Computer Fundamentals Questions and Answers Part 4
Computer Fundamentals Questions and Answers Part 4
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Transmission Modes”.
Answer: c
Explanation: The term transmission mode defines the direction of flow of information between two
communication devices. It tells the direction of signal flow.
Answer: a
Explanation: The statement is true. The term transmission mode defines the direction of flow of
information between two communication devices. It tells the direction of signal flow between two
devices.
Answer: a
Explanation: There are three modes of transmission: simplex, half duplex and full duplex.
Transmission modes tell the direction of signal flow between two devices.
advertisement
Answer: a
Explanation: The answer is simplex. Simplex generally involves dedicated circuits. TV broadcasting is
an example.
5. A transmission mode that can transmit data in both the directions but transmits in only one
direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: b
Explanation: The half duplex mode supports two way traffic but only in one direction at a time. The
interactive transmission of data within a time sharing system may be best suited to half-duplex lines.
Answer: a
Explanation: It involves simplex duplex transmission. Another example of a simplex duplex
transmission is loudspeaker system.
Answer: c
Explanation: Telephone networks operate in full duplex mode. It can transmit data in both the
directions.
Answer: c
Explanation: Analog transmission is a technique of transmitting voice, data, image, signal or video
information. Fire alarm systems work in the same way.
Answer: b
Explanation: A walkie-talkie operates in half duplex mode. It can only send or receive a transmission
at any given time.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Modulation Techniques”.
Answer: a
Explanation: A coaxial cable has a bandwidth of 100’s of Mhz. Baseband speed is in a few KHz.
Multiplexing improves channel bandwidth utilization.
Answer: a
Explanation: The statement is true. The TDM technique is based on sampling and they occupy
adjacent slots and are transmitted in a sequence.
Answer: c
Explanation: The carrier wave is generally a sine wave. Carrier wave is used to transfer the signal
from source to destination.
advertisement
4. Controlling the phase is referred as __________
a) modulation
b) half modulation
c) amplitude modulation
d) phase modulation
View Answer
Answer: d
Explanation: It is referred to as phase modulation. When there is a change in amplitude, it is referred
to as amplitude modulation.
5. A transmission mode that can transmit data in both the directions but transmits in only one
direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: b
Explanation: The half duplex mode supports two way traffic but only in one direction at a time.
Answer: b
Explanation: TDM which stands for Time division multiplexing is based on sampling which is a
modulation technique.
7. An example of FDM:
a) broadcast radio
b) telephone
c) machines
d) semi-duplex
View Answer
Answer: a
Explanation: Broadcast radio is an example of FDM. This allows several messages to be translated
from baseband.
Answer: d
Explanation: Multiplexing is a modulation technique that improves channel bandwidth utilization.
10. The purpose of communication system is to transfer information from _______ to the
destination.
a) user
b) source
c) system
d) station
View Answer
Answer: b
Explanation: The answer is source. A communication system transfers information from source to the
destination.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Multiplexing”.
Answer: b
Explanation: It stands for Wavelength division multiplexing. It has same general architecture as FDM.
FDM is frequency division multiplexing.
Answer: a
Explanation: The statement is true. The TDM technique is based on sampling and they occupy
adjacent slots and are transmitted in a sequence.
3. In this type of multiplexing time slots are preassigned to sources and fixed.
a) TDM
b) Synchronous TDM
c) Asynchronous TDM
d) FDM
View Answer
Answer: b
Explanation: TDM is time division multiplexing. Data rate of medium exceeds data rate of digital
signal to be transmitted.
advertisement
Answer: a
Explanation: It is referred to as frequency modulation. When there is a change in frequency, it is
referred to as frequency modulation.
Answer: d
Explanation: Pulse stuffing is a technique that can be a solution to the problem of synchronizing data
sources. In pulse stuffing, the outgoing data rate is higher than sum of incoming rates.
Answer: b
Explanation: In Synchronous TDM, many time slots are wasted. Other techniques can help overcome
this problem.
8. A technique that allocates time slots dynamically.
a) TDM
b) WDM
c) Dynamic TDM
d) Statistical TDM
View Answer
Answer: d
Explanation: A cable modem has two dedicated channels from cable TV provider dedicated to data
transfer. One in each direction.
10. In this technique, there is a link between subscriber and network and a local loop.
a) SSDL
b) DSDL
c) ASDL
d) TSDL
View Answer
Answer: c
Explanation: In ASDL, there is a link between the subscriber and the network. It uses currently
installed twisted pair cable.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Network Topologies”.
1. A topology that is responsible for describing the geometric arrangement of components that make
up the LAN.
a) Complex
b) Physical
c) Logical
d) Incremental
View Answer
Answer: b
Explanation: It is referred to as a physical LAN topology. LAN stands for Local Area Network.
3. _____ LAN topology describes the possible connections between pairs of networked end-points
that can communicate.
a) Complex
b) Physical
c) Logical
d) Incremental
View Answer
Answer: c
Explanation: A logical LAN topology describes the possible connections. LAN stands for Local Area
Network.
advertisement
4. A term that refers to the way in which the nodes of a network are linked together.
a) network
b) topology
c) connection
d) interconnectivity
View Answer
Answer: b
Explanation: Topology is a term that refers to the way in which the nodes are connected. There are 4
major topology networks.
Answer: b
Explanation: A hybrid network consists of multiple topologies. It can comprise a ring, a star and other
topologies. We call this arrangement as a hybrid network.
Answer: c
Explanation: They are referred to as the nodes. There are several topologies designed for
arrangements of these nodes like bus, star, etc.
7. A topology that involves Tokens.
a) Star
b) Ring
c) Bus
d) Daisy Chaining
View Answer
Answer: b
Explanation: Ring topology involves sending and receiving of data with the help of tokens. Ring
started out as a simple peer-to-peer LAN topology.
8. A ____________WAN can be developed using leased private lines or any other transmission
facility
a) Hybrids
b) peer-to-peer
c) Two-tiered
d) Three-tiered
View Answer
Answer: b
Explanation: A peer-to-peer WAN topology is a relatively simple way of interconnecting a small
number of sites. It has the least-cost solution for WANs that contain a small number of
internetworked locations.
Answer: c
Explanation: The correct option is Daisy chain. This simple approach uses ports on existing hubs for
interconnecting the hubs.
