Friday, 1 March 2013

IBPS IT OFFICER PRACTICE PAPER 1 : contains 215 questions (ans are in next post)


1. Which of the following is to be done the auditor while internet banking services audit ?
[A] Tour the server room
[B] The user is not allowed to login after defined repeated failed attempts
[C] Contract clearly states the services that will be provided by the vendor
[D] All of the above
[E] None of these
2. ___________ can be one of the approach used to tax online transactions .
[A] Permanent establishment
[B] Residence based
[C] Income based classification
[D] All of the above
[E] None of these
3. To stop unauthorized access to the computer systems we should :
[A] Have a trust worthy system administrator
[B] Have a sound encryption policy
[C] Have as good password policy
[D] All of the above
[E] None of these
4. An attack on network will not bother to do :
[A] Network Investigation
[B] Network Management
[C] Access Gaining
[D] Escaping
[E] None of these
5. Which of the following details do you think should be checked on security breaches?
[A] Authorized access to system resources
[B] Un-authorized access to system
[C] Un-authorized attempts to change security definitions
[D] All of the above
[E] None of these
6. The internet is an example of a:
[A] Packet switched network
[B] Cell switched network
[C] Circuit switched network
[D] All of the above
[E] None of the above
7. Which of the following methods are NOT used by kerbaos to establish a secure connection between the client and the target server?
[A] OCR
[B] Secret key
[C] Password
[D] Al of these
[E] None of these
8. ____________ is the process of organizing data in tables with the object of elimination redundancy and inconsistent dependency.
[A] Data modeling
[B] Normalization
[C] Data mining
[D] All of these
[E] None of these
9. Which can be used for development for an application?
[A] Data
[B] Human factor
[C] Technology
[D] All of these
[E] None of these
10. The security features of the application should be the time of
[A] Programming phase
[B] Conceptual design
[C] Testing phase
[D] All of these
[E] None of these
11. Which of the following statements is ‘’FALSE’’ pegarding selection of hardware / software?
[A] Budget allocated for application is limited to hardware and software cost.
[B] The application should be easy to use by programming rather than by the end user
[C] The requirement for the application should be decided
[D] All of these are false
[E] None of these
12. A good data base should have
[A] Financial stability of the vendor
[B] Scope for achieves
[C] Provision for data integrity and system integrity
[D] All of the above
[E] None of these
13. To check if data that is being entered does not have blanks, we have
[A] A mathematically calculated check digit
[B] Control check to verify if the data is in accordance to pre-determined criteria
