront
D. Virtual Machine B. No need to pay, until you use it
119. In personal computing, a platform is the C. Use and pay sometime later
and on which software applica- D. After use some functions in cloud, you
tions can be run. need to pay immediately
A. basic hardware & software
B. computer & operating system 124. AWS S3 supports to get the previous
version of the data
C. computer & user
A. Data versioning
D. computer & software
B. Previous Version
120. What is an advantage of Cloud Comput-
ing? C. Snapshot
A. Can access you files anywhere D. Backup
125. as a Service is a cloud computing in- 130. A hybrid cloud combines multiple clouds
frastructure that creates a development where those clouds retain their unique
environment upon which applications may identities but are bound together as a
be built. unit.
A. Software A. Public
B. Platform B. Private
C. Infrastructure C. Community
NARAYAN CHANGDER
D. Hardware D. Hybrid
145. provides the run time environment B. Amazon Elastic Compute Cloud
for applications, development and deploy- C. Amazon Simple Notification Service
ment tools, etc.
D. Amazon Simple Storage System
A. IaaS
151. Distributing workloads across multiple
B. PaaS
Availability Zones supports which cloud ar-
C. SaaS chitecture design principle?
D. IDaaS A. Implement automation.
NARAYAN CHANGDER
146. What is the default maximum number of B. Design for agility.
VPCs allowed per region? C. Design for failure.
A. 5 D. Implement elasticity.
B. 10 152. Amazon Web Services, Microsoft Azure,
C. 15 Google Compute Engine are
D. 30 A. IaaS
B. PaaS
147. Which of these options is not a PaaS of-
fering? C. SaaS
A. IBM App Mix D. All of the above
B. Azure App Service 153. is a cloud-based customer relation-
C. AWS Elastic Beanstalk ship management (CRM) platform
156. . Which of the following is built on top 161. is the on-demand availability of com-
of a Hadoop framework using the Elastic puter system resources, especially data
Compute Cloud? storage and computing power, without di-
159. How many types of hypervisor are 164. What service distributes incoming traffic
there? across multiple instances?
A. 2 A. Amazon EFS
B. Amazon S3
B. 3
C. Amazon ELB
C. 4
D. Amazon EBS
D. 5
165. Which of the following is an example of
160. Which of the following is not a Kernel- cloud computing?
based Virtual Machine (KVM) manage-
ment tool? A. Using your laptop on an airplane
NARAYAN CHANGDER
167. SaaS supports multiple users and pro-
vides a shared data model through model. C. Cloud computing is revolutionary, even
if the technology it is built on is evolution-
A. single-tenancy ary
B. multi-tenancy D. None of the mentioned
C. multiple-instance
173. Downtime may happen due to
D. all of the mentioned
A. loss of power
168. Which of the following is a more sophis- B. low internet connectivity
ticated load balancer? C. data centres going out of service for
A. workload managers maintenance
B. workspace managers D. All the above
C. rackserve managers 174. WHICH OF THE FOLLOWING IS NOT A
D. all of the mentioned PHASE OF KEY MANAGEMENT
A. CREATION
169. What happens to data when you stream
a movie? B. VERIFICATION
A. It gets deleted as you watch it C. MONITORING
177. is a scalable computer service 183. Which of the following is related to ser-
A. Alibaba vice provided by Cloud?
C. Digitalocean B. Ownership
D. VMware C. Reliability
D. AaaS
178. How close is the closest data center?
A. Dublin, Ireland 184. Select the correct statement.
B. Mountain View, California A. MapReduce tries to place the data and
the compute as close as possible
C. Antartica
D. Tesco Extra New Malden B. Map Task in MapReduce is performed
using the Mapper() function
179. A simple example of SaaS is an online C. Reduce Task in MapReduce is per-
A. Email service formed using the Map() function
B. Server D. All the answer are correct
C. Infrastructure service 185. Which solution should you choose if you
D. Platform service need a pre-built set of applications with
certain business functionality?
180. Cloud Deployment Models
A. IaaS
A. Public Cloud
B. PaaS
B. Private Cloud
C. SaaS
C. Hybrid Cloud, Community Cloud
D. On-premise
D. Hybrid Cloud, Community Cloud, Public
Cloud, Private Cloud 186. NameNode is used when the Primary
NameNode goes down
181. is a cloud computing platform which
is launched by Microsoft A. Rack
A. Windows PowerShell B. Data
B. Azure C. Secondary
C. Windows 10 D. None of the mentioned
D. Windows Server 2019
187. Which cloud is deployed when there is a
182. What is a disadvantages of external budget constraint but business autonomy
hosting? is most essential?
A. Costs less than an external host A. Private cloud
B. Little technical knowledge required B. Public cloud
C. More prone to viruses and hacking C. Hybrid cloud
D. Expensive service D. Community cloud
188. Broad network access 193. Amazon S3 is which type of storage ser-
vice?
A. Cloud computing resources are acces-
sible over the network A. Block
B. Resource pooling B. Object
C. Simple
C. Measured service
D. Secure
D. Self-service
194. Which of the following is an example of
NARAYAN CHANGDER
189. The user can scale, through a control an IaaS Cloud service?
panel, the required infrastructure without A. EC2
disrupting operations.
B. S3
A. On demand self service C. DynamoDB
B. Elasticity D. IAM
C. Scalablility 195. Amazon EC2 is an example of
D. Ubiquitous access A. Generic cloud architecture
B. Layered cloud architecture
190. The capability provided to the consumer
is to provision processing, storage, net- C. NIST cloud architecture
works, and other fundamental computing D. all the above
resources is called
196. PAN stands for
A. SaaS
A. Personal Area Network
B. PaaS B. Personal Arena Network
C. IaaS C. Priority Area Network
D. None of the above D. Priority Arena Network
191. Which of the following should be replaced 197. Which Cloud computing service would
with the question mark in the following fig- work well for application development
ure? cloud-computing-questions-answers- companies to develop and test their
virtualization-technologies-q10 apps?
A. SaaS
A. Abstraction
B. IaaS
B. Virtualization
C. PaaS
C. Mobility Pattern
D. ITaaS
D. All of the mentioned
198. applies the resources of numerous
192. Google Apps computers in a network to work on a sin-
gle problem at the same time.
A. SaaS
A. cloud computing
B. PaaS B. grid computing
C. IaaS C. soft computing
D. None of these D. virtual computing
210. An EBS Snapshort can shared with spe- 216. In how many parts we can broadly divide
cific accounts by making them the architecture of the Cloud?