10. A piece of information which is sent along with the data to the source computer.
a) data
b) module
c) token
d) element
View Answer
Answer: c
Explanation: Token is the information that is sent to the source computer along with the data. This
token is then passed to the next node.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Internetworking”.
1. Configuration where many independent computer systems are connected.
a) Complex
b) Distributed
c) Cloud
d) Incremental
View Answer
Answer: b
Explanation: Distributed configuration has many systems connected, and messages, programs, etc
are transmitted between cooperating computer systems.
2. Partial mesh is a highly flexible topology that can take a variety of very different configurations.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Partial mesh is a highly flexible topology that can take a variety of
very different configurations. The routers are tightly coupled than the basic topologies. But they are
not fully interconnected, as would be the case in a fully meshed network.
3. Components used for interconnecting dissimilar networks that use different communication
protocols.
a) Switches
b) Gateways
c) Routers
d) Bridges
View Answer
Answer: b
Explanation: Gateways are used for this purpose. Gateways interconnect dissimilar networks,
protocol conversion is performed by them.
advertisement
Answer: b
Explanation: A two-tiered topology is a modified version of the basic star topology. Rather than single
concentrator routers, two or more routers are used.
Answer: c
Explanation: They are referred to as the routers. They are used for interconnecting those networks
that use the same high-level protocols above network layer.
Answer: b
Explanation: Ring topology involves sending and receiving of data with the help of tokens. Ring
started out as a simple peer-to-peer LAN topology.
Answer: a
Explanation: Bridges operate at the bottom two layers of the OSI model. It connects networks that
use the same communication protocols above data-link layer.
Answer: a
Explanation: Connecting two or more networks to form a single network is called internetworking
and the resultant network is called internetwork.
Answer: c
Explanation: OSI is open system interconnection. It is a framework for defining standards for linking
heterogeneous computers in a packet switched network.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “The
History of Internet”.
Answer: a
Explanation: ARPANET stands for Advanced Research Project Agency Network. It was developed in
late 1960s under ARPA (Advanced Research Projects Agency).
Answer: a
Explanation: The statement is true. Obviously, Internet is so widespread; it can help us in all the
possible ways. It can predict the weather, play music, etc.
3. In this technique, there is no direct contact between users and their programs during execution.
a) Time Sharing
b) Batch Processing
c) System Processing
d) Message Passing
View Answer
Answer: b
Explanation: In the Batch Environment, there is no direct interaction between users and their
programs during execution.
advertisement
5. A type of technique in which dumb terminals are connected to a central computer system.
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
View Answer
Answer: a
Explanation: This happens in time sharing. In this, users were able to interact with the computer and
could share its information processing resources.
Answer: b
Explanation: TCP stands for transmission control protocol. It basically allows different networks to
interconnect.
Answer: a
Explanation: It was a telegraph. Invented in the 1840s. Used extensively by the U.S. Government.
Answer: a
Explanation: Packet switching was developed in 1964. In packet switching, the message is broken into
parts and then sent over independently.
Answer: a
Explanation: The answer is software reliability. It is estimated using historical and development data.
Answer: d
Explanation: DARPA (Defense Advanced Research Projects Agency) contracted with BBN (Bolt,
Beranek & Newman) to create ARPAnet.
Computer Fundamentals Questions and Answers – The Internet and its Services
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “The
Internet and its Services”.
1. A network that links many different types of computers all over the world.
a) Intranet
b) Internet
c) Arpanet
d) LAN
View Answer
Answer: b
Explanation: Internet is a network of computers that links many different types of computers. It is a
network of network sharing a common mechanism for addressing computers.
Answer: a
Explanation: The statement is true. ARPANET is the first WAN i.e., Wide Area network that had only
four sites in 1969 for interconnecting computers.
3. A service that allows a user to log in into another computer somewhere on the Internet.
a) Telnet
b) FTP
c) e-mail
d) UseNet
View Answer
Answer: a
Explanation: Telnet is the answer. It is a service that enables the user to log into another computer
somewhere on the Internet.
advertisement
Answer: a
Explanation: The answer is FTP. FTP stands for File Transfer Protocol. It allows the user to move a file
from one computer to another on the internet.
Answer: b
Explanation: Anonymous FTP files are called publicly accessible files because they can be accessed by
any user on the Internet.
Answer: b
Explanation: TCP stands for transmission control protocol. It basically allows different networks to
interconnect.
Answer: b
Explanation: The system is the web server. HTTP stands for Hypertext transmission protocol.
9. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
d) WWW
View Answer
Answer: c
Explanation: Web Browsers help the user to maintain a personal favorite list of URLs. Also, allows the
user to download information on various formats.
Answer: a
Explanation: WWW specifies the URL of a website and allows the user to access information. URL
stands for Uniform Resource Locator.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“WWW”.
Answer: c
Explanation: Web works on the client server model. Client and server operate on machines which are
able to communicate through a network.
2. In the Client-server model, the client receives a request from the server.
a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. The server receives a request from the client. It then performs
the requested work.
Answer: d
Explanation: Browser is the answer. Browser is a type of client and it is not a server. File, web and
name are the types of servers.
advertisement
Answer: a
Explanation: The answer is <scheme>. In general, http is used. Others like file and ftp can also be
used.
Answer: b
Explanation: <pathname> tells the server where to find the file name. It is an important part of the
URL format.
Answer: b
Explanation: Apache is a type of web server. It is an application which waits for client requests,
fetches requested documents from disk and transmits them to the client.
Answer: d
Explanation: Any computer that has access to the web server is called the web client. Web server is
any computer that uses the HTTP protocol.
9. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
d) WWW
View Answer
Answer: c
Explanation: Web Browsers help the user to maintain a personal favorite list of URLs. Also, allows the
user to download information on various formats.
Answer: c
Explanation: HTML(Hypertext Markup language) is based on SGML. SGML stands for Standard
Generalized Markup Language.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “FTP &
HTTP”.
1. A program that can retrieve files from the world wide web and render text, images or sounds
encoded in the files.
a) Browser
b) Internet
c) Server
d) Web Server
View Answer
Answer: a
Explanation: A browser or a web browser is a program that can retrieve files from the world wide
web. Certain examples are IE, Mozilla, etc.
Answer: a
Explanation: The statement is true. HTML stands for Hyper Text Markup Language. It is a text file
containing small markup tags.
