0% found this document useful (0 votes)
4 views

Computer Fundamentals Questions and Answers Part 4

The document contains multiple choice questions and answers related to computer fundamentals, focusing on topics such as transmission modes, modulation techniques, multiplexing, network topologies, internetworking, and the history of the internet. It provides definitions, explanations, and examples for various concepts like simplex, half duplex, full duplex transmission modes, and different types of multiplexing techniques. Additionally, it covers network configurations and the evolution of the internet, including the significance of ARPANET.

Uploaded by

souvikjana1027
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views

Computer Fundamentals Questions and Answers Part 4

The document contains multiple choice questions and answers related to computer fundamentals, focusing on topics such as transmission modes, modulation techniques, multiplexing, network topologies, internetworking, and the history of the internet. It provides definitions, explanations, and examples for various concepts like simplex, half duplex, full duplex transmission modes, and different types of multiplexing techniques. Additionally, it covers network configurations and the evolution of the internet, including the significance of ARPANET.

Uploaded by

souvikjana1027
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 65

Computer Fundamentals Questions and Answers – Transmission Modes

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Transmission Modes”.

1. A term that defines the direction of flow of information between devices.


a) interconnectivity
b) intra connectivity
c) transmission mode
d) transmission
View Answer

Answer: c
Explanation: The term transmission mode defines the direction of flow of information between two
communication devices. It tells the direction of signal flow.

2. Transmission mode controls the direction of signal flow.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. The term transmission mode defines the direction of flow of
information between two communication devices. It tells the direction of signal flow between two
devices.

3. Which of the following isn’t a type of transmission mode?


a) physical
b) simplex
c) full duplex
d) half duplex
View Answer

Answer: a
Explanation: There are three modes of transmission: simplex, half duplex and full duplex.
Transmission modes tell the direction of signal flow between two devices.

advertisement

4. A transmission that generally involves dedicated circuits.


a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer

Answer: a
Explanation: The answer is simplex. Simplex generally involves dedicated circuits. TV broadcasting is
an example.

5. A transmission mode that can transmit data in both the directions but transmits in only one
direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer

Answer: b
Explanation: The half duplex mode supports two way traffic but only in one direction at a time. The
interactive transmission of data within a time sharing system may be best suited to half-duplex lines.

6. A communication between a computer and a keyboard involves ____________ duplex


transmission.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer

Answer: a
Explanation: It involves simplex duplex transmission. Another example of a simplex duplex
transmission is loudspeaker system.

7. Telephone networks operate in this mode.


a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer

Answer: c
Explanation: Telephone networks operate in full duplex mode. It can transmit data in both the
directions.

8. Fire alarms are based on this type of transmission:


a) direct
b) network
c) analog
d) multiple
View Answer

Answer: c
Explanation: Analog transmission is a technique of transmitting voice, data, image, signal or video
information. Fire alarm systems work in the same way.

9. A technique of transmitting data or images or videos (information) using a continuous signal.


a) direct
b) network
c) analog
d) multiple
View Answer
Answer: c
Explanation: Analog is a technique of transmitting data or images or videos (information) using a
continuous signal, which varies in amplitude, phase or some other property.

10. A walkie-talkie operates in ____________


a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer

Answer: b
Explanation: A walkie-talkie operates in half duplex mode. It can only send or receive a transmission
at any given time.

Computer Fundamentals Questions and Answers – Modulation Techniques

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Modulation Techniques”.

1. A coaxial cable has a bandwidth of _________ of megahertz.


a) 100
b) 150
c) 1000
d) 10000
View Answer

Answer: a
Explanation: A coaxial cable has a bandwidth of 100’s of Mhz. Baseband speed is in a few KHz.
Multiplexing improves channel bandwidth utilization.

2. In TDM, the samples occupy adjacent time slots.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. The TDM technique is based on sampling and they occupy
adjacent slots and are transmitted in a sequence.

3. The carrier wave is a _________


a) tan wave
b) cosec wave
c) sine wave
d) cot wave
View Answer

Answer: c
Explanation: The carrier wave is generally a sine wave. Carrier wave is used to transfer the signal
from source to destination.

advertisement
4. Controlling the phase is referred as __________
a) modulation
b) half modulation
c) amplitude modulation
d) phase modulation
View Answer

Answer: d
Explanation: It is referred to as phase modulation. When there is a change in amplitude, it is referred
to as amplitude modulation.

5. A transmission mode that can transmit data in both the directions but transmits in only one
direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer

Answer: b
Explanation: The half duplex mode supports two way traffic but only in one direction at a time.

6. A multiplexing technique based on sampling.


a) FDM
b) TDM
c) SDM
d) FM
View Answer

Answer: b
Explanation: TDM which stands for Time division multiplexing is based on sampling which is a
modulation technique.

7. An example of FDM:
a) broadcast radio
b) telephone
c) machines
d) semi-duplex
View Answer

Answer: a
Explanation: Broadcast radio is an example of FDM. This allows several messages to be translated
from baseband.

8. FDM stands for?


a) Frequency Division Multiplexing
b) Frequency Dependent Multiplexing
c) Frequency Diverged Multiplexing
d) Frequency Derived Multiplexing
View Answer
Answer: a
Explanation: FDM stands for Frequency Division Multiplexing. This allows several messages to be
translated from baseband, where they are all in the same frequency.

9. A modulation technique that improves channel bandwidth utilization.


a) direct
b) modulation
c) demodulation
d) multiplexing
View Answer

Answer: d
Explanation: Multiplexing is a modulation technique that improves channel bandwidth utilization.

10. The purpose of communication system is to transfer information from _______ to the
destination.
a) user
b) source
c) system
d) station
View Answer

Answer: b
Explanation: The answer is source. A communication system transfers information from source to the
destination.

Computer Fundamentals Questions and Answers – Multiplexing

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Multiplexing”.

1. WDM stands for?


a) Wave division multiplexing
b) Wavelength division multiplexing
c) Wavelength dependent multiplexing
d) Wave dependent multiplexing
View Answer

Answer: b
Explanation: It stands for Wavelength division multiplexing. It has same general architecture as FDM.
FDM is frequency division multiplexing.

2. In TDM, the samples occupy adjacent time slots.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. The TDM technique is based on sampling and they occupy
adjacent slots and are transmitted in a sequence.

3. In this type of multiplexing time slots are preassigned to sources and fixed.
a) TDM
b) Synchronous TDM
c) Asynchronous TDM
d) FDM
View Answer

Answer: b
Explanation: TDM is time division multiplexing. Data rate of medium exceeds data rate of digital
signal to be transmitted.

advertisement

4. Controlling the frequency is referred as _________


a) frequency modulation
b) hertz modulation
c) amplitude modulation
d) phase modulation
View Answer

Answer: a
Explanation: It is referred to as frequency modulation. When there is a change in frequency, it is
referred to as frequency modulation.

5. A technique that can be a solution to the problem of synchronizing data sources.


a) framing
b) data link control
c) full link control
d) pulse stuffing
View Answer

Answer: d
Explanation: Pulse stuffing is a technique that can be a solution to the problem of synchronizing data
sources. In pulse stuffing, the outgoing data rate is higher than sum of incoming rates.

6. For voice, each channel contains a ___ word of digitized data.


a) 2
b) 1
c) 0
d) 4
View Answer

7. Many time slots are wasted in __________


a) TDM
b) Synchronous TDM
c) Asynchronous TDM
d) FDM
View Answer

Answer: b
Explanation: In Synchronous TDM, many time slots are wasted. Other techniques can help overcome
this problem.
8. A technique that allocates time slots dynamically.
a) TDM
b) WDM
c) Dynamic TDM
d) Statistical TDM
View Answer

9. A system in which two channels are dedicated to transfer data.


a) TV
b) Cable
c) Modem
d) Cable modem
View Answer

Answer: d
Explanation: A cable modem has two dedicated channels from cable TV provider dedicated to data
transfer. One in each direction.

10. In this technique, there is a link between subscriber and network and a local loop.
a) SSDL
b) DSDL
c) ASDL
d) TSDL
View Answer

Answer: c
Explanation: In ASDL, there is a link between the subscriber and the network. It uses currently
installed twisted pair cable.

Computer Fundamentals Questions and Answers – Network Topologies

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Network Topologies”.

1. A topology that is responsible for describing the geometric arrangement of components that make
up the LAN.
a) Complex
b) Physical
c) Logical
d) Incremental
View Answer

Answer: b
Explanation: It is referred to as a physical LAN topology. LAN stands for Local Area Network.

2. Bus is a type of topology.


a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Bus topology is an arrangement where all nodes are
interconnected using a single-cable.

3. _____ LAN topology describes the possible connections between pairs of networked end-points
that can communicate.
a) Complex
b) Physical
c) Logical
d) Incremental
View Answer

Answer: c
Explanation: A logical LAN topology describes the possible connections. LAN stands for Local Area
Network.

advertisement

4. A term that refers to the way in which the nodes of a network are linked together.
a) network
b) topology
c) connection
d) interconnectivity
View Answer

Answer: b
Explanation: Topology is a term that refers to the way in which the nodes are connected. There are 4
major topology networks.

5. A network comprising o multiple topologies.


a) Complex
b) Hybrid
c) Bus
d) Star
View Answer

Answer: b
Explanation: A hybrid network consists of multiple topologies. It can comprise a ring, a star and other
topologies. We call this arrangement as a hybrid network.