A. ReadOnly A. 4
B. ReadWrite
B. 2
C. Public
C. 3
D. Private
D. 5
211. Cloud Services have a relationship
NARAYAN CHANGDER
with their customers. 217. Parallels Desktop is an example of?
A. Many-to-many
A. TYPE-1 Hypervisor
B. One-to-many
B. DISPATCHER
C. One-to-one
C. TYPE-2 Hypervisor
D. none of above
D. INTERPRETER
212. Which of the following services that need
to be negotiated in Service Level Agree-
218. Web services can be discovered using
ments?
A. Logging A. UDDII
B. Auditing B. UDII
C. Regulatory compliance C. UDDI
D. All of the mentioned D. UDDDI
213. Cloud computing model that provides vir-
tualized computing resources over the in- 219. . provides virtual machines, virtual stor-
ternet. age, virtual infrastructure, and other hard-
ware assets.
A. IaaS
B. PaaS A. IaaS
C. SaaS B. SaaS
D. RaaS C. PaaS
214. Which type of cloud is lowest in the sky? D. All of the mentioned
A. Cirrus
220. which of the following can be considered
B. Cumulus
an advantage of cloud storage
C. Stratus
A. the user has no control over their data
D. none of above
215. IPV4 Address is B. accessible anywhere with an internet
A. 8 bit connection
B. 16 bit C. portability
C. 32 bit D. many programs can be run at the same
D. 64 bit time
232. The allows systems and services to A. A secured connection for remote ac-
be accessible by a group of organizations. cess to a local area network
A. Public Cloud B. A secured private cloud for a single
user
B. Private Cloud
C. A virtual network device for private
C. Community Cloud
purposes
D. Hybrid Cloud
D. An operating system for private net-
NARAYAN CHANGDER
233. For the model, the security boundary work systems
may be defined for the vendor to include 238. is another name for Hypervisor.
the software framework and middleware
layer. A. VMM
A. SaaS B. VMC
B. PaaS C. VNM
246. The term “Cloud Computing” is a 251. From the standpoint of a it makes
metaphor that originated in what? no sense to offer non-standard machine in-
A. Graphical depiction of computer archi- stances to customers
tecture A. CaaS
B. Meteorological symbolism B. AaaS
C. Worries about an unclear future for C. PaaS
computing architecture
D. IaaS
D. The idea that computer user trust in
magic
252. What is SQL?
247. One problem with streaming movies and A. Structured Query language
music from the cloud is that
B. Structured Querying language
A. Cloud services are expensive
C. Sequential Query language
B. You need internet access to watch or
listen D. SequelQuery language
253. Which of the following cloud concept is re- B. Cost, Performance, Storage
lated to pooling and sharing of resources? C. Performance, Cost, Security, Storage
A. Polymorphism D. Performance, Storage, Security
B. Abstraction
259. A node acts as the Slave and is re-
C. Virtualization sponsible for executing a Task assigned to
D. None of the mentioned it by the JobTracker.
A. MapReduce
NARAYAN CHANGDER
254. Which of the following benefit is related
to creates resources that are pooled to- B. Mapper
gether in a system that supports multi- C. TaskTracker
tenant usage? D. JobTracker
A. On-demand self-service
260. Key components of Azure Services Plat-
B. Broad network access form are
C. Resource pooling A. Windows Azure
D. All of the mentioned B. Live Services
255. Virtual Machine ware(VMware)is an ex- C. Microsoft SQL Services
ample of D. All the above
A. IAAS 261. Which of the following is the most widely
B. PAAS used technique for abstraction?
C. SAAS A. Load balancing
D. none of above B. Load schedulin
C. Load scaling
256. What is a system of interconnected
computers and other electronic devices D. All of the mentioned
called?
262. is a service provisioning model in
A. Server which a service provider makes computing
B. Network resources and infrastructure management
available to the customer as needed
C. Data Link
A. Grid Computing
D. Cloud Computing
B. Utility Computing
257. If your laptop uses the cloud for every- C. Distributed Computing
thing, your hard drive must be
D. None of the above
A. empty
263. refers to the ability of a company or
B. high tech
product to retain its customers over some
C. fast specified period
D. full A. Customer retention
258. What is the Need of Cloud Computing? B. Outsourcing
A. Maintenance, Cost, Performance, Se- C. Business Continuity
curity D. Disaster Recovery
NARAYAN CHANGDER
276. Which of the following cloud is specifi- organizations that belong to a particular
cally designed to address the needs of the community such as banks, government or-
specific industry? ganizations, or commercial enterprises
A. Public Cloud A. Private cloud
B. Private Cloud B. Public cloud
C. Hybrid Cloud C. Hybrid cloud
D. Community Cloud D. Community cloud
295. What are the four classes of clouds based 300. is a computer network in which each
on altitude? computer’s resources are shared with ev-
A. cirrus, nimbus, stratus, cumulus ery other computer in the system
NARAYAN CHANGDER
D. classes of clouds are not based on al-
titude 301. In RAID 5 and RAID 6, the number of
faulty disks that can be tolerated is ( ), re-
296. Which one of these statements are incor- spectively.
rect about the cloud? A. 1, 2
A. Rent part of hardware. B. 2, 3
B. Installing and configuring completed C. 2, 1
in house. Need to employ someone.
D. 3, 2
C. 3rd party company automatically will
apply patches and upgrades. 302. function processes a key/value
pair to generate a set of intermediate
D. Owned by 3rd party company.
key/value pairs.
297. The cloud services purchased by a user in- A. Map
clude an application running environment,
B. Reduce
but do not contain any application or re-
latard data. This mode is C. Both Map and Reduce
A. NaaS D. None of the mentioned
B. SaaS 303. Which of the following is owned by an
C. IaaS organization selling cloud services?
D. PaaS A. Public
B. Private
298. What is a disadvantage of cloud comput-
ing? C. Community
A. It is vulnerable to hacking D. Hybrid
B. The storage can be easily expanded 304. Odd one out
C. Portability A. Dropbox
D. All of the above B. Google drive
299. Cloud providers provide cloud services to C. Excel
the cloud users. D. Onedrive
A. true 305. Which of the following is best known ser-
B. false vice model?
C. MAYBE A. SaaS
D. CANT SAY B. IaaS
307. is a programming model designed for A. Cloud Computing means storing data
processing large volumes of data in paral- in a database
lel by dividing the work into a set of inde- B. Cloud Computing is a tool used to cre-
pendent tasks. ate an application
A. Hive C. Cloud Computing means providing ser-
B. MapReduce vices like storage, servers, database, net-
working, etc
C. Pig
D. Lucene D. Store in Server
316. How many types of dimensions exists in 322. Amazon cloud-based storage system
Cloud Cube Model? allows you to store data objects ranging
A. 1 in size from 1 byte up to 5GB.
B. 2 A. EBS
C. 3 B. S2
D. 4 C. S3
317. The is something that you can obtain D. Glacier
NARAYAN CHANGDER
under contract from your vendor.
