Computer Quiz 26/12/2015

#everydayquiz 50Questions

1. Which of the following refers to a small, single site network? 
(1) CPJ
(2) DSL
(3) RAM
(4) USB
(5)  LAN


2. Computer connected to a LAN {Local Area Network) can
(1) share information and/or share peripheral equipment
(2) go on line
(3) run faster
(4)   E-mail
(5) None of these


3. Which of the following performs modulation and demodulation?
(1) modem
(2) satellite
(3) coaxial cable
(4) fiber optics
(5) none of the above

4. The sharing of a medium and its path by 2 or more devices is called _____.
(1) Multiplexing
(2) Encoxing
(3) Line discipline
(4) Modulation
(5) None of these

5. Which multiplexing technique transmits ariatog signals ?
(1) Asynchronous TDM
(2) Synchronous TDM
(3) FDM
(4) Both (2) and (3)
(5) None of these

6. Network   components   are connected to the same cable in the— topology,
(1) mesh
(2) ring
(3) bus
(4)   star
(5) mixed

7. Two or more computers connected to each other for shar-ing information form a —— 
(1) pipeline
(2) router
(3) server
(4) tunnel
(5) network

8. Office LANs that are spread geographically apart on a large scale can be connected using a corporate —— 
(1) CAN
(2) WAN
(3) DAN
(4) LAN
(5) TAN

9. For separating channels in FDM, it is necessary to use
(1) Differentiation
(2) Bandpass filters
(3) Time slots
(4) All of the above
(5) None of these

10. Encryption and decryption are functions of
(1) Transport layer
(2) None of these
(3) Presentation layer
(4) Allot the above
(5) Session layer


Answers
1.  (5)
2.  (1)
3.  (1)
4.  (1)
5.  (3)
6.  (4)
7.  {5)
8.  (2)
9.  (3)

10. (5)


1. A standard intended to connect relatively low speed devices such as Keyboards, Mouse, Modems and Printers is —
(A) Access time
(B) Access bus
(C) Connector
(D) USB Port
(E) None of these

2. The concept that one can disconnect peripherals and plug them in without letting computer shutdown or reconfigure the system is referred as —
(A) Hot plugging 
(B) Cold plugging
(C) Access bus 
(D) Dial-up
(E) None of these

3. A form of access to a computer or network with specified user name and password is referred as —
(A) Algorithm
(B) Address
(C) Account 
(D) Log In
(E) None of these

4. EFF sites allows anonymous FTP that —
(A) Do not require a password or access
(B) Requires password or access
(C) Is a none access file
(D) Is a highly secure access
(E) None of these

5. APL is –
(A) A high level language for specifying complex algorithms.
(B) A real-time language primarily for scientific applications.
(C) Only (A) is true
(D) Both (A) & (B) are true
(E) None is True

6. Asynchronous communication is – 
(A)Communication between independent operating units
(B)Communication between dependent operating units 
(C)Communication between independent and dependent operating units. 
(D)Communication within similar operating system
(E)None of these 

7. Automated Office refers to the merger of __________ in an office environment. 
(A) Computers
(B) Office
(C) Telecommunications
(D) All of the above
(E) Other than given option 

8. Archive is –
(A) Primary storage 
(B) Forward operation
(C) Backup storage 
(D) Secondary storage
(E) none of these

9. ASCII-8 is —
(A) An extended version of ASCII-7
(B) Is a 8-bit code
(C) Both (A) & (B) are true
(D) Both (A) & (B) are false
(E) None of these

10. ASCII File is —
(A) Boot file
(B) Word processor
(C) System file
(D) Document file in the universally recognized text format
(E) None of these

Answers
1. B
2. A
3. C
4. A
5. D
6. A
7. D
8. C
9. A
10. D


1. ......... Are used for converting one type of number system in to the other form 
(1) logic gate 
(2) Decoder
(3) half adder    
(4) Full adder 
(5) None of these

2. Multiplexer means.................
(1) One in to many
(2) All of these
(3) many in to many 
(4) many in to one 
(5) None of these

3. Multiplexers is also known as. 
(1) adder 
(2) demux
(3) mux
(4) subtracter
(5) None of these

4. ASCII code isa......... bit code.
(1) 1 
(2) 2 
(3) 9      
(4) 8
(5) 7

5.The decimal number is converted in to excess 3 codes by adding, to each decimal digit.
(1) 4 
(2) 8 
(3) 3 
(4) 2
(5) 7 

6. 110+110=............
(1) 3 
(2) 0
(3) 1 
(4) 2
(5) None of these 

7. 12+12=...........
(1) 1 
(2) 0 
(3) 2 
(4) 3 
(5) None of these

8. The digital system usually operated on.........system.
(1) decimal      
(2) binary
(3) octal
(4) hexadecimal
(5) None of these

9. The binary system use powers of..........for positional values.
(1) 16 
(2) 10 
(3) 8                
(4) 2
(5) None of these