6. The participating computers in a network are referred to as:


a) Clients
b) Servers
c) Nodes
d) CPUs
View Answer

Answer: c
Explanation: They are referred to as the nodes. There are several topologies designed for
arrangements of these nodes like bus, star, etc.
7. A topology that involves Tokens.
a) Star
b) Ring
c) Bus
d) Daisy Chaining
View Answer

Answer: b
Explanation: Ring topology involves sending and receiving of data with the help of tokens. Ring
started out as a simple peer-to-peer LAN topology.

8. A ____________WAN can be developed using leased private lines or any other transmission
facility
a) Hybrids
b) peer-to-peer
c) Two-tiered
d) Three-tiered
View Answer

Answer: b
Explanation: A peer-to-peer WAN topology is a relatively simple way of interconnecting a small
number of sites. It has the least-cost solution for WANs that contain a small number of
internetworked locations.

9. A serially connected system of all the hubs of networks.


a) Bus
b) Ring
c) Daisy chains
d) Star
View Answer

Answer: c
Explanation: The correct option is Daisy chain. This simple approach uses ports on existing hubs for
interconnecting the hubs.

10. A piece of information which is sent along with the data to the source computer.
a) data
b) module
c) token
d) element
View Answer

Answer: c
Explanation: Token is the information that is sent to the source computer along with the data. This
token is then passed to the next node.

Computer Fundamentals Questions and Answers – Internetworking

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Internetworking”.
1. Configuration where many independent computer systems are connected.
a) Complex
b) Distributed
c) Cloud
d) Incremental
View Answer

Answer: b
Explanation: Distributed configuration has many systems connected, and messages, programs, etc
are transmitted between cooperating computer systems.

2. Partial mesh is a highly flexible topology that can take a variety of very different configurations.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. Partial mesh is a highly flexible topology that can take a variety of
very different configurations. The routers are tightly coupled than the basic topologies. But they are
not fully interconnected, as would be the case in a fully meshed network.

3. Components used for interconnecting dissimilar networks that use different communication
protocols.
a) Switches
b) Gateways
c) Routers
d) Bridges
View Answer

Answer: b
Explanation: Gateways are used for this purpose. Gateways interconnect dissimilar networks,
protocol conversion is performed by them.

advertisement

4. A topology is a modified version of the basic star topology.


a) network
b) two-tiered
c) bus
d) ring
View Answer

Answer: b
Explanation: A two-tiered topology is a modified version of the basic star topology. Rather than single
concentrator routers, two or more routers are used.

5. WANs that need to interconnect a very large number of sites.


a) bus
b) two-tiered
c) three-tiered
d) ring
View Answer
Answer: c
Explanation: Wide Area Networks that need to interconnect a very large number of sites, or are built
using smaller routers that can support only a few serial connections, may find the two-tiered
architecture insufficiently scalable.

6. Components that operate at the network layer of the OSI model.


a) Switches
b) Servers
c) Routers
d) Gateways
View Answer

Answer: c
Explanation: They are referred to as the routers. They are used for interconnecting those networks
that use the same high-level protocols above network layer.

7. A topology that involves Tokens.


a) Star
b) Ring
c) Bus
d) Daisy Chaining
View Answer

Answer: b
Explanation: Ring topology involves sending and receiving of data with the help of tokens. Ring
started out as a simple peer-to-peer LAN topology.

8. ____________ operate at bottom two layers of the OSI model.


a) Bridges
b) Switches
c) Models
d) Modules
View Answer

Answer: a
Explanation: Bridges operate at the bottom two layers of the OSI model. It connects networks that
use the same communication protocols above data-link layer.

9. Connecting two or more networks to form a single network is called :


a) Internetworking
b) Intranetworking
c) Interconnecting
d) Intraconnectivity
View Answer

Answer: a
Explanation: Connecting two or more networks to form a single network is called internetworking
and the resultant network is called internetwork.

10. OSI stands for?


a) Open Site Interconnection
b) Open System Interdependence
c) Open System Interconnection
d) Open Site Interdependence
View Answer

Answer: c
Explanation: OSI is open system interconnection. It is a framework for defining standards for linking
heterogeneous computers in a packet switched network.

Computer Fundamentals Questions and Answers – The History of Internet

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “The
History of Internet”.

1. ARPANET stands for?


a) Advanced Research Project Agency Network
b) Advanced Research Programmed Auto Network
c) Advanced Research Project Automatic Network
d) Advanced Research Project Authorized Network
View Answer

Answer: a
Explanation: ARPANET stands for Advanced Research Project Agency Network. It was developed in
late 1960s under ARPA (Advanced Research Projects Agency).

2. Internet can help you find the shortest route.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. Obviously, Internet is so widespread; it can help us in all the
possible ways. It can predict the weather, play music, etc.

3. In this technique, there is no direct contact between users and their programs during execution.
a) Time Sharing
b) Batch Processing
c) System Processing
d) Message Passing
View Answer

Answer: b
Explanation: In the Batch Environment, there is no direct interaction between users and their
programs during execution.

advertisement

4. A technique that marked the beginning of computer communications.


a) Batch Environment
b) Message passing
c) User Environment
d) Time Sharing
View Answer
Answer: d
Explanation: The answer is time sharing. In time sharing, Users were able to interact with the
computer and could share its information processing resources.

5. A type of technique in which dumb terminals are connected to a central computer system.
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
View Answer

Answer: a
Explanation: This happens in time sharing. In this, users were able to interact with the computer and
could share its information processing resources.

6. TCP stands for?


a) Transmission control program
b) Transmission control protocol
c) Transfer control program
d) Transfer control protocol
View Answer

Answer: b
Explanation: TCP stands for transmission control protocol. It basically allows different networks to
interconnect.

7. The “Victorian internet” is actually?


a) Telegraph
b) Batch Environment
c) Unit Environment
d) System Environment
View Answer

Answer: a
Explanation: It was a telegraph. Invented in the 1840s. Used extensively by the U.S. Government.

8. Packet switching was invented in?


a) 1960s
b) 1980s
c) 2000s
d) 1990s
View Answer

Answer: a
Explanation: Packet switching was developed in 1964. In packet switching, the message is broken into
parts and then sent over independently.

9. The probability of failure-free operation of a software application in a specified environment for a


specified time.
a) Software Reliability
b) Software Quality
c) Software availability
d) Software Safety
View Answer

Answer: a
Explanation: The answer is software reliability. It is estimated using historical and development data.

10. DARPA stands for?


a) Data Advanced Research Projects Agency
b) Defense Advanced Research Product Agency
c) Data based Advanced Research Product Agency
d) Defense Advanced Research Projects Agency
View Answer

Answer: d
Explanation: DARPA (Defense Advanced Research Projects Agency) contracted with BBN (Bolt,
Beranek & Newman) to create ARPAnet.

Computer Fundamentals Questions and Answers – The Internet and its Services

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “The
Internet and its Services”.

1. A network that links many different types of computers all over the world.
a) Intranet
b) Internet
c) Arpanet
d) LAN
View Answer

Answer: b
Explanation: Internet is a network of computers that links many different types of computers. It is a
network of network sharing a common mechanism for addressing computers.

2. Internet was evolved from the basic ideas of ARPANET.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. ARPANET is the first WAN i.e., Wide Area network that had only
four sites in 1969 for interconnecting computers.

3. A service that allows a user to log in into another computer somewhere on the Internet.
a) Telnet
b) FTP
c) e-mail
d) UseNet
View Answer

Answer: a
Explanation: Telnet is the answer. It is a service that enables the user to log into another computer
somewhere on the Internet.
advertisement

4. An internet service that allows the user to move a file.


a) FTP
b) Telnet
c) UseNet
d) Time Sharing
View Answer

Answer: a
Explanation: The answer is FTP. FTP stands for File Transfer Protocol. It allows the user to move a file
from one computer to another on the internet.

5. Anonymous FTP files are called ___________ accessible files.


a) Privately
b) Publicly
c) Batch
d) User
View Answer

Answer: b
Explanation: Anonymous FTP files are called publicly accessible files because they can be accessed by
any user on the Internet.

6. TCP stands for?


a) Transmission control program
b) Transmission control protocol
c) Transfer control program
d) Transfer control protocol
View Answer

Answer: b
Explanation: TCP stands for transmission control protocol. It basically allows different networks to
interconnect.

7. Any system that uses the HTTP protocol is called _________


a) Web Browser
b) Web Server
c) WWW
d) TCP/IP
View Answer

Answer: b
Explanation: The system is the web server. HTTP stands for Hypertext transmission protocol.

8. Any computer that can access the server is called?


a) Web Server
b) Web Browser
c) User
d) Web Client
View Answer
Answer: d
Explanation: Any computer that has access to the web server is called the web client. Web server is
any computer that uses the HTTP protocol.

9. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
d) WWW
View Answer

Answer: c
Explanation: Web Browsers help the user to maintain a personal favorite list of URLs. Also, allows the
user to download information on various formats.

10. URL stands for?


a) Uniform Resource Locator
b) Uniform Research Locator
c) Uniform Resource Link
d) Uniform Research Link
View Answer

Answer: a
Explanation: WWW specifies the URL of a website and allows the user to access information. URL
stands for Uniform Resource Locator.

Computer Fundamentals Questions and Answers – WWW

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“WWW”.

1. The web works on this model.


a) Intranet
b) Internet
c) Client-Server
d) Server
View Answer

Answer: c
Explanation: Web works on the client server model. Client and server operate on machines which are
able to communicate through a network.