A. PoS 323. Working as a group is a concept of
B. QoS A. Client server computing
C. SoS B. Distributed Computing
D. All of the mentioned C. Collaborative Computing
318. flexibility is D. P2P computing
A. The ability to scale up resources
324. function is responsible for consolidat-
B. The ability to scale down resources
ing the results produced by each of the
C. Both a and b Map() functions/tasks.
D. None of these A. Reduce
319. as a utility is a dream that dates from B. Map
the beginning of the computing industry it-
self. C. Reducer
A. Model D. All the answer are correct
B. Computing
325. A characteristic of edge locations is that
C. Software they:
D. All of the mentioned A. host Amazon EC2 instances closer to
320. When files are held on two devices, are users.
updated to make sure they have the same B. help lower latency and improve perfor-
content mance for users.
A. Uploading C. cache frequently changing data with-
B. Downloading out reaching the origin server.
C. Synchronising D. refresh data changes daily.
D. Streaming
326. Mobile devices include or .
321. IaaS shares issues with?
A. desktop or smartphones
A. PaaS
B. SaaS B. desktop or phones
NARAYAN CHANGDER
A. Private cloud, public cloud, hybrid 345. What is/are the advantages of IaaS?
cloud, community cloud
A. Eliminates capital expense and re-
B. Private cloud, public cloud, hybrid duces ongoing cost.
cloud
B. Improves business continuity and dis-
C. public cloud, private cloud aster recovery
D. None of the above
C. Innovate rapidly
340. Cloud computing shifts capital expendi-
D. All the above
tures into expenditures.
A. operating 346. Object storage systems store files in
B. service a flat organization of containers called
what?
C. local
D. none of the mentioned A. Baskets
349. A is a cloud-based platform that en- 354. Cloud computing is an abstraction based
ables developers to add real-time commu- on the notion of pooling physical resources
nications features (voice, video, and mes- and presenting them as a resource.
A. The user does not have to worry about A. The front end connects the back end to
physical damage. the internet
B. The user has full control over how their B. The back end connects the front end to
data is stored. the internet
C. It can be vulnerable to hacking. C. The internet connects the front end to
D. It is easy to expand storage. the back end
D. The front end needs no connection to
351. A is a group of technologies that are
the back end
used as a base upon which other applica-
tions, processes or technologies are devel- 356. Which among the following is an open
oped source operating systems?
A. DevOps A. Windows
B. Platform
B. Mac OS
C. Cloud Computing
C. Linux
D. PaaS
D. Unix
352. Which one of the following cloud concepts
is related to sharing and pooling the re- 357. In General, ”Cloud” computing resources
sources? are usually stored
A. Polymorphism A. In a data warehouse
B. Virtualization B. In a complex network of data servers
C. Abstraction C. In a Virtual Library
D. Encapsulation D. none of above
353. Level Agreement (SLA) is the contract
358. What deployment models are not avail-
for performance negotiated between you
able for Cloud?
and a service provider.
A. Service A. Hybrid
B. Application B. Private
C. Deployment C. Enterprise
D. All of the mentioned D. Public
NARAYAN CHANGDER
360. When one uses a bank card, they are re- A. Router
quired to enter their PIN. What does PIN B. Bus
stand for?
C. Server
A. Personal Instant Number
D. USB
B. Personal Identification Number
366. Real time data processing in a cloud func-
C. Professional Instant Number
tion does not help in
D. Professional Identification Number
A. Video and image analysis
361. PKI stands for B. File processing
A. Private Key Infrastructure C. Stream processing
B. Public Key Infrastructure D. Event driven extract, transform and
C. Private Key Information load function
D. Public Key Information 367. Which of the following is correct about
URI in RESTful web services?
362. Sharing resources is the main priority of
A. Each resource in REST architecture is
A. Client server computing
identified by its URI
B. P2P Computing
B. Purpose of an URI is to locate a re-
C. Distributed computing source(s) on the server hosting the web
D. collaborative computing service
C. Both of the above
363. Cloud storage can be provided as a ser-
vice by allowing your data to be stored D. None of the above
373. What are the advantages of Cloud Com- 378. Which statement about clouds is true?
puting?
A. Cumulus clouds mean a change of
A. Cost efficiency weather is coming in the next 24 hours.
B. Excellent accessibility
B. There is only one kind of cloud in the
C. Back-up and restore data sky at a time.
D. All the above
C. Fog is not a cloud.
374. allows multiple operating systems to D. Cirrus clouds are the highest in the
run on a single hardware device at the sky.
same time by more efficiently using sys-
tem resources, like processors and mem- 379. In which year one drive was launched?
ory.
A. 2010
A. Full virtualization
B. Paravirtualization B. 2007
D. Quick deployment
A. Markus Persson
NARAYAN CHANGDER
381. What is private cloud?
B. Zhang
A. A cloud architecture maintained within
C. Marc Benioff
an enterprise data center.
B. A cloud service inaccessible to anyone D. daniel a
but the cultural elite
387. This type of hypervisor is usually used in
C. A standard cloud service offered via data centers.
the Internet
A. Type 1
D. none of above
B. Type 2
382. A period of time when a computer or ser-
C. Nexus
vice is unavailable is called
D. Hadoop
A. Geo-Data
B. Downtime 388. Choose the correct relationship of cloud
C. Synchronising services to customers.
D. Downloading A. One-one
B. One-Many
383. A security group acts as a for your
instance to control inbound and outbound C. Many-One
traffic. D. Many-Many
A. virtual network
389. Imported VM from on-premises could be
B. virtual tunnel
stored in cloud using
C. virtual firewall
A. Amazon S3
D. None of the above
B. Amazon EBS
384. What’s the most popular use case for pub-
C. Amazon EFS
lic cloud computing today?
D. Amazon Glacier
A. Website hosting
B. Test and development 390. Facilities that house large collections of
C. Disaster recovery servers are called
391. What is agility? 396. Tim is worried about losing his files
A. Ability to move quickly stored on his personal computer. Tim
should use to eliminate that problem.