Answer: b
Explanation: Others except web are web browsers. Web is a type of server. Application that works on
client requests.
advertisement
4. Both client and server release _________ connection after a page has been transferred.
a) IP
b) TCP
c) Hyperlink
d) Network
View Answer
Answer: b
Explanation: The answer is TCP. TCP stands for Transmission Control Protocol. Servers receive
requests from clients.
5. In HTML, the tags that tell the browser how to display the page.
a) markup
b) style
c) body
d) head
View Answer
Answer: a
Explanation: Markup is a general term used to refer the types of tags in HTML. The markup tags tell
the browser how to display the page.
Answer: b
Explanation: FTP stands for File Transfer Protocol. It is a type of internet service use for the
transmission of files.
Answer: b
Explanation: <cite> is a container tag in html that is citation generally in italics. Other tags like
<em>or emphasize is also used for this purpose.
9. A _________ partitions a web browser window so that multiple web documents can be displayed
simultaneously.
a) Frame
b) set
c) Frameset
d) div
View Answer
Answer: c
Explanation: A frameset partitions a web browser window so that multiple web documents can be
displayed simultaneously. Frameset can have attributes like cols.
10. The _________ attribute specifies the web page to be placed in the frame initially.
a) name
b) src
c) cols
d) rows
View Answer
Answer: b
Explanation: The src attribute or the source specifies the web page to be placed in the frame initially.
It may be subsequently overwritten.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Abbreviations Related to Internet”.
1. XML stands for?
a) Extensions Made Language
b) Extensible Markup Language
c) Extensible Major Language
d) Extensible Minor Language
View Answer
Answer: b
Explanation: XML stands for Extensible Markup Language. It allows information to be shared among
different computer systems on the Internet.
Answer: b
Explanation: The statement is false. AAA stands for Autonomous Administrative Authority.
3. API is?
a) Advanced Processing Information
b) Application Processing Information
c) Application Programming interface
d) Application Processing Interface
View Answer
Answer: c
Explanation: API is the application programming interface. It is a set of instructions that allow the
creation of applications.
advertisement
Answer: d
Explanation: The answer is Global System for Mobile Telecommunications. It uses a variation of
multiple access on the basis of time and is widely used in Europe.
5. IN stands for?
a) Input
b) InterNet
c) Intelligent Network
d) IntraNet
View Answer
Answer: c
Explanation: IN stands for Intelligent Network. It is a telephone network that provides technical
services.
Answer: b
Explanation: FTP stands for File Transfer Protocol. It is a type of internet service use for the
transmission of files.
Answer: a
Explanation: PDU stands for Protocol Data Unit. It is transmitted as a single unit to other units in a
computer network.
Answer: a
Explanation: <strong> is a container tag in html that is similar to bold. It makes the text more
valuable as well as bold.
9. ISP is?
a) Intranet System Processing
b) Internet Service Provider
c) Intelligent System Processing
d) Intranet Service Provider
View Answer
Answer: b
Explanation: ISP stands for Internet Service provider. It is a service that provides access to the
internet.
Answer: b
Explanation: The answer is network. NE is the network element. It is any logical entity.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “Text
Media”.
Answer: d
Explanation: It is media literacy. It is the ability to access, analyze, evaluate and produce media. It is
the process of becoming active, rather than passive, consumers of media.
2. Media literacy can help youth and adults understand how media shapes our culture.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Media literacy also develops our critical thinking. It also helps in
the better understanding of how media shapes our culture.
3. The analysis of _________ is a process of deconstruction that investigates the operations of texts,
their constructions, the ways they produce meanings, what those meanings may be.
a) Media
b) Web
c) IE
d) Text
View Answer
Answer: d
Explanation: The analysis of texts is a process of deconstruction that investigates the operations of
texts, their constructions, the ways they produce meanings, what those meanings may be. However,
they also warn of the dangers of making assumptions about the validity of any one analytic method.
advertisement
4. A type of analysis that attends to the repetition and frequency of features, their proportions within
the text, and consequent assumptions about significance.
a) Media
b) Content
c) Linguistic
d) Network
View Answer
Answer: b
Explanation: The answer is Content. Linguistic analysis might concentrate on the potential effects of
style of address. Content analysis attends to the repetition and frequency of features, their
proportions within the text, and consequent assumptions about significance.
5. __________ analysis regards texts as collections of signs or paradigms and possible meanings,
operating within the bounds of various codes.
a) Semiotic
b) Style
c) Linguistic
d) Text
View Answer
Answer: a
Explanation: Semiotic analysis regards texts as collections of signs or paradigms and possible
meanings, operating within the bounds of various codes.
6. This part of image analysis refers to those primary signs, often part of the technique of
photography, which are about how the image is made.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: a
Explanation: Treatment in image analysis refers to those primary signs, often part of the technique of
photography, which is about how the image is made.
7. In image analysis, this part refers to objects represented within the image, which may signify to us
because of, for example, their symbolic power or because of their composition in relation to each
other.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: c
Explanation: Content refers to objects represented within the image. Treatment in image analysis
refers to those primary signs, often part of the technique of photography, which are about how the
image is made.
9. __________ describes the effect of involving the reader with the story, of constructing it as truth.
a) Narration
b) Identification
c) Plot
d) Characters
View Answer
Answer: b
Explanation: Identification describes the effect of involving the reader with the story, of constructing
it as truth. It produces a meaning of truth, a belief in the validity of the text and of all the other
meanings that we make from it.
10. The notion of norms also links to the idea that representations are given force through a process
of:
a) naturalization
b) identification
c) media
d) casting
View Answer
Answer: a
Explanation: The notion of norms also links to the idea that representations are given force through a
process of naturalization.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Graphics Media”.
1. The media texts may throw up discourses and are called ____________
a) Binary oppositions
b) Violations
c) Oppositions
d) Media Illiteracy
View Answer
Answer: a
Explanation: Some texts may also throw up discourses and their meanings if you attend to what are
called binary oppositions. The discourse is also marked by what it is not, by what it is opposed to.
2. In terms of image analysis, it is important to attend to primary level signs in visual codes, most
obviously for examples of still photography.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. This approach categorizes the image analysis into three: position,
treatment and content.
