COMPUTER SCIENCE AND IT
1. Which of the following memories is an optical memory?
a. Floppy Disk
b. Bubble Memories
c. CDROM
d. Core Memories
2. DNS refers to
a. Data Number Sequence
b. Digital Network Service
c. Domain Name System
d. Disk Numbering System
3. Java was originally invented by
a. Oracle
b. Microsoft
c. Novell
d. Sun
4. The unit of speed used for super computer is
a. KELOPS
b. GELOPS
c. MELOPS
d. None of these
5. Whose trademark is the operating system UNIX?
a. Motorola
b. Microsoft
c. BELL Laboratories
d. AshtonTate
6. The first mechanical computer designed by Charles Babbage was called
a. Abacus
b. Analytical Engine
c. Calculator
d. Processor
7. Which of the following is the most powerful type of computer?
a. Supermicro
b. Super conductor
c. Super computer
d. Megaframe
8. C is
a. A third generation high level language
b. A machine language
c. An assembly language
d. All of the above
9. Web pages are written using
a. FTP
b. HTTP
c. HTML
d. URL
10.
a.
b.
c.
d.
Which of the following is NOT operating system?
Dos
Unix
Window NT
Java
11. The first movie released in 1982 with terrific computer animation and
graphics was
a. Star wars
b. Tron
c. Forbidden planet
d. Dark star
12.
a.
b.
c.
d.
Which of the following is an example of non volatile memory?
VLSI
LSI
ROM
RAM
13.
a.
b.
c.
d.
One byte is equivalent to
4 bits
8 bits
12 bits
32 bits
14.
a.
b.
c.
d.
ISDN stands for
International Standard Digital Network
International Subscriber Dialing Network
Integrated Service Digital Network
Integrated System Digital Network
15.
FPI stands for
a. Faults per inch
b. Frames per inch
c. Film per inch
d. Figure per inch
16.
a.
b.
c.
d.
What is the full form of lP?
Interface program
Interface protocol
Internet program
Internet protocol
17.
a.
b.
c.
d.
A device that converts digital signals to analog signals is
A packet
A modem
A block
Both (A) and (B)
18.
VSNL stands for
a. Videsh Sanchar Nigam Ltd
b. Very Soft Network Link
c. Vigam System Nigar Ltd
d. Very Small Network Link
19.
a.
b.
c.
d.
A terabyte comprises
1024 gigabyte
1024 kilobyte
1024 megabyte
1024 byte
20.
Who is considered to be The Father of Artificial Intelligence?
a. Alan Turing
b. John McCarthy
c. George Boole
d. Allen Newell
21.
CPU stands for
a. Central Processing Unit
b. Control Processing Unit
c. Control Programming Unit
d. Central Programming Unit
e. Computer Processing Unit
22.
a.
b.
c.
d.
RAM is
Read Access Memory
Random Access Memory
Read Address Memory
Random Address Memory
23. LAN stands for
a. Local Address Network
b. Local Area Network
c. Logical Area Network
d. Logical Address Network
24. Which of the following converts an entire program into Machine
Language at one time?
a. Compiler
b. Interpreter
c. Translator
d. CPU
25.
a.
b.
c.
d.
The official protocol used on the internet is ..
ISO/OSI
TCP/IP
IEEE 802.3
CSMA/CD
26.
a.
b.
c.
d.
HTTP is the abbreviation of
Hyper Text Transfer Protocol
Hyper Text Transmission Protocol
Hyper Text Technical Parameters
Hyper Text Technology Progression
27.
a.
b.
c.
d.
Which of the following is a permanent memory?
ROM
PROM
RAM
DRAM
28.
a.
b.
c.
d.
BD in computer terminology stands for:
Bit Data
Binary Digit
Blue-ray
All of the above
29.
a.
b.
c.
d.
The term TUX is related with?
Google
Mac
Linux
Windows
30.
a.
b.
c.
d.
An error in a program code is:
Bug
Syntax
Mistake
All of the above
31.
a.
b.
c.
d.
Which of the following is the fastest memory?
Cache
RAM
ROM
Registers
32.
a.
b.
c.
d.
The first electronic digital computer used
IC chips
Microprocessors
Transistors
Vacuum tubes
33.
a.
b.
c.
d.
e.
The first programming language used for scientific operation is:
FORTRAN
Pascal
COBOL
C
Java
34.
a.
b.
c.
d.
World Wide Web (WWW) was developed by
Charles Babbage
Linus Torvalds
Dennis Ritchie
Tim Berners Lee
35.
a.
b.
c.
d.
Fourth generation of computers contain
Vacuum tubes
Transistors
LSI
Microprocessors
36. A collection of parallel lines that connects several devices in a
computer is called:
a. Bus
b. Link
c. Bidirectional wires
d. Cables
37.
a.
b.
c.
d.