NARAYAN CHANGDER
B. Security concerns data store that supports indexing and data
C. Too many platforms queries to both EC2 and S3?
D. Accessability A. CloudWatch
B. Amazon SimpleDB
403. is the most popular high-level Java
C. Amazon Cloudfront
API in Hadoop Ecosystem
D. All of the mentioned
A. Scalding
B. HCatalog 409. The networking layer which prepares a
message in a form that will be understood
C. Cascalog by the receiving application.
D. Cascading A. Application
B. Transport
404. Why software environment needs virtu-
alization C. Network
A. Enhance the performance D. Data link
B. Limited use of Hardware 410. Usually methods like RAID strategies are
used in cloud computing to maintain in-
C. shortage of space
tegrity. What RAID stands for?
D. All of the mentioned A. Redundant array of independent disks
405. An operating system running on a Type
VM is full virtualization. B. Redundant arrangements of indepen-
dent disks
A. 1
C. Removal of array in independent disks
B. 2
C. 3 D. Remove array for integrity dependent
D. All of the mentioned 411. The property states that the system
must have a mechanism to recover from
406. Which among the following is Linux web
committed transactions should that be nec-
server
essary.
A. Apache A. Atomicity
B. Ngios B. Consistency
C. Hyper-v C. Isolation
D. IIS D. Durability
NARAYAN CHANGDER
B. Identity and Access Management
server workload in non-linear in nature
C. Registration Authority
A. Auto Scale
D. User Management
B. Flexibility
430. This type of solution allows companies
C. Scale-ability
to deploy complete desktop environments,
D. none of above which allows their IT to provide a persis-
tent environment.
425. is the slave/worker node and holds
the user data in the form of Data Blocks A. Office 365
A. DataNode B. Google Drive
B. NameNode C. AutoDesk
C. Data block D. virtual desktop infrastructure
434. Most recognizable model of cloud comput- 439. A payment method for cloud computing
ing that charges based on usage.
B. Customers can share computing re- 450. is a cloud computing service model
sources in a public or private cloud in which hardware is virtualized in the
C. Single customer environment cloud.
NARAYAN CHANGDER
A. Use multiple Availability Zones.
451. Which of the following falls in the cate-
B. Use tightly coupled components.
gory of “north-south” traffic?
C. Use open source software.
A. Traffics between VM in data centers
D. Provision extra capacity.
B. Traffic generated when uses access
446. All cloud computing applications suffer the data center through the internet
from the inherent that is intrinsic in
C. Traffic generated during VM live gener-
their WAN connectivity.
ation
A. Propagation
D. Traffic between VMs in different data
B. Latency centers
C. Noise
452. In computing, this is an emulation of a
D. All of the Above computer system. It is based on computer
447. Which type of cloud is provisioned for architectures and provide functionality of
open use by the general public? a physical computer.
448. Cloud computing doesn’t require that 453. A large collection of servers is know as a
and software be composable.
A. cloud A. Network
B. database B. Computer System
C. hardware
C. Server Farm
D. all of the mentioned
D. Database
449. refers to the connectedness of big
data. 454. is an open-source web server
A. Value A. Linux
B. Veracity B. MySQL
C. Velocity C. Perl
D. Valence D. Apache
455. All hardware and software is in house 460. The option allows you to copy jars
managed by the organisation. locally to the current working directory of
tasks and automatically unjar the files.
C. PaaS B. files
D. IaaS C. task
D. None of the mentioned
456. Chose the most appropriate an-
swer:Cloud technology allows users to 461. Which is not a characteristics od SaaS?
and from anywhere in the world. A. Multi device support
A. Download music (and) movies B. Web Access
B. Collaborate (and) share files C. one to Many
C. Hack (and) plant viruses D. offline Acess
D. Commit cyber crimes (and) break laws
462. A Person, organization, or entity respon-
457. What is Data Protection. sible for making a service available to in-
A. The protection of all terest parties.
NARAYAN CHANGDER
A. Internet
B. Public
B. Bluetooth
C. Protected
C. WiFi
D. Hybrid
D. 4G
472. Type(s) of Resource Provisioning is/are-
467. Cloud processing could be used as a ser-
vice if A. Static Provisioning or Advanced Provi-
sioning
A. You need more storage space
B. Dynamic Provisioning
B. You need more hardware
C. User Self-provisioning
C. You need to run complicated programs
with many complex mathematical calcula- D. All correct
tions
473. Which of the following is cloud computing
D. You want to stop hackers replacing?
468. What percentage of web application at- A. corporate data centers
tacks were attributed to cloud-based email B. expensive personal computers
servers, according to Verizon’s 2019 Data
Breach Investigations Report (DBIR)? C. expensive software upgrades
B. http C. Elasticity
C. httpd D. Resource Pooling
D. apache 483. A cloud requires virtualized storage
478. Cloud Computing Turns to support the staging and storage of
data.
A. Reduce OPEX and Increase CAPEX
A. soft
B. Reduce CAPEX and Increase OPEX
B. compute
C. Increase CAPEX and OPEX
C. local
D. Reduce CPEX and Small increase in
OPEX D. none of the mentioned
479. Which of the following is not a type of 484. Google Apps Engine is a type of
cloud?
A. SaaS
A. Private
B. PaaS
B. Public
C. IaaS
C. Protected
D. none of the mentioned
D. Hybrid
485. Apache Hadoop YARN stands for:
480. Which of the following network re-
sources can be load balanced? A. Yet Another Reserve Negotiator
A. Connections through intelligent B. Yet Another Resource Network
switches
C. Yet Another Resource Negotiator
B. DNS
D. Yet Another Resource Manager
C. Storage resources
D. All of the mentioned 486. What can be offered as a part of IaaS?
A. application software
481. An advantage of cloud software is that
B. call-center services
A. It is always free C. computing capacity
B. It cannot be hacked D. consulting
487. Point out the correct statement in context 492. Examples for client-server model
of YARN: A. Email
A. YARN extends the power of Hadoop B. network printing
to incumbent and new technologies found
C. World Wide Web
within the data center
D. All the above
B. YARN is highly scalable
C. YARN enhances a Hadoop compute 493. The most utilized. The software is hosted
NARAYAN CHANGDER
cluster in many ways on the providers’ servers and accessed by
the customer through the web browser.
D. All of the mentioned this concept belongs to:
488. How many types of services Cloud com- A. The PaaS-Platform as a Service model
puting offers?