3. The notion of __________ is one which is especially associated with semiotics and with genres.
a) Media
b) Web
c) codes
d) Text
View Answer
Answer: c
Explanation: The notion of codes is one which is especially associated with semiotics and with
genres. The textual codes may be summarized into: written, spoken, non-verbal and visual.
advertisement
4. The idea of _________is central to understanding the production of meaning through texts.
a) Identity
b) Content
c) Represntation
d) Network
View Answer
Answer: c
Explanation: The idea of representation is central to understanding the production of meaning
through texts. Texts are nothing but representations in both a material and an ideological sense.
Answer: b
Explanation: ICT stands for Information, Communication and Technology. ICT is responsible for
providing access to information.
6. A system of interlinked documents, websites, portals etc. accessed through the Internet.
a) WWW
b) Internet
c) Web
d) Media
View Answer
Answer: a
Explanation: World Wide Web a system of interlinked documents, websites, portals etc. accessed
through the Internet. Since these links are not physical or mechanical, they are called `virtual’ links or
`hyperlinks’.
7. In image analysis, this part refers to objects represented within the image, which may signify to us
because of, for example, their symbolic power or because of their composition in relation to each
other.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: c
Explanation: Content refers to objects represented within the image. Treatment in image analysis
refers to those primary signs, often part of the technique of photography, which are about how the
image is made.
Answer: c
Explanation: Web directory is a dedicated website for providing specialized information in a
particular field. Such directories are useful for educational purpose.
9. _________ are the web-based interactive applications to express and share your ideas and
thoughts with interested people.
a) Website
b) Blog
c) Web directories
d) Corporate Websites
View Answer
Answer: b
Explanation: Blogs are the web-based interactive applications to express and share your ideas and
thoughts with interested people. It is an open platform that can be used as on-line diaries, a journal,
or editorial.
10. A term used in the context of web design to suggest the path that user takes while browsing a
website.
a) navigation
b) identification
c) graphics media
d) casting
View Answer
Answer: a
Explanation: Navigation is a term used in the context of web design to suggest the path that user
takes while browsing a website.
Answer: a
Explanation: It stands for Head Mounted Display. A kind of stereo display with two miniature screens
and depth perception.
2. In terms of image analysis, it is important to attend to primary level signs in visual codes, most
obviously for examples of still photography.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. This approach categorizes the image analysis into three: position,
treatment and content.
Answer: b
Explanation: Motion trackers keep track of position. Other devices are like head trackers and body
trackers.
advertisement
Answer: c
Explanation: BOOM stands for Binocular Omni-Orientation Monitor. It is a type of Stereoscopic
display. Guidance of the box by the users.
5. A term for Illusion of immersion by projecting stereo images on the walls and floor of a room.
a) CAVE
b) BOOM
c) GUI
d) HMD
View Answer
Answer: a
Explanation: CAVE is the term. CAVE stands for Cave Automatic Virtual Environment.
6. It is a mediated environment which creates the sensation in a user of being present in a (physical)
surrounding.
a) WWW
b) VR
c) HMD
d) GUI
View Answer
Answer: b
Explanation: VR or virtual reality is a mediated environment which creates the sensation in a user of
being present in a (physical) surrounding.
7. A term to describe the extent to which a user can modify form and content of a mediated
environment.
a) Vividness
b) Richness
c) Interactivity
d) Mapping
View Answer
Answer: c
Explanation: Interactivity is the extent to which a user can modify form and content of a mediated
environment. It comprises speed and mapping.
8. A type of VR environment in which subjects are visually isolated from the real environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer
Answer: a
Explanation: In immersive VR, subjects are visually isolated from the real environment. A virtual
scene is responding to the subjects actions.
9. In this type of VR environment, the three-dimensional scene is considered as a part of the physical
environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer
Answer: c
Explanation: This happens in non-immersive Virtual environment. Also, the subjects do fully respond
in the real environment.
10. In this type of VR environment, the subjects can perform both in the real and virtual
environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer
Answer: b
Explanation: The Semi-Immersive Virtual Reality provides an experience partially based in a virtual
environment.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Animations”.
Answer: b
Explanation: Animation is basically a form of pictorial presentation. It has become the most
prominent feature of technology-based learning environments.
Answer: a
Explanation: The statement is true. Walt Disney along with his colleagues had a problem with
creating realistic animation and how to conserve time while creating it. Therefore, they came up with
a great solution which can be considered another innovation in the field of animation called the
multiplane camera.
Answer: b
Explanation: It refers to simulated motion pictures showing movement of drawn objects. Animation
is a form of pictorial presentation.
advertisement
4. A ____________(invented by Paul Roget in 1828) is a simple mechanical toy which creates the
illusion of movement.
a) Binocular
b) Zoetrope
c) Thaumatrope
d) BOOM
View Answer
Answer: c
Explanation: A thaumatrope (invented by Paul Roget in 1828) is a simple mechanical toy. It creates
the illusion of movement. Thaumatrope means “wonder turner”.
Answer: a
Explanation: In 1843, William Horner, a British mathematician invented the zoetrope. A zoetrope
produces an illusion of movement from a rapid succession of static pictures.
6. The ____________ is a piece of equipment designed to make cartoons more realistic and
enjoyable. It uses stacked panes of glass each with different elements of the animation.
a) Multiplane camera
b) VR
c) Thaumatrope
d) Phenakistoscope
View Answer
Answer: a
Explanation: The multiplane camera is a motion-picture camera that was used in the traditional
animation process that moves a number of pieces of artwork past the camera at various speeds and
at various distances from one another.
Answer: b
Explanation: J. Stuart Blackton made the first animated film in 1906. Humorous Phases of Funny
Faces was the first animation film.
Answer: a
Explanation: Humorous Phases of Funny Faces was the first animation film made by J. Stuart
Blackton. He was using a blackboard as his workplace together with chalk and an eraser as his main
tools.
9. ___________ animation is used to animate things that are smaller than life size.
a) Immersive
b) Claymotion
c) Stop motion
d) Augmented
View Answer
Answer: c
Explanation: Stop motion animation is used to animate things that are smaller than life size. Willis
Harold O’Brian pioneered motion picture special effects, which were perfected in stop motion.
Answer: b
Explanation: J. Stuart Blackton made the first animated film in 1906. The film was entitled Humorous
Phases of Funny Faces, and with this, he became known as the father of animation.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Generations of Computers”.
Answer: b
Explanation: Generation in computer terminology is a change in technology a computer is/was being
used. The term is used to distinguish between various hardware technologies.