2. In the Client-server model, the client receives a request from the server.
a) True
b) False
View Answer

Answer: b
Explanation: The statement is false. The server receives a request from the client. It then performs
the requested work.

3. Which of the following is not a type of server?


a) File
b) Web
c) Name
d) Browsers
View Answer

Answer: d
Explanation: Browser is the answer. Browser is a type of client and it is not a server. File, web and
name are the types of servers.

advertisement

4. This determines the type of protocol to be used.


a) <scheme>
b) <pathname>
c) <server name>
d) <server domain name>
View Answer

Answer: a
Explanation: The answer is <scheme>. In general, http is used. Others like file and ftp can also be
used.

5. The location of file is determined by ________


a) <scheme>
b) <pathname>
c) <server name>
d) <server domain name>
View Answer

Answer: b
Explanation: <pathname> tells the server where to find the file name. It is an important part of the
URL format.

6. Apache is a type of ________


a) Transmission control program
b) Web Server
c) Web Browser
d) DBMS
View Answer

Answer: b
Explanation: Apache is a type of web server. It is an application which waits for client requests,
fetches requested documents from disk and transmits them to the client.

7. A small data file in the browser.


a) Cookie
b) Web Server
c) FTP
d) Database
View Answer
Answer: a
Explanation: Cookie is a small data file in the browser. Most browsers nowadays allow the user to
decide if they want the cookies or not.

8. Any computer that can access the server is called?


a) Web Server
b) Web Browser
c) User
d) Web Client
View Answer

Answer: d
Explanation: Any computer that has access to the web server is called the web client. Web server is
any computer that uses the HTTP protocol.

9. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
d) WWW
View Answer

Answer: c
Explanation: Web Browsers help the user to maintain a personal favorite list of URLs. Also, allows the
user to download information on various formats.

10. SGML stands for?


a) Standard Granted Markup Language
b) System Generalized Markup Language
c) Standard Generalized Markup Language
d) System Granted Markup Language
View Answer

Answer: c
Explanation: HTML(Hypertext Markup language) is based on SGML. SGML stands for Standard
Generalized Markup Language.

Computer Fundamentals Questions and Answers – FTP & HTTP

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “FTP &
HTTP”.

1. A program that can retrieve files from the world wide web and render text, images or sounds
encoded in the files.
a) Browser
b) Internet
c) Server
d) Web Server
View Answer
Answer: a
Explanation: A browser or a web browser is a program that can retrieve files from the world wide
web. Certain examples are IE, Mozilla, etc.

2. An HTML file is a text file containing small markup tags.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. HTML stands for Hyper Text Markup Language. It is a text file
containing small markup tags.

3. Which of the following is not a type of browser?


a) Netscape
b) Web
c) IE
d) Mozilla
View Answer

Answer: b
Explanation: Others except web are web browsers. Web is a type of server. Application that works on
client requests.

advertisement

4. Both client and server release _________ connection after a page has been transferred.
a) IP
b) TCP
c) Hyperlink
d) Network
View Answer

Answer: b
Explanation: The answer is TCP. TCP stands for Transmission Control Protocol. Servers receive
requests from clients.

5. In HTML, the tags that tell the browser how to display the page.
a) markup
b) style
c) body
d) head
View Answer

Answer: a
Explanation: Markup is a general term used to refer the types of tags in HTML. The markup tags tell
the browser how to display the page.

6. FTP stands for?


a) File Text Protocol
b) File Transfer Protocol
c) Firm Transfer Protocol
d) File Transplant Protocol
View Answer

Answer: b
Explanation: FTP stands for File Transfer Protocol. It is a type of internet service use for the
transmission of files.

7. A section in HTML that contains generic information about the document.


a) body
b) title
c) head
d) style
View Answer

8. A tag similar to that of the italic tag.


a) <strong>
b) <cite>
c) <code>
d) <i>
View Answer

Answer: b
Explanation: <cite> is a container tag in html that is citation generally in italics. Other tags like
<em>or emphasize is also used for this purpose.

9. A _________ partitions a web browser window so that multiple web documents can be displayed
simultaneously.
a) Frame
b) set
c) Frameset
d) div
View Answer

Answer: c
Explanation: A frameset partitions a web browser window so that multiple web documents can be
displayed simultaneously. Frameset can have attributes like cols.

10. The _________ attribute specifies the web page to be placed in the frame initially.
a) name
b) src
c) cols
d) rows
View Answer

Answer: b
Explanation: The src attribute or the source specifies the web page to be placed in the frame initially.
It may be subsequently overwritten.

Computer Fundamentals Questions and Answers – Abbreviations Related to Internet

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Abbreviations Related to Internet”.
1. XML stands for?
a) Extensions Made Language
b) Extensible Markup Language
c) Extensible Major Language
d) Extensible Minor Language
View Answer

Answer: b
Explanation: XML stands for Extensible Markup Language. It allows information to be shared among
different computer systems on the Internet.

2. AAA stands for Anonymous Administrative Authority.


a) True
b) False
View Answer

Answer: b
Explanation: The statement is false. AAA stands for Autonomous Administrative Authority.

3. API is?
a) Advanced Processing Information
b) Application Processing Information
c) Application Programming interface
d) Application Processing Interface
View Answer

Answer: c
Explanation: API is the application programming interface. It is a set of instructions that allow the
creation of applications.

advertisement

4. GSM stands for?


a) Global System for Monitoring
b) Graphical System for Mobile Telecommunications
c) Graphical System for Monitoring
d) Global System for Mobile Telecommunications
View Answer

Answer: d
Explanation: The answer is Global System for Mobile Telecommunications. It uses a variation of
multiple access on the basis of time and is widely used in Europe.

5. IN stands for?
a) Input
b) InterNet
c) Intelligent Network
d) IntraNet
View Answer
Answer: c
Explanation: IN stands for Intelligent Network. It is a telephone network that provides technical
services.

6. FTP stands for?


a) File Text Protocol
b) File Transfer Protocol
c) Firm Transfer Protocol
d) File Transplant Protocol
View Answer

Answer: b
Explanation: FTP stands for File Transfer Protocol. It is a type of internet service use for the
transmission of files.

7. PDU stands for?


a) Protocol Data Unit
b) Professional Data Unit
c) Protocol Distributed Unit
d) Professional Distributed Unit
View Answer

Answer: a
Explanation: PDU stands for Protocol Data Unit. It is transmitted as a single unit to other units in a
computer network.

8. A tag similar to that of the bold tag.


a) <strong>
b) <cite>
c) <code>
d) <i>
View Answer

Answer: a
Explanation: <strong> is a container tag in html that is similar to bold. It makes the text more
valuable as well as bold.

9. ISP is?
a) Intranet System Processing
b) Internet Service Provider
c) Intelligent System Processing
d) Intranet Service Provider
View Answer

Answer: b
Explanation: ISP stands for Internet Service provider. It is a service that provides access to the
internet.

10. NE stands for __________ element.


a) name
b) network
c) new
d) normal
View Answer

Answer: b
Explanation: The answer is network. NE is the network element. It is any logical entity.

Computer Fundamentals Questions and Answers – Text Media

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “Text
Media”.

1. ______________the ability to access, analyzes, evaluate and produce media.


a) Literacy
b) Internet
c) Media
d) Media Literacy
View Answer

Answer: d
Explanation: It is media literacy. It is the ability to access, analyze, evaluate and produce media. It is
the process of becoming active, rather than passive, consumers of media.

2. Media literacy can help youth and adults understand how media shapes our culture.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. Media literacy also develops our critical thinking. It also helps in
the better understanding of how media shapes our culture.

3. The analysis of _________ is a process of deconstruction that investigates the operations of texts,
their constructions, the ways they produce meanings, what those meanings may be.
a) Media
b) Web
c) IE
d) Text
View Answer

Answer: d
Explanation: The analysis of texts is a process of deconstruction that investigates the operations of
texts, their constructions, the ways they produce meanings, what those meanings may be. However,
they also warn of the dangers of making assumptions about the validity of any one analytic method.

advertisement

4. A type of analysis that attends to the repetition and frequency of features, their proportions within
the text, and consequent assumptions about significance.
a) Media
b) Content
c) Linguistic
d) Network
View Answer
Answer: b
Explanation: The answer is Content. Linguistic analysis might concentrate on the potential effects of
style of address. Content analysis attends to the repetition and frequency of features, their
proportions within the text, and consequent assumptions about significance.

5. __________ analysis regards texts as collections of signs or paradigms and possible meanings,
operating within the bounds of various codes.
a) Semiotic
b) Style
c) Linguistic
d) Text
View Answer

Answer: a
Explanation: Semiotic analysis regards texts as collections of signs or paradigms and possible
meanings, operating within the bounds of various codes.

6. This part of image analysis refers to those primary signs, often part of the technique of
photography, which are about how the image is made.
a) Treatment
b) Position
c) Content
d) Media
View Answer

Answer: a
Explanation: Treatment in image analysis refers to those primary signs, often part of the technique of
photography, which is about how the image is made.

7. In image analysis, this part refers to objects represented within the image, which may signify to us
because of, for example, their symbolic power or because of their composition in relation to each
other.
a) Treatment
b) Position
c) Content
d) Media
View Answer

Answer: c
Explanation: Content refers to objects represented within the image. Treatment in image analysis
refers to those primary signs, often part of the technique of photography, which are about how the
image is made.