A. 2 B. The SaaS-Software as a Service cloud
computing model
B. 3
C. The IaaS-Infrastructure as a Service
C. 4 model
D. 5 D. none of above
489. Which of the following is good for the en- 494. What is a possible risk of cloud comput-
vironment? ing?
508. & used to determine the ROI of 513. “allow organizations to store and man-
an organization age data on off-site file servers instead of
building their own physical data centers “
A. Marginal Cost & Operational Cost
this statement refer to..
B. CAPEX & OPEX
A. virtualization
C. Profit & Loss
B. Storage components
D. None of the above
C. Physical server
NARAYAN CHANGDER
509. Which of the following is a feature found D. Device
in most cloud accounts?
514. A major advantage of Cloud Computing
A. Automatic backup
is the ability to have a resource known as
B. Cloud storage space ‘ ‘-which creates a copy of a file
C. Apps to connect multiple devices to stored in a secure location in case the orig-
your account inal file gets lost / corrupted
512. Google App Engine (often referred to as 517. An example of a file-sharing platform
GAE or simply App Engine) is that uses the cloud is:
A. Is a Platform as a Service A. Facebook
B. Is a Software as a Service B. Twitter
C. Is a Infrastructure as a Service C. Google Docs
D. All of the above D. Snapchat
518. CaaS vendor offer guaranteed QOS in cloud storage offerings conform to a
SLA to their clients .what does QOS stands as a Service model.
for? A. None of these
529. Cloud Computing depend on? 535. What is the biggest disadvantage of com-
A. Mother Board munity cloud?
NARAYAN CHANGDER
A. multiple operating systems on a single D. Organisation losses business auton-
physical system omy
B. single physical system
C. multiple operating systems on a multi- 536. Which of the following is the operational
ple physical system domain of CSA?
541. Which of the Windows AMI is NOT sup- C. Elastic Load Balancing
ported in Amazon EC2? D. All of the above
A. Windows server 2008
547. Maximum free storage space in one
B. Windows 10 drive
C. Windows Server 2012 A. 2gb
D. Windows Server 2019
B. 10gb
542. A private cloud is used to provide ser- C. 6gb
vices and applications for
D. 5gb
A. a specific organization
B. a public group 548. The technology used to distribute service
C. the entire YouTube community requests to resources is referred to as:
545. is a form of business process out- B. Market place & Selling to consumer
sourcing (BPO) that employs a cloud com- C. Product popularity & Hosting a service
puting service model
A. Business Process as a Service D. Brokering a product & Hosting a ser-
B. Software as a Service vice
551. What are some open source cloud comput- C. SaaS applications are not customiz-
ing platform databases able
A. MongoDB D. SaaS applications are customizable
B. CouchDB
557. Which of the following CANNOT be of-
C. LucidDB fered as a service via Cloud Computing?
D. all of the mentioned
A. hardware
command is used to create a file
NARAYAN CHANGDER
552. B. software
A. touch C. storage space
B. man
D. data
C. mkdir
D. mv 558. holds the information of the multiple
threads of execution
553. Which among the following is AWS Edge A. Process Control Block
Computing Service model that compute op-
timized and storage optimized B. Process
A. AWS Snowcone C. Thread Control Block
B. AWS Snowball D. Multithreading
C. AWS Snowmobile
559. Which of the following is used to define
D. AWS SnowCloud the service component that performs the
554. allows multiple customers to share service?
the same applications or the same physical A. WSDL
infrastructure while retaining privacy and
B. SCDL
security over their information.
A. Resource Pooling C. XML
562. is a technique in which a complete in- 567. A regular computer, using a web browser
stallation of one machine is run on another to connect to the cloud.
NARAYAN CHANGDER
C. Community-as-a-Service
573. In which category of SaaS does CRM soft- D. Public-as-a-Service
ware fall?
579. Not a Service Model.
A. Consumer Services
A. IaaS
B. Communication Services
B. Azure
C. Infrastructure Services
C. PaaS
D. Business Services
D. SaaS
574. Cloud providers ensure that data files are
stored online. 580. Application frameworks provide a means
for creating hosted applications using
A. temporarily IDE.
B. permanently A. PaaS
C. synchronized B. SaaS
D. duplicated C. CaaS
575. A is an instance of a program execu- D. All of the mentioned
tion
581. Highest milestone of MLSA
A. Thread
A. New
B. Process
B. Beta
C. Operating System
C. Gold
D. Block
D. Platinum
576. Which type of cloud is highest in the
582. The need for data replication can arise in
sky?
various scenarios like
A. Cirrus
A. Replication Factor is changed
B. Cumulus
B. DataNode goes down
C. Stratus
C. Data Blocks get corrupted
D. none of above
D. All of the mentioned
577. is the example for accounting soft- 583. The ‘Cloud’ refers to resources and on-
ware in Cloud line storage that can be accessed on a
A. Zoho Books scale.
B. Quick Books A. Local
B. Global B. Distributed
C. Regional C. Spiral
NARAYAN CHANGDER
lation
A. WSDL D. Passthrough and bridge connection
B. SCDL
600. The universal storage space unit mapped
C. XML to the host in the disk array is ( ), which is
D. None of the mentioned the logical space created based on RAID.
A. Storage pool
595. How do you access online accounts?
B. Volume
A. Access via internet browser, then en-
ter username and password C. LUN
B. Log into account D. Partition
604. Which of the following option describes 610. Which of the following google product
the most common AWS billing model? sends you periodic email alerts based on
your search term?
C. dhcpd
B. Cloud relying on different technologies
D. auditd
606. Which of the following is the correct full C. combination of private and public
form of SaaS? Cloud
A. Storage-as-a-Service
D. Cloud offering IaaS, PaaS, and SaaS
B. Software-as-a-Service
C. Server-as-a-Software 612. The is the collection of servers where
the application to which you subscribe is
D. None of the above housed.
607. HDFS is implemented in programming A. datacenter
language
B. server
A. C++
C. internet
B. Java
C. Scala D. intranet
615. What are the challenge in SaaS Implemen- 620. What is it called when you work for a
taion? company from home?
A. Not knowing what they are agreeing to A. Teleconfrencing
B. Commuting
B. Not having a service level agreement C. TeleCommuting
C. Not knowing how their SaaS service D. The Daily Grind
provider performs and what state they are
621. The cloud infrastructure is operated
NARAYAN CHANGDER
in
for the exclusive use of an organization.