Answer: b
Explanation: The statement is false. The third generation was based on integrated circuits.
3. The generation based on VLSI microprocessor.
a) 1st
b) 2nd
c) 3rd
d) 4th
View Answer
Answer: d
Explanation: The 4th gen was VLSI microprocessor based. The period of fourth generation: 1972-
1990.
advertisement
4. ______ generation of computer started with using vacuum tubes as the basic components.
a) 1st
b) 2nd
c) 3rd
d) 4th
View Answer
Answer: a
Explanation: First generation of computer started with using vacuum tubes as the basic components
for memory and circuitry for CPU(Central Processing Unit).
Answer: a
Explanation: Batch processing was mainly used in the 1st generation. In this generation Punched
cards, Paper tape, Magnetic tape Input & Output device were used.
6. ___________ is an emerging branch in computer science, which interprets means and method of
making computers think like human beings.
a) Block chain
b) VR
c) AI
d) Cloud computing
View Answer
Answer: c
Explanation: AI is an emerging branch in computer science, which interprets means and method of
making computers think like human beings.
Answer: a
Explanation: It stands for Ultra Large Scale Integration. It is a part of the fifth generation computers.
8. In this generation Time sharing, Real time, Networks, Distributed Operating System was used.
a) 1st
b) 2nd
c) 5th
d) 4th
View Answer
Answer: d
Explanation: The fourth generation of computers is marked by the use of Very Large Scale Integrated
(VLSI) circuits. In this generation Time sharing, Real time, Networks, Distributed Operating System
was used.
Answer: a
Explanation: High Level Language(HLL) has languages like FORTRAN, COBOL. HLL isn’t in machine
language. It is converted to machine language for further processing.
Answer: b
Explanation: The period of the 2nd generation is 1952-1964. The period of the first generation was
1942-1954.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Parallel Processing Systems”.
Answer: b
Explanation: The statement is false. Sequential programming specifically has single execution flow.
Answer: d
Explanation: Concurrency is the term used for the same. When several things are accessed
simultaneously, the job is said to be concurrent.
advertisement
Answer: b
Explanation: Parallelism leads naturally to Concurrency. For example, Several processes trying to
print a file on a single printer.
Answer: d
Explanation: Bit level parallelism is based on increasing processor word size. It focuses on hardware
capabilities for structuring.
Answer: a
Explanation: Instructional level uses micro architectural techniques. It focuses on program
instructions for structuring.
Answer: b
Explanation: MIPS stands for Millions of Instructions/sec. MIPS is a way to measure the cost of
computing.
8. The measure of the “effort” needed to maintain efficiency while adding processors.
a) Maintainablity
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer
Answer: c
Explanation: The measure of the “effort” needed to maintain efficiency while adding processors is
called as scalabilty.
9. The rate at which the problem size need to be increased to maintain efficiency.
a) Isoeffciency
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer
Answer: a
Explanation: Isoefficiency is the rate at which the problem size need to be increased to maintain
efficiency.
Answer: b
Explanation: In parallel processing, the several instructions are executed simultaneously.
Answer: d
Explanation: The RMI (Remote Method Invocation) is an API that provides a mechanism to create
distributed applications.
2. A remote object is an object whose method can be invoked from another virtual environment.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. JVM is java virtual environment. RMI uses stub and skeleton
object for communication with the remote object. A remote object is an object whose method can
be invoked from another virtual environment.
3. A typical _________ program creates some remote objects, makes references to these objects
accessible, and waits for clients to invoke methods on these objects.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
Answer: a
Explanation: A server program creates remote objects. It gives reference to these objects and then
waits for clients to invoke methods on these objects.
advertisement
4. A typical __________ program obtains a remote reference to one or more remote objects on a
server and then invokes methods on them.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
Answer: b
Explanation: A client program obtains a remote reference to one or more remote objects on a server.
It then invokes methods on them.
5. The ___________ layer, which provides the interface that client and server application objects use
to interact with each other.
a) Increasing
b) Count
c) Bit
d) Stub/skeleton
View Answer
Answer: d
Explanation: The stub or skeleton layer provides the interface that client and server application
objects use for interaction with each other.
Answer: d
Explanation: The transport protocol layer is the binary data protocol that sends remote object
requests over the wire. A client is any remote application that communicates with these server
objects.
Answer: d
Explanation: The remote reference layer is the middleware between the stub/skeleton layer and
underlying transport protocol.
Answer: b
Explanation: The stub is an object that acts as a gateway for the client side. The outgoing requests
are passed through the stub.
10. RMI uses stub and skeleton for communication with the ________ object.
a) client
b) remote
c) server
d) any
View Answer
Answer: b
Explanation: RMI uses stub and skeleton object for communication with the remote object. A remote
object is an object whose method can be invoked from another JVM.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on “Cloud
Computing”.
Answer: c
Explanation: Cloud computing is a paradigm of distributed computing to provide the customers with
on-demand, utility based computing services. Cloud users can provide more reliable, available and
updated services to their clients in turn.
Answer: a
Explanation: The statement is true. There are three types of users often called as cloud stakeholders.
Answer: b
Explanation: There are three types of stakeholders cloud providers, cloud users and the end users.
advertisement
4. These cloud services are of the form of utility computing i.e. the _________ uses these services
pay-as-you-go model.
a) Cloud providers
b) Clients
c) End users
d) Cloud users
View Answer
Answer: d
Explanation: The cloud users use these services pay-as-you-go model. The cloud users develop their
product using these services and deliver the product to the end users.
Answer: c
Explanation: There is no protected cloud. There are three types of cloud-private, public and hybrid.
6. In this type of cloud, an organization rents cloud services from cloud providers on-demand basis.
a) Private
b) Public
c) Protected
d) Hybrid
View Answer
Answer: b
Explanation: This happens in public cloud. Services are provided to the users using utility computing
model.
7. In this type of cloud, the cloud is composed of multiple internal or external cloud.
a) Private
b) Public
c) Protected
d) Hybrid
View Answer
Answer: d
Explanation: The hybrid cloud is composed of multiple internal or external clouds. This is the
scenario when an organization moves to public cloud computing domain from its internal private
cloud.
8. _____________ enables the migration of the virtual image from one physical machine to another.
a) visualization
b) virtualization
c) migration
d) virtual transfer
View Answer
Answer: b
Explanation: Virtualization enables the migration of the virtual image from one physical machine to
another. This feature is useful for cloud as by data locality lots of optimization is possible.
