0% found this document useful (0 votes)
7 views

001 EAMPC-COMPUTER SCIENCE

The document is an examination paper for Aditya Degree Colleges in Andhra Pradesh, focusing on computer science topics. It includes multiple choice questions, fill in the blanks, short answer questions, matching, and true/false statements related to computer components, internet terminology, and security. The total marks for the paper are 30, with a duration of 1 hour.

Uploaded by

rao.jnv.06
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

001 EAMPC-COMPUTER SCIENCE

The document is an examination paper for Aditya Degree Colleges in Andhra Pradesh, focusing on computer science topics. It includes multiple choice questions, fill in the blanks, short answer questions, matching, and true/false statements related to computer components, internet terminology, and security. The total marks for the paper are 30, with a duration of 1 hour.

Uploaded by

rao.jnv.06
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

ADITYA DEGREE COLLEGES :: ANDHRA PRADESH

Essentials And Applications Of Mathematical, Physical And Chemical Sciences

Time : 1 Hrs. Max. Marks: 30 M

PART – B (COMPUTER SCIENCE)


SECTION-F
I Multiple Choice Questions 10x1=10M
1. The main electronic component used in first generation computers was [ ]
a) Transistors b) Vacuum Tubes and Valves
c) Integrated Circuits d) None of above
2. Magentic disk is an example of [ ]
a) Secondary memory b) Primary memory
c) Main memory d) Both 1 & 2
3. http stands for [ ]
a) hypertext transfer protocol b) hypertext transmission protocol
c) high transfer transport protocol d) hyper transfer text protocol
4. What is the full form of WWW? [ ]
a) World Wide Web b) World With Web
c) Work Wide Web d) World Wide Wet
5. Which one of the following is a type of antivirus program ? [ ]
a) Quick heal b) Mcafee
c) Kaspersky d) All of the above
6. Hackers usually used the computer virus for _____ purpose. [ ]
a) To log, monitor each and every user’s stroke
b) To gain access the sensitive information like user’s Id and Passwords
c) To corrupt the user’s data stored in the computer system
d) All of the above
7. UNIVAC is [ ]
a) Universal Automatic Computer b) Universal Array Computer
c) Unique Automatic Computer d) Unvalued Automatic Computer
8. What is the Internet ? [ ]
a) a single network
b) a vast collection of different networks
c) Interconnection of local area networks
d) None of the mentioned
9. Integrated Circuits (Ics) are related to which generation of computers. [ ]
a) First generation b) Second generation
c) Third generation d) Fourth generation
10. A computer ____________ is a malicious code which self – replicates by
copying itself to other programs. [ ]
a) Program b) Virus c) Application d) Worm

SECTION – G
II Fill in the Blanks 5x1=5M
1. A string of 8 bits is ________________
2. ROM stands for ___________________
3. _______________ are objectives of network security.
4. The program and languages used by the computer are called ____________.
5. The four basic functions performed by the computer are _______________.
SECTION – H
III Answer the following Short Questions 5x1=5M
1. What is E-mail ?

2. What is a gateway ?

3. What is a Modem ?

4. What is URL ?

5. What is a Web browser ?

SECTION – I
III Match the following 5x1=5M

1. A. Punch Card ( ) a) Unique set of 4 numbers


B. Joy Stick ( ) b) Phonebook of Internet
C. DNS ( ) c) 1976
D. IP Address ( ) d) Computer games
E. Apple I ( ) e) Hollerith code

SECTION – J
IV True (or) False 5x1=5M

1. A terabyte is equal to 1 million gigabytes. ( )


2. Remote browser access is used to avoid browser-based hacking. ( )
3. A SD card is an output device. ( )
4. ROM is volatile. ( )
5. Data encryption is primarily used to ensure confidentiality. ( )

You might also like