D. All the above
A. Public
616. Customer Relation Management is a B. Private
SaaS category C. Community
A. Packaged software D. All of the mentioned
B. Collaborative software
622. . refers to the location and management
C. Enabling and management tools of the cloud’s infrastructure.
D. None of the above A. Service
B. Deployment
617. Purchasing an asset (factory, computer
system, company car) is considered a C. Application
NARAYAN CHANGDER
638. . offering provides the tools and develop- C. None of these
ment environment to deploy applications D. none of above
on another vendor’s application.
A. PaaS 644. Which of them is not a Cloud Service
Model?
B. IaaS
A. SaaS
C. CaaS
B. DaaS
D. All of the mentioned
C. IaaS
639. Windows Azure and Force.com are exam-
ple of? D. PaaS
A. PaaS 645. allow you to virtualize your servers
B. SaaS so that multiple virtual servers can run on
C. IaaS one physical server
648. scales up/down the compute re- 653. Which of the following is a repeatable
sources based on the demand task within a business process?
NARAYAN CHANGDER
D. 1
B. Virtual machine availability sets
665. Which of these is not a component of com-
C. Virtual machine availability zones
putational thinking?
D. none of above
A. Abstraction
660. What types of storage services does Mi- B. Memory
crosoft Azure offer?
C. Decomposition
A. Blob, queue & table storage
D. Pattern Recognition
B. Implicit, table storage & blob
666. Resources are centralized amongst the
C. Table storage, semantic & blob various branches of an organization in a
D. Queue, blob & implicit cloud.
661. What does RRS stand for when referring A. Public cloud
to the storage option in Amazon S3 that of- B. Hybrid cloud
fers a lower level of durability at a lower C. Private cloud
storage cost?
D. Community cloud
A. Reduced Reaction Storage
B. Redundant Research Storage 667. How many bits are needed to represent
128 values?
C. Regulatory Resources Storage
A. 6
D. Reduced Redundancy Storage
B. 7
662. An address is a static, public IPv4 ad- C. 8
dress designed for dynamic cloud comput-
D. 9
ing.
A. Public IP 668. is the example for IaaS
B. Private IP A. EBS
C. Automatic IP B. EC2
D. Elastic IP C. RDS
D. Docker
663. Amazon Elastic Compute Cloud (EC2) is
primarily considered which type of cloud 669. Which of the following area of cloud com-
computing model? puting is uniquely troublesome?
A. Software as a service (SaaS) A. Auditing
B. Platform as a service (PaaS) B. Data integrity
C. e-Discovery for legal compliance 675. Which data may not be suitable for public
D. All of the mentioned clouds?
672. Can Amazon EC2 have an Amazon Re- B. Click New, Folder upload
source Name (ARN)? C. Drag files into the Drive window
A. No, because EC2 is unrelated to ARN D. You can use any of these methods to
B. No, because you can’t specify a partic- upload files to Google Drive
ular Amazon EC2 resource in an IAM pol- 678. Which types of issues are associated
icy with the SaaS?
C. Yes A. Modest software tools
D. Yes, just for certain kind of EC2 in- B. Multitenant solutions
stances
C. Centralized management and data
673. In which environment do admins have the D. Network dependence
most control over cloud app security?
A. PaaS 679. Mention the categories of SaaS
681. is called as the sum of all direct and 686. What is the name of the organization
indirect costs of the organization helping to foster security standards for
cloud computing?
A. Return on investment
A. Cloud Security Standards Working
B. Total Cost of ownership
Group
C. Profit & Loss
B. Cloud Security Alliance
D. None of the above C. Cloud Security WatchDog
NARAYAN CHANGDER
682. Users are able to provision cloud comput- D. Security in the Cloud Alliance
ing resources without requiring human in-
teraction. 687. Which of the following is the most refined
and restrictive cloud service model?
A. On-demand self-service
A. IaaS
B. On demand action
B. PaaS
C. Self service console
C. SaaS
D. Automated service D. XaaS
683. means that when a user makes a 688. cloud is one where the cloud has been
change to a file this change will appear in organized to serve a common function or
the versions used by others purpose.
A. Synchronization A. Public
B. Upload B. Private
C. Real time processing C. Community
D. none of above D. All of the mentioned
A. Private DNS C. 3
B. Private IP D. 4
A. 1 C. Gmail
B. 2 D. AmazonEC2
702. Which one of the following is a kind 707. Which is not a cloud computing plat-
of technique that allows sharing the sin- form?
gle physical instance of an application or
A. GCP
the resources among multiple organiza-
tions/customers? B. CloudU
A. Virtualization C. Microsoft Azure
B. Grid Computing
D. AWS
C. SOA
NARAYAN CHANGDER
D. Utility Computing 708. Which type of cloud is owned and used
by single organization over a private net-
703. What does HDFS mean? work?
A. Hadoop Distributed File System ( HDFS
A. Public cloud
)
B. Hide Distributed File System ( HDFS ) B. Private cloud
C. Hadoop Distributed File Software ( C. Both public and private cloud
HDFS )
D. None of the above
D. none of above
709. is newer than Apache, being fast and
704. Having things like photos saved onto
using less memory
your cloud as well as your device is known
as what A. Linux Web Server
A. Synchronisation B. NGINX
B. Matchification
C. TOMCAT
C. Updating
D. IIS
D. Backing up
705. The capability provided to the consumer 710. which of the following do you believe
is to deploy onto the cloud infrastructure would be the number one concern about
consumer-created applications is called cloud computing?
A. too expensive
A. SaaS
B. security concerns
B. PaaS
C. too many platforms
C. IaaS
D. None of the above D. accessibility
706. A type of wireless network that does not 711. What extra things can you do on Cloud
rely on fixed hardware such as routers in Computing?
a wired network is known as a what?
A. Use your computers in any whether
A. A riff raff network
B. Share Files
B. An ad hoc network
C. A Wi-Fi network C. It does your work for you
D. A DIT network D. none of above
712. Amazon S3 offers encryption services for 718. What are the risks of cloud computing?
A. No troubleshooting issues
723. What type of computing technology 728. What type of clouds are called “fair
refers to services and applications that weather clouds” and look like floating cot-
typically run on a distributed network ton?
through virtualized resources? A. Cumulus
A. Distributed Computing B. Stratus
B. Cloud Computing C. Nimbus
C. Soft Computing D. Cumulonimbus
NARAYAN CHANGDER
D. Parallel Computing 729. Why can Cloud Computing sometimes pro-
vide better performance?