[C] Competeness check
[D] All of these
[E] None of these
14. A detective control is used to check if correct numbers are keyed in
[A] Sequence check
[B] Manual check
[C] Check digits
[D] All of these
[E] None of these
15. On August 23,2005, an an accounting clreck prepared an invoice dated August 31,2005, Which control can check this ?
[A] Size check
[B] Hash total
[C] Range check
[D] All of the above
[E] None of these
16. Processing control procedures have
[A] Authorization and authentication of users
[B] Access control for online data
[C] Reporting of before and after images
[D] All of these
[E] None of these
17. Which cannot assure data accuracy in an application?
[A] Control total
[B] Limit and reasonableness test
[C] Echo checking
[D] All of these
[E] None of these
18. A computer works faster with
[A] GUI
[B] Mouse
[C] Keyboard
[D] All of these
[E] None of these
19. SMTP protocol is used for
[A] Sending email messages between servers
[B] Sits between client server
[C] Transmit news to all clients
[D] All of the above
[E] None of these
20. Which form of job scheduling uses triggers?
[A] Manual scheduling
[B] Distributed scheduling
[C] Mainframe scheduling
[D] Automated scheduling
[E] None of these
21. MICR devices can read:
[A] Letters
[B] Numbers
[C] Both of these
[D] All of these
[E] None of these
22. Auxiliary storage consists of
[A] Magnetic tapes
[B] CDs
[C] Both of these
[D] All of these
[E] None of these
23. Who can provides access rights to users?
[A] Data custodian
[B] Data owner
[C] The data base administrator
[D] Management
[E] None of these
24. Security policy of an organization need not have
[A] The overall security philosophy of the organization
[B] The authorization procedure for accessing data
[C] Security awareness program
[D] Highlights and identity of the sensitive security features
[E] None of these
25. In case of a virus getting into computer, which of the following will help?
[A] Encryption
[B] NORTON
[C] Police complaint
[D] All of these
[E] None of these
26. Which of the following do you think is NOT necessary for computerization system in a bank?
[A] Effective customer service
[B] Effective back office integration
[C] Focus on manual records
[D] All of these
[E] None of these
27. BCNF is needed because:
[A] Otherwise tuples may be duplicated
[B] When a data is deleted tuples may be lost
[C] Updating is otherwise is difficult
[D] When there is dependent attributes in two possible composite keys one of the attribute is unnecessarily duplicated in the tuples
[E] None of these
28. Which of the following is reliable service?
[A] TCP
[B] UDP
[C] Both [A] & (2)
[D] Either [A] nor (2)
[E] None of these
29. Firewall is used in PC for
[A] Security
[B] Authentication
[C] Data transmission
[D] All of these
[E] None of these
30. A transmission in which receiver receives the data simultaneously as it is relayed is called
[A] Video-conferencing
[B] Online transmission
[C] Real-time transmission
[D] Offline transmission
[E] None of these
31. A protocol is:
[A] Service that helps in communicating
[B] Rules that help computer talk
[C] Way of transmission data over the net
[D] All of these
[E] None of these
32. Which of the following are relational integrity constraints?
[A] Null value
[B] Prim any key
[C] Referential integrity
[D] All the above
[E] None of these
33. Which of the following do think is NOT to develop an application for computer?
[A] Feasibility study
[B] Designing
[C] Testing
[D] All the above
[E] None of these
34. Binary equivalent to 87 is:
[A] 1010111
[B] 1101111
[C] 1011111
[D] 10111111
[E] None of these
35. In binary system the highest value of an 8-bit number is
[A] 255
[B] 256
[C] 253
[D] 259
[E] None of these
36. Which of them is true?
[A] Data can be facts / figures / letters / words symbols etc. that represent an idea or object
[B] Data is raw material from which information is derived.
[C] Data is numbers, alphabets
[D] All the above
[E] None of these
37. Maximum storage space is available on
[A] CDs
[B] Floppies
[C] ROM
[D] Hard disc
[E] None of these
38. ____________ deals with the restructuring of existing source code in reverse engineering.
[A] Abstraction
[B] Completeness
[C] User’s screen
[D] Directionality
[E] None of these
39. Which of the following person should be made responsible for reporting maintenance problems in a LAN?
[A] Network administrator
[B] Users
[C] Security officer
[D] All the above
[E] None of these
40. Software change management decides:
[A] How to manage alternations, irrespective of the stage of the life cycle of a product
[B] Development stages working
[C] Maintenance stages working
[D] All the above
[E] None of these
41. Address Resolution Protocol (ARP) is used for:
[A] Relating IP Address to Ethernet addresses
[B] Preventing two computers from using the same IP address
[C] Enables a workstation to know its IP address by broad casting its local address
[D] All the above
[E] None of these
42. How many rollers are actually responsible for movement of the cursor in the mouse
[A] 1
[B] 2
[C] 3
[D] Depends from mouse to mouse
[E] None of these
43. Which of there can have more than one value?
[A] A composite attribute
[B] A multi valued attribute
[C] A Derived attribute
[D] All the above
[E] None of these
44. Which of the following do you think is NOT true for SNMP?
[A] It is connection less protocol
[B] It guarantees data transmission
[C] It can accommodate devices from different vendors
[D] All the above
[E] None of these
45. What are the facilities offered by tele banking?
[A] Balance enquiries
[B] Enquiries about the specific transaction
[C] Transfer of funds
[D] All the above
[E] None of these
46. Approval for software projects has to be done by
[A] The project head
[B] The user department head
[C] The senior management
[D] All the above
[E] None of these
47. The base line for a software in term if software configuration management
[A] Point of latest release of the software
[B] Point of latest change of the software
[C] Point of change approved in the software and added to the project data base
[D] All the above
[E] None of 1these
48. The purpose of using computer in an organization is _____________?
[A] To produce image , texts, reports etc.