8. _________ are about storytelling and story meaning.


a) narratives
b) plot
c) content
d) storyline
View Answer
Answer: a
Explanation: Narratives are about storytelling and story meaning. Media texts tell stories; they have a
narrative.

9. __________ describes the effect of involving the reader with the story, of constructing it as truth.
a) Narration
b) Identification
c) Plot
d) Characters
View Answer

Answer: b
Explanation: Identification describes the effect of involving the reader with the story, of constructing
it as truth. It produces a meaning of truth, a belief in the validity of the text and of all the other
meanings that we make from it.

10. The notion of norms also links to the idea that representations are given force through a process
of:
a) naturalization
b) identification
c) media
d) casting
View Answer

Answer: a
Explanation: The notion of norms also links to the idea that representations are given force through a
process of naturalization.

Computer Fundamentals Questions and Answers – Graphics Media

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Graphics Media”.

1. The media texts may throw up discourses and are called ____________
a) Binary oppositions
b) Violations
c) Oppositions
d) Media Illiteracy
View Answer

Answer: a
Explanation: Some texts may also throw up discourses and their meanings if you attend to what are
called binary oppositions. The discourse is also marked by what it is not, by what it is opposed to.

2. In terms of image analysis, it is important to attend to primary level signs in visual codes, most
obviously for examples of still photography.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. This approach categorizes the image analysis into three: position,
treatment and content.

3. The notion of __________ is one which is especially associated with semiotics and with genres.
a) Media
b) Web
c) codes
d) Text
View Answer

Answer: c
Explanation: The notion of codes is one which is especially associated with semiotics and with
genres. The textual codes may be summarized into: written, spoken, non-verbal and visual.

advertisement

4. The idea of _________is central to understanding the production of meaning through texts.
a) Identity
b) Content
c) Represntation
d) Network
View Answer

Answer: c
Explanation: The idea of representation is central to understanding the production of meaning
through texts. Texts are nothing but representations in both a material and an ideological sense.

5. ICT stands for?


a) Interaction, Communication and Technology
b) Information, Communication and Technology
c) Interaction, Communication and Text
d) Information, Communication and Text
View Answer

Answer: b
Explanation: ICT stands for Information, Communication and Technology. ICT is responsible for
providing access to information.

6. A system of interlinked documents, websites, portals etc. accessed through the Internet.
a) WWW
b) Internet
c) Web
d) Media
View Answer

Answer: a
Explanation: World Wide Web a system of interlinked documents, websites, portals etc. accessed
through the Internet. Since these links are not physical or mechanical, they are called `virtual’ links or
`hyperlinks’.
7. In image analysis, this part refers to objects represented within the image, which may signify to us
because of, for example, their symbolic power or because of their composition in relation to each
other.
a) Treatment
b) Position
c) Content
d) Media
View Answer

Answer: c
Explanation: Content refers to objects represented within the image. Treatment in image analysis
refers to those primary signs, often part of the technique of photography, which are about how the
image is made.

8. A dedicated website for providing specialized information in a particular field.


a) Website
b) Blog
c) Web directories
d) Corporate Websites
View Answer

Answer: c
Explanation: Web directory is a dedicated website for providing specialized information in a
particular field. Such directories are useful for educational purpose.

9. _________ are the web-based interactive applications to express and share your ideas and
thoughts with interested people.
a) Website
b) Blog
c) Web directories
d) Corporate Websites
View Answer

Answer: b
Explanation: Blogs are the web-based interactive applications to express and share your ideas and
thoughts with interested people. It is an open platform that can be used as on-line diaries, a journal,
or editorial.

10. A term used in the context of web design to suggest the path that user takes while browsing a
website.
a) navigation
b) identification
c) graphics media
d) casting
View Answer

Answer: a
Explanation: Navigation is a term used in the context of web design to suggest the path that user
takes while browsing a website.

Computer Fundamentals Questions and Answers – Virtual Reality


This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Virtual Reality”.

1. HMD stands for?


a) Head Mounted Display
b) Head Masked Display
c) Head Made Display
d) Head Mounted Detection
View Answer

Answer: a
Explanation: It stands for Head Mounted Display. A kind of stereo display with two miniature screens
and depth perception.

2. In terms of image analysis, it is important to attend to primary level signs in visual codes, most
obviously for examples of still photography.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. This approach categorizes the image analysis into three: position,
treatment and content.

3. ______________ keep track of position.


a) Motion analyzers
b) Motion Trackers
c) HMD
d) SMD
View Answer

Answer: b
Explanation: Motion trackers keep track of position. Other devices are like head trackers and body
trackers.

advertisement

4. BOOM stands for?


a) Binocular Omni-Orientation Manager
b) Binary Omni-Orientation Manager
c) Binocular Omni-Orientation Monitor
d) Binary Omni-Orientation Monitor
View Answer

Answer: c
Explanation: BOOM stands for Binocular Omni-Orientation Monitor. It is a type of Stereoscopic
display. Guidance of the box by the users.

5. A term for Illusion of immersion by projecting stereo images on the walls and floor of a room.
a) CAVE
b) BOOM
c) GUI
d) HMD
View Answer

Answer: a
Explanation: CAVE is the term. CAVE stands for Cave Automatic Virtual Environment.

6. It is a mediated environment which creates the sensation in a user of being present in a (physical)
surrounding.
a) WWW
b) VR
c) HMD
d) GUI
View Answer

Answer: b
Explanation: VR or virtual reality is a mediated environment which creates the sensation in a user of
being present in a (physical) surrounding.

7. A term to describe the extent to which a user can modify form and content of a mediated
environment.
a) Vividness
b) Richness
c) Interactivity
d) Mapping
View Answer

Answer: c
Explanation: Interactivity is the extent to which a user can modify form and content of a mediated
environment. It comprises speed and mapping.

8. A type of VR environment in which subjects are visually isolated from the real environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer

Answer: a
Explanation: In immersive VR, subjects are visually isolated from the real environment. A virtual
scene is responding to the subjects actions.

9. In this type of VR environment, the three-dimensional scene is considered as a part of the physical
environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer

Answer: c
Explanation: This happens in non-immersive Virtual environment. Also, the subjects do fully respond
in the real environment.
10. In this type of VR environment, the subjects can perform both in the real and virtual
environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer

Answer: b
Explanation: The Semi-Immersive Virtual Reality provides an experience partially based in a virtual
environment.

Computer Fundamentals Questions and Answers – Animations

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Animations”.

1. ____________ is basically a form of pictorial presentation.


a) Photography
b) Animations
c) Drawing
d) Creativity
View Answer

Answer: b
Explanation: Animation is basically a form of pictorial presentation. It has become the most
prominent feature of technology-based learning environments.

2. Multiplane camera was introduced by Walt Disney.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. Walt Disney along with his colleagues had a problem with
creating realistic animation and how to conserve time while creating it. Therefore, they came up with
a great solution which can be considered another innovation in the field of animation called the
multiplane camera.

3. It refers to simulated motion pictures showing movement of drawn objects.


a) Motion
b) Animation
c) VR
d) SMD
View Answer

Answer: b
Explanation: It refers to simulated motion pictures showing movement of drawn objects. Animation
is a form of pictorial presentation.

advertisement
4. A ____________(invented by Paul Roget in 1828) is a simple mechanical toy which creates the
illusion of movement.
a) Binocular
b) Zoetrope
c) Thaumatrope
d) BOOM
View Answer

Answer: c
Explanation: A thaumatrope (invented by Paul Roget in 1828) is a simple mechanical toy. It creates
the illusion of movement. Thaumatrope means “wonder turner”.

5. A device produces an illusion of movement from a rapid succession of static pictures.


a) Zoetrope
b) Thaumatrope
c) Phenakistoscope
d) HMD
View Answer

Answer: a
Explanation: In 1843, William Horner, a British mathematician invented the zoetrope. A zoetrope
produces an illusion of movement from a rapid succession of static pictures.

6. The ____________ is a piece of equipment designed to make cartoons more realistic and
enjoyable. It uses stacked panes of glass each with different elements of the animation.
a) Multiplane camera
b) VR
c) Thaumatrope
d) Phenakistoscope
View Answer

Answer: a
Explanation: The multiplane camera is a motion-picture camera that was used in the traditional
animation process that moves a number of pieces of artwork past the camera at various speeds and
at various distances from one another.

7. He made the first animated film in 1906.


a) Walt Disney
b) J. Stuart Blackton
c) William Horner
d) J.A. Ferdinand Plateau
View Answer

Answer: b
Explanation: J. Stuart Blackton made the first animated film in 1906. Humorous Phases of Funny
Faces was the first animation film.

8. Name of the first animation film.


a) Humorous Phases of Funny Faces
b) Tom and Jerry
c) Mickey Mouse
d) How i learnt animations
View Answer

Answer: a
Explanation: Humorous Phases of Funny Faces was the first animation film made by J. Stuart
Blackton. He was using a blackboard as his workplace together with chalk and an eraser as his main
tools.

9. ___________ animation is used to animate things that are smaller than life size.
a) Immersive
b) Claymotion
c) Stop motion
d) Augmented
View Answer

Answer: c
Explanation: Stop motion animation is used to animate things that are smaller than life size. Willis
Harold O’Brian pioneered motion picture special effects, which were perfected in stop motion.

10. The father of animation?


a) Walt Disney
b) J. Stuart Blackton
c) William Horner
d) J.A. Ferdinand Plateau
View Answer

Answer: b
Explanation: J. Stuart Blackton made the first animated film in 1906. The film was entitled Humorous
Phases of Funny Faces, and with this, he became known as the father of animation.