724. The term “IDaaS” stands for? A. specialisation of the technology
A. Interoperability-as-a-Service B. less friction on the Internet
B. ID-as-a-Service C. no need to worry about security
C. Intranet-as-a-service D. serving a single user
734. For every additional symbol added to the 739. Which of the following can be referred
length of your password what happens? to the location and management of the
cloud’s infrastructure?
744. Which of the following is operational do- 750. How is private cloud hosted
main of Cloud Security Alliance? A. Internally
A. Scalability B. Externally
B. Portability and interoperability C. Both internally and externally
C. Flexibility D. none of above
D. None of the mentioned
751. How cost saving could be done in cloud?
NARAYAN CHANGDER
745. WSDL Stands for A. Storing data online
A. None of these B. Publishing application online
B. Web Services Description Language C. Hosting database online
C. Web Services Design Language D. All the above
D. Web Services Development Language 752. ROI stands for ( in Cloud terms)
746. Which of the following can be considered A. Rate of Interest
PaaS offering? B. Return on Investment
A. Google Maps C. Risk of Incident
B. Gmail D. Response on Incident
C. Google Earth
753. It is made up of a single organization
D. All of the mentioned with its own cloud of servers and software
for use without a public access point. This
747. CSP ensures the seemless delivery of ser-
belongs to:
vices through
A. public cloud
A. Policies
B. private cloud
B. Service Level Agreement
C. cloud hybrid or community
C. Email
D. none of above
D. Payment
754. In private cloud customer control
748. Other catalysts of Cloud Computing are
A. Applications, data, OS, Virtualization,
Servers, Stroage, Networking
A. Distributed computing
B. Applications, data, OS
B. Parallel computing
C. Virtualization, Servers,
C. Ubiquitous computing
D. Networking
D. All the above
755. Which of the following is NOT a potential
749. Managed IT services are based on the risk of Cloud Computing?
concept of?
A. security and legal issues
A. Virtualization B. lock-in
B. SOA C. cross-over risks from other customers
C. Grid Computing
D. Utility Computing D. dependance on physical location
756. Amazon web service is which type of 761. This is a software distribution model in
cloud computing distribution model? which applications are hosted by a vendor
or service provider and made available to
766. Which of the following Computer Tools D. All the above mentioned
are “Cloud Computing” resources:
772. Most of the cloud architectures are built
A. Google Drive on this type of architecture.
B. Ubuntu One A. skeleton
NARAYAN CHANGDER
C. deviant B. grid
D. microsoft office C. linear
767. Amazon EBS volumes can be maximized D. template
up to?
773. is the default Partitioner for parti-
A. 1TB tioning key space.
B. 2TB A. HashPar
C. 3TB B. Partitioner
D. 4TB C. HashPartitioner
768. Web services communicate using D. None of the mentioned
A. None of these 774. is the U.K government cloud program
B. Open protocols A. G-Cloud
C. Close protocols B. Amazon Web Services
D. Open-Close protocols C. MS Azure
769. Which of the following provide system re- D. G-Guite
source access to virtual machines?
775. A acts as an intermediary that pro-
A. VMM
vides connectivity and transport of cloud
B. VMC services between cloud consumers and
C. VNM cloud providers.
D. All of the mentioned A. cloud carrier
B. cloud provider
770. is a set of solution and products
which includes GCP & G suite C. cloud broker
A. Google Cloud D. cloud auditor
B. VMWARE 776. A computer that stores and shares infor-
C. AZURE mation with other computers on a network
is called a
D. AWS
A. Personal Computer (PC)
771. Which one of the following a technology
works behind the cloud computing plat- B. Network
form? C. Data Center
A. Grid Computing D. Server
788. What are the main components of 791. AWS Free Usage tier can use up to
Hadoop Ecosystem? per month of t2.micro instances running
Microsoft Windows Server for free
A. MapReduce, HDFS, YARN
A. 750 hours
B. MLlib, GraphX
B. 720 hours
C. Gelly, Table, CEP
C. 700 hours
D. None of the mentioned
D. 780 hours
NARAYAN CHANGDER
789. Which is a characteristic of a Type 1 hy- 792. Which of these companies specializes in
pervisor? cloud computing management tools and
A. works within a host OS services?
NARAYAN CHANGDER
ecuting VBScript? 23. What is the correct HTML for creating a
A. Internet Explorer hyperlink?
B. Mozilla Firefox A. <a href=”http://www.facebook.com”>Facebook</a>
C. Opera
D. None of these B. <a>http://www.facebook.com</a>
C. change-font-color:green; C. Weekday
D. fontcolor=green; D. Now
27. What is missing from this HTML skeleton? A. provides the web browser with secu-
<!DOCTYPE html><html><body></body></html> rity information
C. Canvo D. None
NARAYAN CHANGDER
B. FTP C. Active Source Pages
C. DOM D. Active Server Procedure
D. Canvas 44. Where in the HTML document is the cor-
rect location to insert code to link to your
39. tag is used to give heading to the
external CSS?
whole table.
A. In the <head> section
A. Header
B. In the <body> section
B. Meta
C. At the very end of the document
C. Font
D. At the very beginning of the document
D. Caption
45. Type a word into the computer program
40. Which code is correct for creating
that allows people to look for particular
Textbox?
information to find a web site.
A. <input type=”textbox” id=”fname”
A. search engine
name=”fname”>
B. http
B. <input type=”text” id=”fname”
name=”fname”> C. website
C. <input type=”textfield” id=”fname” D. meta tag
name=”fname”>
46. HTML
D. <input type=”textarea” id=”fname”
name=”fname”> A. a word/image that you can click on to
navigate
41. is a program running on the server ma- B. a computer language used to make
chine, which accepts requests from a Web web sites
browser and sends back results in the form
of HTML documents. C. a collection of related Internet pages
C. Reset C. Geolocation
D. Submit D. Canvas
C. Invert B. Telnet
C. Uniform Resource Locator
D. Inversed
D. Web Address
52. An effective web design has both great de-
sign and great content. 58. Which is the one of the frame tags at-
tributes?
A. Proximity
A. Longdesc
B. Content
B. Vlink
C. Promotion
C. alink
D. Layout
D. Framespacing
53. A general term used to describe the combi-
59. Where to Put the VBScript code
nation ofHTML, script, styles and the Doc-
ument Object Model(DOM) that provides A. Head section
Web page interactivity. B. Body Section
A. Function C. Both body and head section
B. DHTML D. None of these
60. Which of the following tag is used to mark 66. Which element is not part of Form tag?
a begining of paragraph? A. <Input>
A. <td> B. <select>
B. <br> C. <textarea>
C. <p> D. <textbox>
D. <tr>
67. The text used in webpage codes that pro-
61. More people are using their phones or vide information to search engines gives
NARAYAN CHANGDER
other devices to browse the web us high search rankings.