10. After counting 0, 1, 10, 11, 'the next binary number is
(1) 100 
(2) 12 
(3) 101 
(4) 110 
(5) None of these

11. In logic algebra, variables can assume only two values:either..........or 1.
(1) 2 
(2) 4 
(3) 3 
(4) 0 
(5) None of these

12. A logic gate is an electronic circuit which
(1) None of these
(2) allows electron flow only in one direction
(3) works on binary algebra
(4) alternates between 0&1 values
(5) makes logic decisions

13. In positive logic, logic gate 1 corresponds to
(1) positive voltage
(2) zero voltage level
(3) higher voltage level
(4) lower voltage level
(5) None of these

14. In negative logic, the logic state 1 corresponds to
(1) lower voltage level
(2) negative logic
(3) zero voltage
(4) more negative voltage
(5) None of these

15. An X-OR gate produces an output only when it's two inputs are 
(1) high 
(2) low
(3) None of these
(4) same        
(5) different

Answers..

1. (2)
2. (4)
3. (3)
4. (5)
5. (2)
6. (3)
7. (4)
8. (1)
9. (2)
10.(4)
11.(1)
12.(2)
13.(3)
14.(4)

15.(5)



1.What does "3.0" denote in the term "3.0 GHz P IV"?
1) Clock speed 
2) Power consumption
3) Microprocessor architecture 
4) No. of ports to attach peripherals
5) None of these


2.Gutter position can be set in following positions-
1) Left & Right
2) Left & Top
3) Left & Bottom
4) Left Only
5) None of these

3.How will MS Word will respond in repeated word ?
1) A Green wavy line under the repeated word
2) A Red wavy line under the repeated word
3) A Blue wavy line under the repeated word
4) A yellow wavy line under the repeated word
5) None of above

4.Which file is responsible to start MS Word ?
1) Winword.exe
2) Win.exe
3) Word.exe
4) Wordwin.exe
5) None of these

5.Superscript, subscript, outline, emboss, engrave are known as ?
1) Text effects
2) Font effects
3) Word art
4) Clip art
5) None of these

6.How to select one hyperlink after another during a slide presentation ?
1) Ctrl + K
2) Ctrl + D
3) Tab
4) Ctrl + H
5) None of these

7.From where can we set the timing for each object ?
1) slide show, custom animation
2) view, slide sorter
3) slide show, custom transition
4) Slide show, Slide transition
5) None of these

8.The boxes that are displayed to indicate that the text, pictures or objects are placed in it is called ?
1) Word Art
2) Placeholder
3) AutoText
4) Text box
5) None of these

9.Which among following can be considered as most advanced ROM ?
1) DRAM
2) EEPROM
3) RAM
4) PROM
5) None of these

10.Where, the result of an arithmetic and logical operation are stored ?
1) In Accumulator
2) In Cache Memory
3) In ROM
4) In Instruction Registry
5) None of these

Answers 
1. 1
2. 2
3. 2
4. 1
5. 2
6. 3
7. 1
8. 2
9. 2
10. 1


1. A set of rules that computer on a network use to commu-nicate with each other are called
(1)    Protocol
(2)    Regulations
(3)    Rules
(4)    Netiquettes
(5)    None of these

2. The sharing of a medium and its path by 2 or more devices is called ____ .
(1) Multiplexing
(2) Encoxing
(3) Line discipline
(4) Modulation
(5) None of these 

3. Network components are connected to the same cable in the _______ topology, 
(1) mesh
(2) ring
(3) bus
(4) star
(5) mixed

4.  Two or more computers connected to each other for sharing information form a _________ .
(1) pipeline
(2) router 
(3) server
(4) tunnel
(5) network 

5. Office LANs that are spread geographically apart on a large scale can be connected using a corporate ___________ . 
(1) CAN
(2) WAN 
(3) DAN
(4) LAN 
(5) TAN 

6. In OSI Model, Encryption and decryption are functions of
(1) Transport layer
(2) None of these
(3) Presentation layer
(4) Allot the above
(5) Session layer

7. A permanent virtual circuit involves
(1) All of the above
(2) Data transfer
(3) Connection release
(4) Connection establishment
(5) None of these

8. In OSI network architecture, the dialogue control and token management are responsibility of
(1) transport layer
(2) network layer
(3) session layer
(4) data link layer
(5) none of above

9. In OSI network architecture, the routing is performed by
(1) data link layer
(2) network layer
(3) transport layer
(4) session layer
(5) none of above

10. Which of the following performs modulation and demodulation? 
(1) fiber optics
(2) satellite
(3) coaxial cable
(4) modem
(5) none of the above


Answers :

1.   1
2.   1
3.   3
4.   5
5.   2
6.   3
7.   2
8.   3
9.   2
10. 4



#SSC #IBPS #SBI #RBI #NABARD #NICL #NIACL #CAT #NMAT #everydayquiz

No comments:

Post a Comment