Computer Fundamentals Questions and Answers – Generations of Computers

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Generations of Computers”.

1. A term in computer terminology is a change in technology a computer is/was being used.


a) development
b) generation
c) advancement
d) growth
View Answer

Answer: b
Explanation: Generation in computer terminology is a change in technology a computer is/was being
used. The term is used to distinguish between various hardware technologies.

2. The fourth generation was based on integrated circuits.


a) True
b) False
View Answer

Answer: b
Explanation: The statement is false. The third generation was based on integrated circuits.
3. The generation based on VLSI microprocessor.
a) 1st
b) 2nd
c) 3rd
d) 4th
View Answer

Answer: d
Explanation: The 4th gen was VLSI microprocessor based. The period of fourth generation: 1972-
1990.

advertisement

4. ______ generation of computer started with using vacuum tubes as the basic components.
a) 1st
b) 2nd
c) 3rd
d) 4th
View Answer

Answer: a
Explanation: First generation of computer started with using vacuum tubes as the basic components
for memory and circuitry for CPU(Central Processing Unit).

5. Batch processing was mainly used in this generation.


a) 1st
b) 2nd
c) 3rd
d) 4th
View Answer

Answer: a
Explanation: Batch processing was mainly used in the 1st generation. In this generation Punched
cards, Paper tape, Magnetic tape Input & Output device were used.

6. ___________ is an emerging branch in computer science, which interprets means and method of
making computers think like human beings.
a) Block chain
b) VR
c) AI
d) Cloud computing
View Answer

Answer: c
Explanation: AI is an emerging branch in computer science, which interprets means and method of
making computers think like human beings.

7. ULSI stands for?


a) Ultra Large Scale Integration
b) Under Lower Scale Integration
c) Ultra Lower Scale Integration
d) Under Large Scale Integration
View Answer

Answer: a
Explanation: It stands for Ultra Large Scale Integration. It is a part of the fifth generation computers.

8. In this generation Time sharing, Real time, Networks, Distributed Operating System was used.
a) 1st
b) 2nd
c) 5th
d) 4th
View Answer

Answer: d
Explanation: The fourth generation of computers is marked by the use of Very Large Scale Integrated
(VLSI) circuits. In this generation Time sharing, Real time, Networks, Distributed Operating System
was used.

9. HLL stands for?


a) High Level Language
b) High Layman’s Language
c) High Level Lesson
d) High Layman’s Lesson
View Answer

Answer: a
Explanation: High Level Language(HLL) has languages like FORTRAN, COBOL. HLL isn’t in machine
language. It is converted to machine language for further processing.

10. The period of ________ generation was 1952-1964.


a) 1st
b) 2nd
c) 5th
d) 4th
View Answer

Answer: b
Explanation: The period of the 2nd generation is 1952-1964. The period of the first generation was
1942-1954.

Computer Fundamentals Questions and Answers – Parallel Processing Systems

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Parallel Processing Systems”.

1. Execution of several activities at the same time.


a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer
Answer: b
Explanation: Execution of several activities at the same time is referred to as parallel processing. Like,
Two multiplications at the same time on 2 different processes.

2. Parallel processing has single execution flow.


a) True
b) False
View Answer

Answer: b
Explanation: The statement is false. Sequential programming specifically has single execution flow.

3. A term for simultaneous access to a resource, physical or logical.


a) Multiprogramming
b) Multitasking
c) Threads
d) Concurrency
View Answer

Answer: d
Explanation: Concurrency is the term used for the same. When several things are accessed
simultaneously, the job is said to be concurrent.

advertisement

4. ______________ leads to concurrency.


a) Serialization
b) Parallelism
c) Serial processing
d) Distribution
View Answer

Answer: b
Explanation: Parallelism leads naturally to Concurrency. For example, Several processes trying to
print a file on a single printer.

5. A parallelism based on increasing processor word size.


a) Increasing
b) Count based
c) Bit based
d) Bit level
View Answer

Answer: d
Explanation: Bit level parallelism is based on increasing processor word size. It focuses on hardware
capabilities for structuring.

6. A type of parallelism that uses micro architectural techniques.


a) instructional
b) bit level
c) bit based
d) increasing
View Answer

Answer: a
Explanation: Instructional level uses micro architectural techniques. It focuses on program
instructions for structuring.

7. MIPS stands for?


a) Mandatory Instructions/sec
b) Millions of Instructions/sec
c) Most of Instructions/sec
d) Many Instructions / sec
View Answer

Answer: b
Explanation: MIPS stands for Millions of Instructions/sec. MIPS is a way to measure the cost of
computing.

8. The measure of the “effort” needed to maintain efficiency while adding processors.
a) Maintainablity
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer

Answer: c
Explanation: The measure of the “effort” needed to maintain efficiency while adding processors is
called as scalabilty.

9. The rate at which the problem size need to be increased to maintain efficiency.
a) Isoeffciency
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer

Answer: a
Explanation: Isoefficiency is the rate at which the problem size need to be increased to maintain
efficiency.

10. Several instructions execution simultaneously in ________________


a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer

Answer: b
Explanation: In parallel processing, the several instructions are executed simultaneously.

Computer Fundamentals Questions and Answers – Client-Server Computing


This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “Client-
Server Computing”.

1. RMI stands for?


a) Remote Mail Invocation
b) Remote Message Invocation
c) Remaining Method Invocation
d) Remote Method Invocation
View Answer

Answer: d
Explanation: The RMI (Remote Method Invocation) is an API that provides a mechanism to create
distributed applications.

2. A remote object is an object whose method can be invoked from another virtual environment.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. JVM is java virtual environment. RMI uses stub and skeleton
object for communication with the remote object. A remote object is an object whose method can
be invoked from another virtual environment.

3. A typical _________ program creates some remote objects, makes references to these objects
accessible, and waits for clients to invoke methods on these objects.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer

Answer: a
Explanation: A server program creates remote objects. It gives reference to these objects and then
waits for clients to invoke methods on these objects.

advertisement

4. A typical __________ program obtains a remote reference to one or more remote objects on a
server and then invokes methods on them.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer

Answer: b
Explanation: A client program obtains a remote reference to one or more remote objects on a server.
It then invokes methods on them.

5. The ___________ layer, which provides the interface that client and server application objects use
to interact with each other.
a) Increasing
b) Count
c) Bit
d) Stub/skeleton
View Answer

Answer: d
Explanation: The stub or skeleton layer provides the interface that client and server application
objects use for interaction with each other.

6. A layer which is the binary data protocol layer.


a) stub layer
b) skeleton layer
c) remote layer
d) transport protocol
View Answer

Answer: d
Explanation: The transport protocol layer is the binary data protocol that sends remote object
requests over the wire. A client is any remote application that communicates with these server
objects.

7. A middleware layer between the stub skeleton and transport.


a) remote layer
b) instruction layer
c) reference layer
d) remote reference layer
View Answer

Answer: d
Explanation: The remote reference layer is the middleware between the stub/skeleton layer and
underlying transport protocol.

8. An object acting as a gateway for the client side.


a) skeleton
b) stub
c) remote
d) server
View Answer

Answer: b
Explanation: The stub is an object that acts as a gateway for the client side. The outgoing requests
are passed through the stub.

9. A gateway for the server side object.


a) skeleton
b) stub
c) remote
d) server
View Answer
Answer: a
Explanation: The skeleton is an object, acts as a gateway for the server side object. All the incoming
requests are routed through it.

10. RMI uses stub and skeleton for communication with the ________ object.
a) client
b) remote
c) server
d) any
View Answer

Answer: b
Explanation: RMI uses stub and skeleton object for communication with the remote object. A remote
object is an object whose method can be invoked from another JVM.

Computer Fundamentals Questions and Answers – Cloud Computing

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “Cloud
Computing”.

1. ________________ is a paradigm of distributed computing to provide the customers on-demand,


utility based computing service.
a) Remote Sensing
b) Remote Invocation
c) Cloud Computing
d) Private Computing
View Answer

Answer: c
Explanation: Cloud computing is a paradigm of distributed computing to provide the customers with
on-demand, utility based computing services. Cloud users can provide more reliable, available and
updated services to their clients in turn.

2. Cloud providers provide cloud services to the cloud users.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. There are three types of users often called as cloud stakeholders.

3. Which of the following is not a cloud stakeholder?


a) Cloud providers
b) Clients
c) End users
d) Cloud users
View Answer

Answer: b
Explanation: There are three types of stakeholders cloud providers, cloud users and the end users.

advertisement
4. These cloud services are of the form of utility computing i.e. the _________ uses these services
pay-as-you-go model.
a) Cloud providers
b) Clients
c) End users
d) Cloud users
View Answer

Answer: d
Explanation: The cloud users use these services pay-as-you-go model. The cloud users develop their
product using these services and deliver the product to the end users.

5. Which of the following is not a type of cloud?


a) Private
b) Public
c) Protected
d) Hybrid
View Answer

Answer: c
Explanation: There is no protected cloud. There are three types of cloud-private, public and hybrid.

6. In this type of cloud, an organization rents cloud services from cloud providers on-demand basis.
a) Private
b) Public
c) Protected
d) Hybrid
View Answer

Answer: b
Explanation: This happens in public cloud. Services are provided to the users using utility computing
model.

7. In this type of cloud, the cloud is composed of multiple internal or external cloud.
a) Private
b) Public
c) Protected
d) Hybrid
View Answer

Answer: d
Explanation: The hybrid cloud is composed of multiple internal or external clouds. This is the
scenario when an organization moves to public cloud computing domain from its internal private
cloud.