A. Mobile Friendly A. hyperlink
B. User Friendly B. meta tag
C. Easy to Use C. web host
D. Device Friendly D. none of above
62. In order to connect to ISP server, you need 68. specifies the distance between the
edge of table cells and their content.
A. Hand Gloves
A. Cellspacing
B. Printer
B. Rowspan
C. User Name and Password
C. Colspan
D. None of the above
D. Cellpadding
63. Class selector is defined with
69. The company’s text and sym-
A. # bols that form a web address is
B. * http://tbbrownincorp.com.
C. . A. meta tag
D. {} B. URL
C. search engine
64. Website
D. web host
A. a computer language used to make
web sites 70. VBScript is an
B. a collection of related Internet pages A. Active Scripting Language
C. a program that lets you look at web B. Passive Scripting Language
pages C. Both Active and Passive Scripting Lan-
D. a word/image that you can click on to guage
navigate D. None
65. What are shared on the Internet and are 71. Which language is used for creating Web
called as Web pages? Pages?
A. Programs A. PASCAL
B. Cables B. C
C. Microwaves C. JAVA
D. Hypertext documents D. HTML
72. What is the difference between the Sub C. All of the above
procedure and Function procedure? D. None of these
73. Which is not client side scripting lan- 79. An HTML extension used to provide
guage? location-basedservices.
A. Vbscript A. Function
B. DHTML
B. Javascript
C. Geolocation
C. Java
D. Canva
D. None of these
80. Which loop is used to iterate till a condition
74. How to load the webpage without reload- becomes true?
ing the server
A. For Next loop
A. Using jsp
B. For Each Next loop
B. Servelet
C. Do While loop
C. Using Ajax
D. Do Until loop
D. Using javabean
81. A stand-alone, reusable segment of pro-
75. A Procedure can have: gram code that isnot part of an object.
A. a declaration part A. Function
B. an executive part B. DHTML
C. both a & b C. Run file
D. none of the above D. RTF
76. the attribute to specify the number of 82. What is Web 1.0
visible values in listbox A. static
A. option B. still
B. Selected C. Personal
C. Maxvisible D. Nothing
D. size 83. What does a class do?
77. Which of these are math functions avail- A. adds color to words
able in VBScript B. adds style to specific elements
A. Abs C. adds style to a whole page
B. Array D. adds a lot more work
84. it has the power to communicate messages 90. effect adds a glowy effect around an
and evoke emotional responses. object.
A. Hue A. Glow
B. Color B. Glower
C. Photo C. Glowy
D. none of above D. All the above
NARAYAN CHANGDER
85. Web browser 91. The ability to use the DOM and discover
particularaspects of a user agent.
A. a collection of related Internet pages
A. Object oriented
B. a computer language used to make
web sites B. Web application
C. a program that lets you look at web C. Browser detection
pages D. Compiler
D. a word/image that you can click on to 92. the way finding system used on websites.
navigate
A. Location
86. VBScript was launched in B. Navigation
A. 1995 C. Transportation
B. 1996 D. none of above
C. 1994
93. You can click this button to start reloading
D. 1997 that particular webpage or site.
87. Which of the following is a CSS style rule? A. Stop button
A. Predictor B. Forward button
B. Selector C. Back button
C. Initializer D. Refresh button
D. All of the above 94. are used to determine the style and
layout of web pages.
88. What does CSS stand for?
A. CSS
A. Creative Style Sheets
B. DOM
B. Cascading Style Sheets
C. IRM
C. Colorful Style Spread
D. All of the Above
D. Computer Style Spread
95. A W3C standard that specifies the way ob-
89. HTML document saved with extension jects aremanipulated through script.
A. .http A. DOM
B. .html or .htm B. API
C. .aspx C. POP
D. .asp D. HTML
96. Choose the correct HTML element for the 102. Which of the following is the correct CSS
largest heading: link tag?
NARAYAN CHANGDER
108. Which of these elements are all <table> B. Tags
elements?
C. Web Pages
A. <table><tr><tt>
D. HTML elements
B. <table><td><body>
114. Which program is used by web clients to
C. <table><tr><td>
view the web pages?
D. <table><title><thead>
A. Search Engine
109. Hyperlink B. Protocol
A. a connection of Internet related pages C. Web browser
D. Web server
B. a program that lets you look at web
pages 115. GIF is the abbreviation for
C. a word/image that you can click on to A. Graphics Interchange Format
navigate B. Graphics Instruction Format
D. a computer language used to make
C. Graphics Item Format
web sites
D. Graphics Information Format
110. Which VBScript function can compare two
strings? 116. Choose correct code for creating a pass-
word textbox?
A. StringCompare
A. <input type=“pass” name=“t2”>
B. Compare
B. <input type=“password” name=“t2”>
C. StrComp
D. StrCompare
C. <input type=“Invisible” name=“t2”>
111. Which of the following is a feature of
DHTML? D. <input type=“Hidden” name=“t2”>
A. Real Time Positioning
117. How to return a value from a function in
B. Data Binding VBScript?
C. . Dynamic Fonts A. Using return keyword
D. All the Above B. Assign the value to the function name
112. should be legible and only use a maxi- itself
mum of 3 different fonts on the website. C. Both of the above
A. Typography D. None of the above
118. The bar that used to open a web site C. A and B are correct
known as D. None of these
B. Web A. <ul>
D. HTML C. <list>
D. <dl>
120. Which of the following transitions are
supported by Internet Explorer 4.0? 126. is used to specify a style for single
A. Reveal transition filter unique element.
D. None C. Comments
D. None of the above
121. The arrangement of elements is order of
importance. 127. The defines a file-select field and a
A. Composition “Browse” button for file uploads.
123. The command used in VB Script for writ- 129. This button lets you go back to the home
ing some text on a page is page of the browser window
A. document.write() A. Forward button
B. Msgbox B. Close button
C. Home button 131. Is the text that you type into your inter-
D. Favorite button net browser when you want to go to a
website
130. What property changes the border for an
image/table? A. URL
A. border: B. RPM
B. border-size:
C. PPM
C. border-color:
NARAYAN CHANGDER
D. none of above D. RUL