Software installed to help prevent hacking is called:
System software
Antivirus software
Firewall software
Application software
38.
Encryption of data means that:
a.
b.
c.
d.
Data
Data
Data
Data
cannot be sent over the internet
is encoded so it cannot be read without decoding software
is kept locked in special room
has been hacked into
39. The kind of crime involves altering raw data just before a computer
processes it and then changing it back after the processing is completed:
a. Data diddling
b. Data tampering
c. Salami attacks
d. None of the above
40. Computer to computer exchange of business documents is done
through?
a. EDI
b. ERP
c. CAM
d. CAD
41.
a.
b.
c.
d.
Who started Free Software Foundation?
Linus Torvald
Richard Stallman
Bill Gates
GNU
42.
a.
b.
c.
d.
Computers calculate numbers in what mode?
Decimal
Binary
Octal
HexaDecimal
43.
a.
b.
c.
d.
The letters, "DOS" stand for...
Data Out System
Disk Out System
Disk Out System
Data Operating System
44.
a.
b.
c.
d.
Modem stands for...
Modulator Demodulator
Monetary Devaluation Exchange Mechanism
Memory Demagnetization
Monetary Demarkation
45. AOL stands for...
a. Arranged Outer Line
b. America Over LAN
c. Audio Over LAN
d. America Online
46.
a.
b.
c.
d.
MICR stands for
Magnetic Ink Character Recognition
Memory Ink Character Recognition
Magnetic Ink Character Reengineering
Magnetic Ink Character Reengineering
47.
a.
b.
c.
d.
Computer Hard Disk was first introduced in 1956 by
Dell
Microsoft
Apple
IBM
48.
a.
b.
c.
d.
In computer world, Trojan refers to
Virus
Malware
Worm
Spyware
49.
a.
b.
c.
d.
Which protocol is used to receive e-mail?
HTTP
POP3
SMTP
SSH
50. Which computer program converts assembly language to machine
language?
a. Interpreter
b. Compiler
c. Assembler
d. Comparator
51.
a.
b.
c.
d.
Which one is the first search engine?
Google
Archie
Altavista
WAIS
52.
a.
b.
c.
d.
Which one is the first browser invented in 1990?
Internet Explorer
Chrome
Mozilla
WorldWideWeb
53.
First virus name is known as
a. Rabbit
b. Creeper Virus
c. Elk Cloner
d. SCA Virus
54.
a.
b.
c.
d.
A dual layer Blue-ray Disc can store data upto
20 GB
35 GB
12 GB
50 GB
55.
a.
b.
c.
d.
Who invented microprocessor?
Joseph Jacquard
Herman H Goldstein
Marcian E Huf
George Boola
56. Who co-founded Hotmail in 1996 and then sold the company to
Microsoft?
a. Shawn Fanning
b. Ada Byron Lovelace
c. Sabeer Bahtia
d. Ray Tomlinson
57.
What
a.
b.
c.
d.
was the first ARPANET message?
Hello world
Cyberspace, the final frontier
Marry has a little lamp
Lo
58.
The Internet is also known as
a. Home
b. My mother
c. The West Coasts I-95
d. The Information superhighway
59.
A Switch is a network device whose responsibility is to
a. Protect from virus attack
b. Turn of the power to network
c. Connect Network devices
d. Boot the network
60.
Who is the inventor of C programming language
a. Bill Gates
b. Dennis Ritchie
c. James Gosling
d. Larry Wall
61.
'Booting' the computer refers to:
a. Disk Operation Sequence
b. Disk Operating System
c. Don't Operate System
62.
What
a.
b.
c.
d.
does "USB" stand for
Universal Serial Bus
Universal Serial Box
Universal Serial Bottom
Universal Serial Bun
63.
What
a.
b.
c.
d.
does "ISP" stand for?
Intranet Service Provider
Internet Service Provider
Internal Service Provider
International Service Provider
64.
What
a.
b.
c.
d.
does "ripping" consists of?
Burning music to a cd
Saving music to a computer
Deleting music from a folder
Downloading music from a trusted site
65.
Which supercomputer is developed by the Indian Scientists?
a. Param
b. Super 301
c. Compaq Presario
d. CRAY YMP
66.
IC chips used in computers are usually made of
a. Lead
b. Silicon
c. Chromium
d. Gold
67.
One kilobyte is equal to
a. 1000 bytes
b. 100 bytes
c. 1024 bytes
d. 1023 bytes
68.
Which of the following is not an example of Operating System?
a. Windows 9
b. BSD Unix
c. Microsoft Office XP
d. Red Hat Linux
69.