8. _____________ enables the migration of the virtual image from one physical machine to another.
a) visualization
b) virtualization
c) migration
d) virtual transfer
View Answer
Answer: b
Explanation: Virtualization enables the migration of the virtual image from one physical machine to
another. This feature is useful for cloud as by data locality lots of optimization is possible.

9. Most of the cloud architectures are built on this type of architecture.


a) skeleton
b) grid
c) linear
d) template
View Answer

Answer: b
Explanation: Most of the cloud architectures are built on Grid architecture. Grid is a type of
distributed computing architecture where organizations owning data centers collaborate with each
other to have common benefits.

10. Saas stands for?


a) Software as a service
b) System Software and services
c) Software as a system
d) System as a service
View Answer

Answer: a
Explanation: SAAS is Software as a service. It delivers a single application through the web browser to
thousands of customers using a multitenant architecture.

Computer Fundamentals Questions and Answers – Types of Computers

This set of Basic Computer Fundamentals Questions and Answers focuses on “Types of Computers”.

1. Which of the following is not a type of computer on the basis of operation?


a) Remote
b) Hybrid
c) Analog
d) Digital
View Answer

Answer: a
Explanation: There are three types of computers basically on the basis of operation:
Analog, Digital and Hybrid.

2. Remote computers work on continuous range of values.


a) True
b) False
View Answer

Answer: b
Explanation: The statement is false. Analog Computer is a computing device that works on
continuous range of values. The results that are given by the analog computers will mostly be
approximate since they deal with quantities that keep on varying.
3. A computer that operates on digital data.
a) remote
b) hybrid
c) analog
d) digital
View Answer

Answer: d
Explanation: The digital computer uses binary number system in which there are only two digits 0
and 1. Each one is called a bit.

advertisement

4. This type of computer is mostly used for automatic operations.


a) remote
b) hybrid
c) analog
d) digital
View Answer

Answer: b
Explanation: Hybrid computer is mostly used with automatic operations of complicated physical
processes and the machines.

5. ______________ are used for solving complex application such as Global Weather Forecasting.
a) Super Computers
b) Public computers
c) Mobile computers
d) Hybrid computers
View Answer

Answer: a
Explanation: Super computers are used with complex applications like Global Weather Forecasting,
Creating graphic images, engineering design and testing, space exploration, etc.

6. The invention of _______________ gave birth to the much cheaper micro computers.
a) Mainframes
b) Microcomputers
c) Microprocessors
d) PDAs
View Answer

Answer: c
Explanation: The invention of microprocessor (also called as single chip CPU) gave birth to the much
cheaper microcomputers.

7. They can operate on batteries and hence are very popular with travelers.
a) Mainframes
b) Laptops
c) Microprocessors
d) Hybrid
View Answer
Answer: b
Explanation: Laptops can operate on batteries and hence are very popular with travelers. The screen
folds down onto the keyboard when not in use.

8. PDA stands for?


a) personal digital applications
b) private digital applications
c) personal digital assistants
d) private digital assistants
View Answer

Answer: c
Explanation: PDAs are also called as Handheld. They are small and can be carried anywhere.

9. PDAs are also called?


a) PCs
b) Laptops
c) Tablets
d) Handheld
View Answer

Answer: d
Explanation: PDAs are also called as Personal Digital Assistants. They are small and can be carried
anywhere.

10. ______computers are lower to mainframe computers in terms of speed and storage capacity.
a) Mini
b) Super
c) Mainframes
d) Hybrid
View Answer

Answer: a
Explanation: The answer is a. Mini computers are compared to mainframe computers in terms of:
1. speed and, 2. storage capacity.

Computer Fundamentals Questions and Answers – Internet of Things

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Internet of Things”.

1. A network of physical objects or things embedded with electronics or softwares.


a) AI
b) ML
c) IOT
d) Internet
View Answer

Answer: c
Explanation: IoT is a network of physical objects or things embedded with electronics or softwares.
Iot allows objects to be controlled remotely across existing network.
2. RFID is a part of IoT.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. RFID is Radio frequency identification. Radio frequency
identification is a part of IoT.

3. RFID stands for?


a) Random frequency identification
b) Radio frequency identification
c) Random frequency information
d) Radio frequency information
View Answer

Answer: b
Explanation: Earlier, RFID or Radio frequency identification was a prerequisite for Internet of Things.

advertisement

4. Which of the following is not involved in working of IoT?


a) RFID
b) Sensor
c) Nano tech
d) Server
View Answer

Answer: d
Explanation: IoT works from RFID to Sensor, to Smart tech and then to Nano tech.

5. Making the smaller and smaller things have the ability to connect and interact.
a) Micro Tech
b) Smart tech
c) Nano tech
d) RFID
View Answer

Answer: c
Explanation: Nano Tech is the term used when smaller things are made to interact and communicate.
It is involved in the working of Iot also.

6. Wi-Fi stands for?


a) Wireless fidelity
b) Wireless Flexibility
c) Wide Fidelity
d) WAN Flexibility
View Answer

Answer: a
Explanation: Wi-Fi stands for Wireless Fidelity. It is widely used in both outdoor and indoor
environments.
7. Diagnostics service for Cars.
a) MIPS
b) AutoBot
c) IoT Assistant
d) IoT
View Answer

Answer: b
Explanation: Autobot is a diagnostics service for cars. This service is integrated with several web
services.

8. The father of ioT.


a) Kevin Atrun
b) Kevin Atrhur
c) Kevin Ashton
d) Kevin Thomas
View Answer

Answer: c
Explanation: Kevin Ashton is the father of IoT. He believed IoT could turn the world into data.

9. Collect->Communicate->__________->Act
a) Acknowledge
b) Analyze
c) Examine
d) Rectify
View Answer

Answer: b
Explanation: The correct option is analyze. This shows the lifecycle of IoT.
Collect->Communicate->Analyze->Act.

10. Several instructions execution simultaneously in?


a) processing
b) parallel processing
c) serial processing
d) multitasking
View Answer

Answer: b
Explanation: In parallel processing, the several instructions are executed simultaneously. Parallel
processing system provides the concurrent data processing to increase the execution time.

Computer Fundamentals Questions and Answers – Artificial Intelligence

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Artificial Intelligence”.

1. The technology that has the ability to interact with the world.
a) AI
b) ML
c) IOT
d) IT
View Answer

Answer: a
Explanation: AI which is artificial intelligence is the ability to interact with the world. It is the ability to
model the world and to learn and adapt.

2. The goal of AI is to build systems that exhibit intelligent behavior.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. There are 2 main goals in AI: to exhibit intelligent behavior and
understand intelligence in order to model it.

3. The first neural network computer.


a) RFD
b) SNARC
c) AM
d) AN
View Answer

Answer: b
Explanation: SNARC was the first neural network computer. it was built by Minsky and Edmonds in
1956.

advertisement

4. A hardware based system that has autonomy, social ability and reactivity.
a) AI
b) Autonomous Agent
c) Agency
d) Behavior Engineering
View Answer

Answer: b
Explanation: The answer is Autonomous Agent. Autonomous agent has autonomy i.e. ability to
operate without the direct intervention of humans or others.

5. A particular system that contains intelligent agents.


a) AI systems
b) Agency
c) Autonomous systems
d) Company
View Answer

Answer: b
Explanation: It is called an agency. A particular system consisting of intelligent agents like computers
or robots that cooperate to find the solution to a problem.

6. A methodology used to develop behavior-based autonomous agents.


a) Descriptors
b) Behavior engineering
c) Behavior modeling
d) Auto engineering
View Answer

Answer: b
Explanation: The answer is behavior engineering. Autonomous agent implements autonomy, social
ability and reactivity.

7. An international research effort to promote autonomous robots.


a) Fresh Kitty
b) RoboCup
c) AICup
d) SPOT
View Answer

Answer: b
Explanation: RoboCup is designed to promote autonomous robots. It is based on multi agent
collaboration.

8. A type of non-monotonic reasoning.


a) Ordinary
b) Special
c) Duplicate
d) Default
View Answer

Answer: d
Explanation: Default reasoning is a type of non-monotonic reasoning. Default logic is a non-
monotonic logic proposed by Raymond Reiter to formalize reasoning with default assumptions.

9. The performance of an agent can be improved based on this.


a) Observe
b) Learn
c) Improvise
d) Implement
View Answer

Answer: b
Explanation: An AI system is designed to learn and improve. The same is implemented on its agents.

10. Face recognition system is based on _____________


a) applied AI
b) parallel AI
c) serial AI
d) strong AI
View Answer

Answer: a
Explanation: The answer is applied AI. It is based on applied artificial intelligence. It is an approach to
develop commercially smart systems.
Computer Fundamentals Questions and Answers – Network Security

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Network Security”.

1. The field that covers a variety of computer networks, both public and private, that are used in
everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT
View Answer

Answer: c
Explanation: Network security covers a variety of computer networks, both private and public.
Everyday jobs like conducting transactions and communications among business and government
agencies etc.

2. Network Security provides authentication and access control for resources.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. AFS is an example. It helps us protect vital information.

3. Which is not an objective of network security?


a) Identification
b) Authentication
c) Access control
d) Lock
View Answer

Answer: d
Explanation: The Identification, Authentication and Access control are the objectives of network
security. There is no such thing called lock.

advertisement

4. Which of these is a part of network identification?


a) UserID
b) Password
c) OTP
d) fingerprint
View Answer

Answer: a
Explanation: The answer is UserID. UserID is a part of identification. UserID can be a combination of
username, user student number etc.