Answer: b
Explanation: Most of the cloud architectures are built on Grid architecture. Grid is a type of
distributed computing architecture where organizations owning data centers collaborate with each
other to have common benefits.
Answer: a
Explanation: SAAS is Software as a service. It delivers a single application through the web browser to
thousands of customers using a multitenant architecture.
This set of Basic Computer Fundamentals Questions and Answers focuses on “Types of Computers”.
Answer: a
Explanation: There are three types of computers basically on the basis of operation:
Analog, Digital and Hybrid.
Answer: b
Explanation: The statement is false. Analog Computer is a computing device that works on
continuous range of values. The results that are given by the analog computers will mostly be
approximate since they deal with quantities that keep on varying.
3. A computer that operates on digital data.
a) remote
b) hybrid
c) analog
d) digital
View Answer
Answer: d
Explanation: The digital computer uses binary number system in which there are only two digits 0
and 1. Each one is called a bit.
advertisement
Answer: b
Explanation: Hybrid computer is mostly used with automatic operations of complicated physical
processes and the machines.
5. ______________ are used for solving complex application such as Global Weather Forecasting.
a) Super Computers
b) Public computers
c) Mobile computers
d) Hybrid computers
View Answer
Answer: a
Explanation: Super computers are used with complex applications like Global Weather Forecasting,
Creating graphic images, engineering design and testing, space exploration, etc.
6. The invention of _______________ gave birth to the much cheaper micro computers.
a) Mainframes
b) Microcomputers
c) Microprocessors
d) PDAs
View Answer
Answer: c
Explanation: The invention of microprocessor (also called as single chip CPU) gave birth to the much
cheaper microcomputers.
7. They can operate on batteries and hence are very popular with travelers.
a) Mainframes
b) Laptops
c) Microprocessors
d) Hybrid
View Answer
Answer: b
Explanation: Laptops can operate on batteries and hence are very popular with travelers. The screen
folds down onto the keyboard when not in use.
Answer: c
Explanation: PDAs are also called as Handheld. They are small and can be carried anywhere.
Answer: d
Explanation: PDAs are also called as Personal Digital Assistants. They are small and can be carried
anywhere.
10. ______computers are lower to mainframe computers in terms of speed and storage capacity.
a) Mini
b) Super
c) Mainframes
d) Hybrid
View Answer
Answer: a
Explanation: The answer is a. Mini computers are compared to mainframe computers in terms of:
1. speed and, 2. storage capacity.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Internet of Things”.
Answer: c
Explanation: IoT is a network of physical objects or things embedded with electronics or softwares.
Iot allows objects to be controlled remotely across existing network.
2. RFID is a part of IoT.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. RFID is Radio frequency identification. Radio frequency
identification is a part of IoT.
Answer: b
Explanation: Earlier, RFID or Radio frequency identification was a prerequisite for Internet of Things.
advertisement
Answer: d
Explanation: IoT works from RFID to Sensor, to Smart tech and then to Nano tech.
5. Making the smaller and smaller things have the ability to connect and interact.
a) Micro Tech
b) Smart tech
c) Nano tech
d) RFID
View Answer
Answer: c
Explanation: Nano Tech is the term used when smaller things are made to interact and communicate.
It is involved in the working of Iot also.
Answer: a
Explanation: Wi-Fi stands for Wireless Fidelity. It is widely used in both outdoor and indoor
environments.
7. Diagnostics service for Cars.
a) MIPS
b) AutoBot
c) IoT Assistant
d) IoT
View Answer
Answer: b
Explanation: Autobot is a diagnostics service for cars. This service is integrated with several web
services.
Answer: c
Explanation: Kevin Ashton is the father of IoT. He believed IoT could turn the world into data.
9. Collect->Communicate->__________->Act
a) Acknowledge
b) Analyze
c) Examine
d) Rectify
View Answer
Answer: b
Explanation: The correct option is analyze. This shows the lifecycle of IoT.
Collect->Communicate->Analyze->Act.
Answer: b
Explanation: In parallel processing, the several instructions are executed simultaneously. Parallel
processing system provides the concurrent data processing to increase the execution time.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Artificial Intelligence”.
1. The technology that has the ability to interact with the world.
a) AI
b) ML
c) IOT
d) IT
View Answer
Answer: a
Explanation: AI which is artificial intelligence is the ability to interact with the world. It is the ability to
model the world and to learn and adapt.
Answer: a
Explanation: The statement is true. There are 2 main goals in AI: to exhibit intelligent behavior and
understand intelligence in order to model it.
Answer: b
Explanation: SNARC was the first neural network computer. it was built by Minsky and Edmonds in
1956.
advertisement
4. A hardware based system that has autonomy, social ability and reactivity.
a) AI
b) Autonomous Agent
c) Agency
d) Behavior Engineering
View Answer
Answer: b
Explanation: The answer is Autonomous Agent. Autonomous agent has autonomy i.e. ability to
operate without the direct intervention of humans or others.
Answer: b
Explanation: It is called an agency. A particular system consisting of intelligent agents like computers
or robots that cooperate to find the solution to a problem.
Answer: b
Explanation: The answer is behavior engineering. Autonomous agent implements autonomy, social
ability and reactivity.
Answer: b
Explanation: RoboCup is designed to promote autonomous robots. It is based on multi agent
collaboration.
Answer: d
Explanation: Default reasoning is a type of non-monotonic reasoning. Default logic is a non-
monotonic logic proposed by Raymond Reiter to formalize reasoning with default assumptions.
Answer: b
Explanation: An AI system is designed to learn and improve. The same is implemented on its agents.
Answer: a
Explanation: The answer is applied AI. It is based on applied artificial intelligence. It is an approach to
develop commercially smart systems.
Computer Fundamentals Questions and Answers – Network Security
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Network Security”.
1. The field that covers a variety of computer networks, both public and private, that are used in
everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT
View Answer
Answer: c
Explanation: Network security covers a variety of computer networks, both private and public.
Everyday jobs like conducting transactions and communications among business and government
agencies etc.
Answer: a
Explanation: The statement is true. AFS is an example. It helps us protect vital information.
Answer: d
Explanation: The Identification, Authentication and Access control are the objectives of network
security. There is no such thing called lock.
advertisement
Answer: a
Explanation: The answer is UserID. UserID is a part of identification. UserID can be a combination of
username, user student number etc.