One Gigabyte is approximately equal is
a. 1000,000 bytes
b. 1000,000,000 bytes
c. 1000,000,000,000 bytes
d. None of these
70.
The errors that can be pointed out by the compiler are
a. Syntax error
b. Symantec error
c. Logical error
d. Internal error
71. Which of the following languages is more suited to a structured
program?
a. PL/1
b. FORTRAN
c. BASIC
d. PASCAL
72. A computer assisted method for the recording and analyzing of existing
or hypothetical systems is
a. Data transmission
b. Data flow
c. Data capture
d. Data processing
73. What diference does the 5th generation computer have from other
generation computers?
a. Technological advancement
b. Scientific code
c. Object Oriented Programming
d. All of the above
74. Which of the following computer language is used for artificial
intelligence?
a. FORTRAN
b. PROLOG
c. C
d. COBOL
75. The tracks on a disk which can be accessed without repositioning the
R/W heads is
a. Surface
b. Cylinder
c. Cluster
d. All of the above
76.
Which of the following is the 1's complement of 10?
a. 01
b. 110
c. 11
d. 10
77. A section of code to which control is transferred when a processor is
interrupted is known as
a. M
b. SVC
c. IP
d. MDR
78. A computer program that converts assembly language to machine
language is
a. Compiler
b. Interpreter
c. Assembler
d. Comparator
79. The time required for the fetching and execution of one simple
machine instruction is
a. Delay time
b. CPU cycle
c. Real time
d. Seek time
80.
The time for which a piece of equipment operates is called
a. Seek time
b. Effective time
c. Access time
d. Real time
81.
a.
b.
c.
d.
A name applied by Intel corp. to high speed MOS technology is called
HDLC
LAP
HMOS
SDLC
82. A program component that allows structuring of a program in an
unusual way is known as
a. Correlation
b. Coroutine
c. Diagonalization
d. Quene
83. Which type of system puts the user into direct conversation with the
computer through a keyboard?
a. Real time processing
b. Interactive computer
c. Batch processing
d. Time sharing
84. The term referring to evacuating the content of some part of the
machine is known as
a. Dump
b. Enhancement
c. Down
d. Compiler
85.
a.
b.
c.
d.
A common boundary between two systems is called
Interdiction
Interface
Surface
None of the above
86.
a.
b.
c.
Which computer has been designed to be as compact as possible?
Mini
Super computer
Micro computer
d. Mainframe
87.
a.
b.
c.
d.
Which method is used to connect a remote computer?
Device
Dialup
Diagnostic
Logic circuit
88.
a.
b.
c.
d.
The symbols used in an assembly language are
Codes
Mnemonics
Assembler
All of the above
89.
as
a.
b.
c.
d.
A number that is used to control the form of another number is known
90.
a.
b.
c.
d.
ASCII stands for
American standard code for information interchange
All purpose scientific code for information interchange
American security code for information interchange
American Scientific code for information interchange
Map
Mask
Mamtossa
Marker
91. A program that is employed in the development, repair or
enhancement of other programs is known as
a. System software
b. Software tool
c. Applications program
d. Utility program
92. A technique used by codes to convert an analog signal into a digital bit
stream is known as
a. Pulse code modulation
b. Pulse stretcher
c. Query processing
d. Queue management
93.
a.
b.
c.
d.
An optical input device that interprets pencil marks on paper media is
Punch card reader
O.M.R
Magnetic tape
None of the above
94.
a.
b.
c.
d.
Most important advantage of an IC is its
Easy replacement in case of circuit failure
Extremely high reliability
Reduced cost
Low power consumption
95. A device designed to read information encoded into a small plastic
card is
a. Magnetic tape
b. Badge reader
c. Tape puncher
d. Card puncher
96.
a.
b.
c.
d.
Any device that performs signal conversion is
Modulator
Modem
Keyboard
Plotter
97. A device for converting handwritten impressions into coded characters
& positional coordinates for input to a computer is
a. Touch panel
b. Mouse
c. Wand
d. Writing tablet
98.
a.
b.
c.
d.
Java was originally invented by
Oracle
Microsoft
Novell
Sun
99.
a.
b.
c.
d.
The unit of speed used for super computer is
KELOPS
GELOPS
MELOPS
None of these
100.
a.
b.
c.
d.
The parity bit is added for the purpose of
Coding
Error detection
Controlling
Indexing
101. UNIVAC is an example of
a.
b.
c.
d.
First generation computer
Second generation computer
Third generation computer
Fourth generation computer
102.
a.
b.
c.
d.
A language for simulating models of business activity is
SPSS
GPSS
COBOL
DL
103.
a.
b.
c.
d.
A terabyte comprises
1024 gigabyte
1024 kilobyte
1024 megabyte
1024 byte