5. The process of verifying the identity of a user.


a) Authentication
b) Identification
c) Validation
d) Verification
View Answer

Answer: a
Explanation: It is called an authentication. It is typically based on passwords, smart card, fingerprint,
etc.

6. A concern of authentication that deals with user rights.


a) General access
b) Functional authentication
c) Functional authorization
d) Auto verification
View Answer

Answer: c
Explanation: Functional authorization is concerned with individual user rights. Authorization is the
function of specifying access rights to resources related to information security.

7. CHAP stands for?


a) Challenge Handshake authentication protocol
b) Challenge Hardware authentication protocol
c) Circuit Hardware authentication protocol
d) Circuit Handshake authentication protocol
View Answer

Answer: a
Explanation: CHAP stands for Challenge Handshake authentication protocol. Features of CHAP:
plaintext, memorized token. Protocol uses Telnet, HTTP.

8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
View Answer

Answer: d
Explanation: Access control refers to the security features. Applications call access control to provide
resources.

9. An algorithm in encryption is called _____________


a) Algorithm
b) Procedure
c) Cipher
d) Module
View Answer

Answer: c
Explanation: An algorithm used in encryption is referred to as a cipher. cipher is an algorithm for
performing encryption or decryption
10. The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
View Answer

Answer: a
Explanation: The text that gets transformed is called plain text. The algorithm used is called cipher.

Computer Fundamentals Questions and Answers – Network Security and Encryption

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Network Security and Encryption”.

1. WTLS stands for?


a) Wireless Transport Security Layer
b) Wireless Transfer System Layer
c) Wireless Transfer Security Layer
d) Wireless Transport System Layer
View Answer

Answer: a
Explanation: WTLS is Wireless Transport Security Layer. It provides security between the mobile
device and the WAP gateway to internet.

2. The protocol designed to make the security of wireless LAN as good as that of wired LAN.
a) WTLS
b) WEP
c) RSN
d) WP
View Answer

Answer: b
Explanation: WEP stands for Wired Equivalent Privacy. WEP has been broken already in 2001. WEP
protocol designed to make the security of wireless LAN as good as that of wired LAN.

3. A person who enjoys learning details about computers and how to enhance their capabilities.
a) Cracker
b) Hacker
c) App controller
d) Site controller
View Answer

Answer: b
Explanation: The person is called hacker. A person who enjoys learning the details of computer
systems and how to stretch their capabilities is called hacker.

advertisement

4. A program created by Farmer and Venema for auditing capability.


a) SAAS
b) SATAN
c) SAN
d) SAT
View Answer

Answer: b
Explanation: SATAN is the Security analysis tool for auditing networks. It is created by farmer and
venema.

5. A small program that changes the way a computer operates.


a) Worm
b) Trojan
c) Bomb
d) Virus
View Answer

Answer: d
Explanation: The program is called virus. It alters the way that the computer operates. It often does
damages like deleting and corrupting files and data.

6. A program that copies itself.


a) Worm
b) Virus
c) Trojan
d) Bomb
View Answer

Answer: a
Explanation: A worm copies itself from one system to another over a network without the assistance
of human.

7. An attack in which the site is not capable of answering valid request.


a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer

Answer: b
Explanation: The answer is Denial of service. In case of denial of service attacks, a computer site is
bombarded with a lot of messages.

8. Creating a computer or paper audit that can help detect wrong doings.
a) Auditing
b) Validation
c) RSN
d) Verification
View Answer

Answer: a
Explanation: The answer is auditing. It is done to keep an eye on wrong doings. Auditing can be used
as a deterrent.
9. An indirect form of surveillance.
a) Honey pot
b) Logical
c) Security
d) Intrusion
View Answer

Answer: a
Explanation: Honey pot is an indirect form of surveillance. Network personnel create a trap, watching
for unscrupulous acts.

10. A malicious code hidden inside a seemingly harmless piece of code.


a) Worm
b) Bomb
c) Trojan Horse
d) Virus
View Answer

Answer: c
Explanation: The answer is Trojan horse. Trojan horse is a code that is present in a program that
appears harmless.

11. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
View Answer

Answer: d
Explanation: The attack is a spoofing attack. It is when a user creates a packet that appears to be
something else or from someone else.

13. A technique in which a program attacks a network by exploiting IP broadcast addressing


operations.
a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer

Answer: a
Explanation: Smurfing is a technique in which a program attacks a network by exploiting IP broadcast
addressing operations.

14. An attack in which the user receives unwanted amount of e-mails.


a) Smurfing
b) Denial of service
c) E-mail bombing
d) Ping storm
View Answer
Answer: c
Explanation: In the case of denial of e-mail bombing, a user sends an excessive amount of unwanted
e-mail to someone.

Computer Fundamentals Questions and Answers – Encryption and Viruses

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Encryption and Viruses”.

1. A cipher in which the order is not preserved.


a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Public key based
View Answer

Answer: b
Explanation: In transposition-based cipher, the order of the plain text is not preserved. They can be
very simple to identify.

2. Plain text is the data after encryption is performed.


a) True
b) False
View Answer

Answer: b
Explanation: The statement is false. Cipher is the algorithm used in encryption. Ciphertext is the data
after encryption is performed.

3. A unique piece of information that is used in encryption.


a) Cipher
b) Plain Text
c) Key
d) Cipher
View Answer

Answer: c
Explanation: The key is the unique piece of information. It is used to create the cipher text and
decrypt it back.

advertisement

4. Study of creating and using encryption and decryption techniques.


a) Cipher
b) Cryptography
c) Encryption
d) Decryption
View Answer

Answer: b
Explanation: It is called as cryptography. It is the study of creating and using the encryption
techniques.
5. The process of transforming plain text into unreadable text.
a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
View Answer

Answer: b
Explanation: Encryption is the process of transforming readable text i.e. plain text to make it
unreadable to anyone except those possessing special knowledge, usually referred to as a key.

6. An algorithm used in encryption is referred to as cipher.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. Cipher is the algorithm used in encryption. Encryption is making
readable text as unreadable to keep it secured.

7. A process of making the encrypted text readable again.


a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
View Answer

Answer: a
Explanation: The reverse process is called decryption. It is the process of making the information
readable again.

Computer Fundamentals Questions and Answers – Cryptography

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Cryptography”.

1. These ciphers replace a character or characters with a different character or characters, based on
some key.
a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Mono alphabetic substitution based
View Answer

Answer: d
Explanation: In mono alphabetic substitution-based cipher, a character is replaced with some other
character or multiple characters, based on some key.

2. Encryption is the study of creating and using decryption techniques.


a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. Cryptography is the study of creating and using encryption and
decryption techniques.

3. A type of cipher that uses multiple alphabetic strings.


a) Substitution based
b) Transposition-based
c) Polyalphabetic substitution based
d) Mono alphabetic substitution based
View Answer

Answer: c
Explanation: These ciphers are similar to that of mono alphabetic ciphers. Multiple strings are used
to encode the plain text.

advertisement

4. An encryption technique with 2 keys is ______________


a) Monoalphabetic Cipher
b) Cryptography
c) Private key cryptography
d) Public key cryptography
View Answer

Answer: d
Explanation: It is called as public key cryptography. It has 2 keys: a private key and a public key.

5. In public key cryptography, a key that decrypts the message.


a) public key
b) unique key
c) private key
d) security key
View Answer

Answer: c
Explanation: Public key cryptography has 2 keys. They are private key and a public key. The public key
encrypts the message. The private key decrypts the message.

6. DES stands for?


a) Data Encryption Standard
b) Data Encryption Statistics
c) Data Encryption System
d) Data Encryption Sequence
View Answer

Answer: a
Explanation: DES stands for Data Encryption Standard. It was created in 1977 and went into
operation from 1990s.

7. Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______
levels of encryption.
a) 64
b) 8
c) 16
d) 4
View Answer

Answer: c
Explanation: The answer is 16. It was subjected to 16 levels of encryption. DES is the data encryption
standard.

8. Triple-DES has ______ keys.


a) 1
b) 2
c) 5
d) 4
View Answer

Answer: b
Explanation: There are 2 keys in triple DES as well. The private and the public key. It can also have 3
unique keys.

9. Encryption standard that is selected by the US government to replace DES.


a) AES
b) BES
c) CES
d) DES
View Answer

Answer: a
Explanation: AES is Advanced Encryption Standard. It was selected by the US government. It is used
to replace DES.

10. An electronic document that establishes your credentials when you are performing transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate
View Answer

Answer: d
Explanation: Digital certificate is an electronic document that is responsible for secure internet
transactions.

Computer Fundamentals Questions and Answers – Augmented Reality

This set of Computer Fundamentals MCQs focuses on “Augmented Reality”.

1. A field of technology that deals with a combination of real world and the data generated from
computer.
a) ML
b) AI
c) AR
d) IoT
View Answer

Answer: c
Explanation: AR that is Augmented Reality is a field of technology that deals with a combination of
real world and the data generated from computer.

2. AR is interactive in real-time.
a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. Augmented Reality is the field of computer research that deals
with the combination of real-world and computer generated data.