Answer: a
Explanation: It is called an authentication. It is typically based on passwords, smart card, fingerprint,
etc.
Answer: c
Explanation: Functional authorization is concerned with individual user rights. Authorization is the
function of specifying access rights to resources related to information security.
Answer: a
Explanation: CHAP stands for Challenge Handshake authentication protocol. Features of CHAP:
plaintext, memorized token. Protocol uses Telnet, HTTP.
8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
View Answer
Answer: d
Explanation: Access control refers to the security features. Applications call access control to provide
resources.
Answer: c
Explanation: An algorithm used in encryption is referred to as a cipher. cipher is an algorithm for
performing encryption or decryption
10. The information that gets transformed in encryption is ____________
a) Plain text
b) Parallel text
c) Encrypted text
d) Decrypted text
View Answer
Answer: a
Explanation: The text that gets transformed is called plain text. The algorithm used is called cipher.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Network Security and Encryption”.
Answer: a
Explanation: WTLS is Wireless Transport Security Layer. It provides security between the mobile
device and the WAP gateway to internet.
2. The protocol designed to make the security of wireless LAN as good as that of wired LAN.
a) WTLS
b) WEP
c) RSN
d) WP
View Answer
Answer: b
Explanation: WEP stands for Wired Equivalent Privacy. WEP has been broken already in 2001. WEP
protocol designed to make the security of wireless LAN as good as that of wired LAN.
3. A person who enjoys learning details about computers and how to enhance their capabilities.
a) Cracker
b) Hacker
c) App controller
d) Site controller
View Answer
Answer: b
Explanation: The person is called hacker. A person who enjoys learning the details of computer
systems and how to stretch their capabilities is called hacker.
advertisement
Answer: b
Explanation: SATAN is the Security analysis tool for auditing networks. It is created by farmer and
venema.
Answer: d
Explanation: The program is called virus. It alters the way that the computer operates. It often does
damages like deleting and corrupting files and data.
Answer: a
Explanation: A worm copies itself from one system to another over a network without the assistance
of human.
Answer: b
Explanation: The answer is Denial of service. In case of denial of service attacks, a computer site is
bombarded with a lot of messages.
8. Creating a computer or paper audit that can help detect wrong doings.
a) Auditing
b) Validation
c) RSN
d) Verification
View Answer
Answer: a
Explanation: The answer is auditing. It is done to keep an eye on wrong doings. Auditing can be used
as a deterrent.
9. An indirect form of surveillance.
a) Honey pot
b) Logical
c) Security
d) Intrusion
View Answer
Answer: a
Explanation: Honey pot is an indirect form of surveillance. Network personnel create a trap, watching
for unscrupulous acts.
Answer: c
Explanation: The answer is Trojan horse. Trojan horse is a code that is present in a program that
appears harmless.
11. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
View Answer
Answer: d
Explanation: The attack is a spoofing attack. It is when a user creates a packet that appears to be
something else or from someone else.
Answer: a
Explanation: Smurfing is a technique in which a program attacks a network by exploiting IP broadcast
addressing operations.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Encryption and Viruses”.
Answer: b
Explanation: In transposition-based cipher, the order of the plain text is not preserved. They can be
very simple to identify.
Answer: b
Explanation: The statement is false. Cipher is the algorithm used in encryption. Ciphertext is the data
after encryption is performed.
Answer: c
Explanation: The key is the unique piece of information. It is used to create the cipher text and
decrypt it back.
advertisement
Answer: b
Explanation: It is called as cryptography. It is the study of creating and using the encryption
techniques.
5. The process of transforming plain text into unreadable text.
a) Decryption
b) Encryption
c) Network Security
d) Information Hiding
View Answer
Answer: b
Explanation: Encryption is the process of transforming readable text i.e. plain text to make it
unreadable to anyone except those possessing special knowledge, usually referred to as a key.
Answer: a
Explanation: The statement is true. Cipher is the algorithm used in encryption. Encryption is making
readable text as unreadable to keep it secured.
Answer: a
Explanation: The reverse process is called decryption. It is the process of making the information
readable again.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Cryptography”.
1. These ciphers replace a character or characters with a different character or characters, based on
some key.
a) Polyalphabetic substitution based
b) Transposition-based
c) Substitution based
d) Mono alphabetic substitution based
View Answer
Answer: d
Explanation: In mono alphabetic substitution-based cipher, a character is replaced with some other
character or multiple characters, based on some key.
Answer: c
Explanation: These ciphers are similar to that of mono alphabetic ciphers. Multiple strings are used
to encode the plain text.
advertisement
Answer: d
Explanation: It is called as public key cryptography. It has 2 keys: a private key and a public key.
Answer: c
Explanation: Public key cryptography has 2 keys. They are private key and a public key. The public key
encrypts the message. The private key decrypts the message.
Answer: a
Explanation: DES stands for Data Encryption Standard. It was created in 1977 and went into
operation from 1990s.
7. Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______
levels of encryption.
a) 64
b) 8
c) 16
d) 4
View Answer
Answer: c
Explanation: The answer is 16. It was subjected to 16 levels of encryption. DES is the data encryption
standard.
Answer: b
Explanation: There are 2 keys in triple DES as well. The private and the public key. It can also have 3
unique keys.
Answer: a
Explanation: AES is Advanced Encryption Standard. It was selected by the US government. It is used
to replace DES.
10. An electronic document that establishes your credentials when you are performing transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate
View Answer
Answer: d
Explanation: Digital certificate is an electronic document that is responsible for secure internet
transactions.
1. A field of technology that deals with a combination of real world and the data generated from
computer.
a) ML
b) AI
c) AR
d) IoT
View Answer
Answer: c
Explanation: AR that is Augmented Reality is a field of technology that deals with a combination of
real world and the data generated from computer.
2. AR is interactive in real-time.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Augmented Reality is the field of computer research that deals
with the combination of real-world and computer generated data.
Answer: b
Explanation: The answer is VR or Virtual Reality. VR technologies are known for immersing a user
inside a synthetic environment. While immersed, the user cannot see the real world around him.
advertisement
4. Technologies that allow the user to see the real world, with virtual objects composited in the real
world.
a) AR
b) VR
c) AI
d) SR
View Answer
Answer: a
Explanation: Augmented Reality (AR) allows a user to see real world, with virtual objects
superimposed or composited with the real world.
5. A ______________________ is a display device, worn on head as a part of helmet that has a small
display optic.
a) HD
b) MD
c) HMD
d) ARD
View Answer
Answer: c
Explanation: HMD is the head-mounted display, worn on head as a part of helmet that has a small
display optic. HTC Vive, Samsung GearVR are examples of HMDs available today.
6. Wearable computing device in the form of computerized eyeglasses.
a) HMD
b) Helmets
c) Smart Glasses
d) VR Glasses
View Answer
Answer: c
Explanation: Smart glasses are also called as optical head mounted displays. (OHMD), it has the
capability of reflecting projected images as well as allowing users to see through it.
Answer: a
Explanation: Location based tracking is based on geo-location information obtained from device’s
location sensors. (Longitude, latitude, altitude etc).
Answer: a
Explanation: SLAM is abbreviated for Simultaneous localization and mapping. It is a technique used
by robots and autonomous vehicles to build a map within the unknown environment.
9. A technique that enables light field which is generally the product of a light source scattered off
objects.
a) AES
b) Holography
c) Cryptography
d) Gyrography
View Answer
Answer: b
Explanation: Holography enables a light field. It is to be recorded and later reconstructed when the
original light field is no longer present.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Waterfall Model”.
Answer: b
Explanation: Prototype is the demo implementation so that the customer gets a brief idea of his
product. It is generally used when the customer requirements are not clear.
Answer: a
Explanation: The statement is true. This is the phase in which the completed software product is
handed over to the client.
3. A stage in which individual components are integrated and ensured that they are error-free to
meet customer requirements.
a) Coding
b) Testing
c) Design
d) Implementation
View Answer
Answer: b
Explanation: Hardware and software components are tested individually. Testing stage in which
individual components are integrated and ensured that they are error-free to meet customer
requirements.
advertisement
5. The customer requirements are broken down into logical modules for ease of _______________
a) inheritance
b) design
c) editing
d) implementation
View Answer
Answer: d
Explanation: The requirements are broken down for ease of implementation. Hardware and software
requirements are identified and designed accordingly.
6. What do you call a technical person who is capable of understanding the basic requirements?
a) team leader
b) analyst
c) engineer
d) stakeholder
View Answer
Answer: b
Explanation: The person is called an analyst. An analyst is a software engineering who is responsible
for requirements gathering.
7. A step in waterfall model that involves a meeting with the customer to understand the
requirements.
a) Requirement Gathering
b) SRS
c) Implementation
d) Customer review
View Answer
Answer: a
Explanation: A waterfall model involves requirement gathering as its first step. This is the most
important phase. It is important to understand the customer requirements.
Answer: b
Explanation: Waterfall model is based on step-by step completion of the project. Every step is done
individually.
Answer: b
Explanation: Project Manager is the one who plans and designs the project. Team leader is the one
who provides guidance, instruction, direction and leadership to a group of individuals.
10. A planned program if work that requires a definitive amount of time, effort and planning to
complete.
a) Problem
b) Project
c) Process
d) Program
View Answer
Answer: b
Explanation: The answer is Project. A project is a program which is something which is planned and
needs effort and time to complete.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Software Testing”.
1. A set of activities that ensure that software correctly implements a specific function.
a) verification
b) testing
c) implementation
d) validation
View Answer
Answer: a
Explanation: Verification ensures that software correctly implements a specific function. It is a static
practice of verifying documents.
Answer: a
Explanation: The statement is true. Validation is a computer based process. It uses methods like black
box testing, gray box testing, etc.
advertisement
Answer: b
Explanation: Testing is conducted by the testers. They locate or identify the bugs. In debugging
developer fixes the bug. Coding is done by the developers.
Answer: c
Explanation: The answer is system engineering. System engineering defines the role of software.
Answer: b
Explanation: The testing strategy is called unit testing. It ensures a function properly works as a unit.
Answer: d
Explanation: Validation testing tests the application as a whole against the user requirements. In
system testing, it tests the application in the context of an entire system.
8. A testing strategy that tests the application in the context of an entire system.
a) System
b) Validation
c) Unit
d) Gray box
View Answer
Answer: a
Explanation: In system testing, it tests the application in the context of an entire system. The
software and other system elements are tested as a whole.
9. A ________ is tested to ensure that information properly flows into and out of the system.
a) module interface
b) local data structure
c) boundary conditions
d) paths
View Answer
Answer: a
Explanation: A module interface is tested to ensure that information properly flows into and out of
the system.
Answer: a
Explanation: Alpha testing is conducted at developer’s site. It is conducted by customer in
developer’s presence before software delivery.
This set of Computer Fundamentals Multiple Choice Questions & Answers (MCQs) focuses on
“Concepts of OOP”.
1. A ______________ represents the need of information in the program without the presenting the
details.
a) abstraction
b) polymorphism
c) implementation
d) class
View Answer
Answer: a
Explanation: Abstraction is a concept that involves hiding the details and giving only the necessary
information to the user. It increases the power of a programming language.
2. Abstraction combines the data and functions into a single unit called a class.
a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. Data abstraction involves hiding the details and giving only the
necessary information to the user.
Answer: c
Explanation: The answer is inheritance. The base class is the parent class and the new class is called
the child class.
advertisement
Answer: b
Explanation: Polymorphism is a concept in OOP wherein different functions can be used again at
different times.
5. The ability for programmers to use the same written and debugged existing class.
a) Reusability
b) Design
c) Debugging
d) Implementation
View Answer
Answer: a
Explanation: The programmer can add features to the existing class. The programmer on further
developing the application, and allowing users to achieve increased performance.
6. A concept that combines data and functions into a single unit called class.
a) inheritance
b) encapsulation
c) polymorphism
d) abstraction
View Answer
Answer: b
Explanation: Encapsulation enables the important concept of data hiding possible. It combines data
and functions into a single unit.
Answer: c
Explanation: An object is an instance of the class. The data members are accessed with the help of
objects.
Answer: c
Explanation: In OOP, the basic unit is an object. Objects are identified by its unique name.
Answer: a
Explanation: A procedural programming follows top-down approach. The main focus is on the
functions. It has a lot of global variable.
Answer: b
Explanation: In procedural programming, the focus is on doing things(functions). It follows top-down
approach.