3. Technologies that completely involve a user inside a synthetic environment.


a) AR
b) VR
c) AI
d) ML
View Answer

Answer: b
Explanation: The answer is VR or Virtual Reality. VR technologies are known for immersing a user
inside a synthetic environment. While immersed, the user cannot see the real world around him.

advertisement

4. Technologies that allow the user to see the real world, with virtual objects composited in the real
world.
a) AR
b) VR
c) AI
d) SR
View Answer

Answer: a
Explanation: Augmented Reality (AR) allows a user to see real world, with virtual objects
superimposed or composited with the real world.

5. A ______________________ is a display device, worn on head as a part of helmet that has a small
display optic.
a) HD
b) MD
c) HMD
d) ARD
View Answer

Answer: c
Explanation: HMD is the head-mounted display, worn on head as a part of helmet that has a small
display optic. HTC Vive, Samsung GearVR are examples of HMDs available today.
6. Wearable computing device in the form of computerized eyeglasses.
a) HMD
b) Helmets
c) Smart Glasses
d) VR Glasses
View Answer

Answer: c
Explanation: Smart glasses are also called as optical head mounted displays. (OHMD), it has the
capability of reflecting projected images as well as allowing users to see through it.

7. A tracking based on geo-location information.


a) Location based
b) Markerless
c) Marker based
d) GPS
View Answer

Answer: a
Explanation: Location based tracking is based on geo-location information obtained from device’s
location sensors. (Longitude, latitude, altitude etc).

8. SLAM stands for?


a) Simultaneous localization and mapping
b) System localization and mapping
c) Simultaneous localization and maintenance
d) System localization and maintenance
View Answer

Answer: a
Explanation: SLAM is abbreviated for Simultaneous localization and mapping. It is a technique used
by robots and autonomous vehicles to build a map within the unknown environment.

9. A technique that enables light field which is generally the product of a light source scattered off
objects.
a) AES
b) Holography
c) Cryptography
d) Gyrography
View Answer

Answer: b
Explanation: Holography enables a light field. It is to be recorded and later reconstructed when the
original light field is no longer present.

10. A _______ can be recorded using a normal light source.


a) Holograph
b) Photography
c) Holography
d) Photograph
View Answer
Answer: d
Explanation: A photograph can be captured using a normal light source. A laser is required to record
a hologram.

Computer Fundamentals Questions and Answers – Waterfall Model

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Waterfall Model”.

1. A model that is the demo implementation of the system.


a) waterfall
b) prototype
c) incremental
d) agile
View Answer

Answer: b
Explanation: Prototype is the demo implementation so that the customer gets a brief idea of his
product. It is generally used when the customer requirements are not clear.

2. Maintenance is the final phase in waterfall model.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. This is the phase in which the completed software product is
handed over to the client.

3. A stage in which individual components are integrated and ensured that they are error-free to
meet customer requirements.
a) Coding
b) Testing
c) Design
d) Implementation
View Answer

Answer: b
Explanation: Hardware and software components are tested individually. Testing stage in which
individual components are integrated and ensured that they are error-free to meet customer
requirements.

advertisement

4. ___________ is a step in which design is translated into machine-readable form.


a) Design
b) Conversion
c) Debugging
d) Coding
View Answer
Answer: d
Explanation: Coding is the step in which design in translated into machine-readable form. If design is
efficient, coding can be done effectively.

5. The customer requirements are broken down into logical modules for ease of _______________
a) inheritance
b) design
c) editing
d) implementation
View Answer

Answer: d
Explanation: The requirements are broken down for ease of implementation. Hardware and software
requirements are identified and designed accordingly.

6. What do you call a technical person who is capable of understanding the basic requirements?
a) team leader
b) analyst
c) engineer
d) stakeholder
View Answer

Answer: b
Explanation: The person is called an analyst. An analyst is a software engineering who is responsible
for requirements gathering.

7. A step in waterfall model that involves a meeting with the customer to understand the
requirements.
a) Requirement Gathering
b) SRS
c) Implementation
d) Customer review
View Answer

Answer: a
Explanation: A waterfall model involves requirement gathering as its first step. This is the most
important phase. It is important to understand the customer requirements.

8. Methodology in which project management processes were step-by step.


a) Incremental
b) Waterfall
c) Spiral
d) Prototyping
View Answer

Answer: b
Explanation: Waterfall model is based on step-by step completion of the project. Every step is done
individually.

9. An individual who plans and directs the work.


a) Stakeholder
b) Project manager
c) Team leader
d) Programmer
View Answer

Answer: b
Explanation: Project Manager is the one who plans and designs the project. Team leader is the one
who provides guidance, instruction, direction and leadership to a group of individuals.

10. A planned program if work that requires a definitive amount of time, effort and planning to
complete.
a) Problem
b) Project
c) Process
d) Program
View Answer

Answer: b
Explanation: The answer is Project. A project is a program which is something which is planned and
needs effort and time to complete.

Computer Fundamentals Questions and Answers – Software Testing

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Software Testing”.

1. A set of activities that ensure that software correctly implements a specific function.
a) verification
b) testing
c) implementation
d) validation
View Answer

Answer: a
Explanation: Verification ensures that software correctly implements a specific function. It is a static
practice of verifying documents.

2. Validation is computer based.


a) True
b) False
View Answer

Answer: a
Explanation: The statement is true. Validation is a computer based process. It uses methods like black
box testing, gray box testing, etc.

3. ___________ is done in the development phase by the debuggers.


a) Coding
b) Testing
c) Debugging
d) Implementation
View Answer
Answer: c
Explanation: Coding is done by the developers. In debugging, the developer fixes the bug in the
development phase. Testing is conducted by the testers.

advertisement

4. Locating or identifying the bugs is known as ___________


a) Design
b) Testing
c) Debugging
d) Coding
View Answer

Answer: b
Explanation: Testing is conducted by the testers. They locate or identify the bugs. In debugging
developer fixes the bug. Coding is done by the developers.

5. Which defines the role of software?


a) System design
b) Design
c) System engineering
d) Implementation
View Answer

Answer: c
Explanation: The answer is system engineering. System engineering defines the role of software.

6. What do you call testing individual components?


a) system testing
b) unit testing
c) validation testing
d) black box testing
View Answer

Answer: b
Explanation: The testing strategy is called unit testing. It ensures a function properly works as a unit.

7. A testing strategy that test the application as a whole.


a) Requirement Gathering
b) Verification testing
c) Validation testing
d) System testing
View Answer

Answer: d
Explanation: Validation testing tests the application as a whole against the user requirements. In
system testing, it tests the application in the context of an entire system.

8. A testing strategy that tests the application in the context of an entire system.
a) System
b) Validation
c) Unit
d) Gray box
View Answer

Answer: a
Explanation: In system testing, it tests the application in the context of an entire system. The
software and other system elements are tested as a whole.

9. A ________ is tested to ensure that information properly flows into and out of the system.
a) module interface
b) local data structure
c) boundary conditions
d) paths
View Answer

Answer: a
Explanation: A module interface is tested to ensure that information properly flows into and out of
the system.

10. A testing conducted at the developer’s site under validation testing.


a) alpha
b) gamma
c) lambda
d) unit
View Answer

Answer: a
Explanation: Alpha testing is conducted at developer’s site. It is conducted by customer in
developer’s presence before software delivery.

Computer Fundamentals Questions and Answers – Concepts of OOP

This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Concepts of OOP”.

1. A ______________ represents the need of information in the program without the presenting the
details.
a) abstraction
b) polymorphism
c) implementation
d) class
View Answer

Answer: a
Explanation: Abstraction is a concept that involves hiding the details and giving only the necessary
information to the user. It increases the power of a programming language.

2. Abstraction combines the data and functions into a single unit called a class.
a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. Data abstraction involves hiding the details and giving only the
necessary information to the user.

3. The process of forming a new class from an existing class.


a) Abstraction
b) Polymorphism
c) Inheritance
d) Implementation
View Answer

Answer: c
Explanation: The answer is inheritance. The base class is the parent class and the new class is called
the child class.

advertisement

4. This concept allows routines to use data again at different times.


a) Abstraction
b) Polymorphism
c) Inheritance
d) Implementation
View Answer

Answer: b
Explanation: Polymorphism is a concept in OOP wherein different functions can be used again at
different times.

5. The ability for programmers to use the same written and debugged existing class.
a) Reusability
b) Design
c) Debugging
d) Implementation
View Answer

Answer: a
Explanation: The programmer can add features to the existing class. The programmer on further
developing the application, and allowing users to achieve increased performance.

6. A concept that combines data and functions into a single unit called class.
a) inheritance
b) encapsulation
c) polymorphism
d) abstraction
View Answer

Answer: b
Explanation: Encapsulation enables the important concept of data hiding possible. It combines data
and functions into a single unit.

7. __________ represents a particular instance of a class.


a) module
b) block
c) object
d) token
View Answer

Answer: c
Explanation: An object is an instance of the class. The data members are accessed with the help of
objects.

8. A basic unit of object-oriented programming.


a) module
b) block
c) object
d) token
View Answer

Answer: c
Explanation: In OOP, the basic unit is an object. Objects are identified by its unique name.

9. A procedural programming follows ___________ approach.


a) top-down
b) bottom-up
c) left-right
d) right-left
View Answer

Answer: a
Explanation: A procedural programming follows top-down approach. The main focus is on the
functions. It has a lot of global variable.

10. A programming technique in which the focus is on doing things.


a) object oriented
b) procedural
c) logical
d) structural
View Answer

Answer: b
Explanation: In procedural programming, the focus is on doing things(functions). It follows top-down
approach.

You might also like