[B] To be able get on the internet
[C] To process data in to information
[D] All the above
[E] None of these
49. Which of the following mandatory parts of complete PC system?
[A] Hardware and software
[B] Input and Output
[C] Keyboard and Printer
[D] All the above
[E] None of these
50. The elements of computer processing system are
[A] Hardware, software, information &people
[B] Hardware, programs, and people
[C] Hardware, Data, users, and procedures
[D] All the above
[E] None of these
51. What type of attack do some firewalls try to limit by enforcing rules on how long a GET or POST request can be?
[A] Smurf
[B] Denial of service
[C] Buffer overflow
[D] LAND
[E] None of these
52. This is a documents that states in writing how a company plans to protect the company’s physical and IT assets:
[A] Data Encryption Standard
[B] Security Policy
[C] Public Key Certificate
[D] Access Control List
[E] Copyright
53. This is the process of determining whether someone or something os, in fact, who or what is declared to be?
[A] Conditional access
[B] Anonymizer
[C] Bypass
[D] User profile
[E] Authentication
54. This is an agreement a company may ask an employee to sign that specifies what is considered to be appropriate (or in appropriate) use of e-mail or web browsing?
[A] RSA
[B] AUP
[C] SET
[D] VPN
[E] None of these
55. Which are examples of IPS (Intrusion Protection system)?
[A] Solar Open Design Wall
[B] Grsecurity
[C] LOMAC
[D] All of the above
[E] None of these
56. Which of the following are methods of Network Security?
[A] VPN
[B] Encryption
[C] Honey pots
[D] Firewall
[E] All of the above
57. This is a set of related programs, usually located at a network gateway server, that protects the resources of a private network from other network:
[A] Firewall
[B] Root kit
[C] Sandbox
[D] Password Cracker
[E] None of these
58. What happens if you digitally sign and inject footer on an e-mail message in the order?
[A] Nothing
[B] The message won’t be sent.
[C] The footer will invalidate the signature.
[D] The footer will be illegible.
[E] None of these
59. This is a class of programs that searches your hard drive and floppy disks for any known or potential virus:
[A] Intrusion Detection
[B] Security identifier
[C] Antigen
[D] Probe
[E] Antivirus software
60. The basic objective of Audit is:
[A] Safeguard and Assets
[B] Maintain Data Integrity
[C] Maintain Process Integrity
[D] Achieve the goals organization effectively
[E] None of these
61. Which is not true about Computer audit?
[A] Computer audit does not focus on process integrity.
[B] It throws much light on system effectiveness.
[C] Scope is limited to system and procedure being followed.
[D] Computer audit is carried done mostly around the computer.
[E] None of these
62. Which of them is not an input control type?
[A] Unintentional entry of wrong data
[B] Preparation of false input forms
[C] Intentional entry of fraudulent data
[D] Use of unauthorized Input forms
[E] Password secrecy
63. What best defines audit Trail?
[A] Trailing of audit process
[B] Chronological record of all events on system are maintained
[C] Chronological record of all events on system are not maintained
[D] Its maintenance of audit process
[E] None of these
64. Which of them forms a data items for audit trails?
[A] Unique identifier of source code
[B] Unique identifier of person
[C] Time and Date at which messages are dispatched
[D] Unique identifier for each node of network
[E] All the above
65. Which of them is not an approach for computer auditing?
[A] Audit around the computer
[B] Audit with computer
[C] Audit through the computer
[D] Audit on computer
[E] None of these
66. What are the safest ways to edit registry in win 95?
[A] Edit
[B] REGEDIT
[C] DEVICE MANAGER
[D] Control Panel Applets
[E] None of these
67. Input of Lex is -----
[A] Set a regular expression
[B] Statement
[C] Numeric data
[D] ASCII code
[E] None of these
68. Stack is …………………… structure.
[A] Last in first out (LIFO)
[B] First in First out (FIFO)
[C] First in Last out (FILO)
[D] First come First served (FCFS)
[E] None of these
69. A language L allows declaration of arrays whose sizes are not known during compilation. It is required to use efficient use of memory, which one of the following is true?
[A] A compiler using static memory, allocation can be written for L.
[B] A compiler cannot be written L: an interpreter must be used
[C] A compiler using dynamic memory allocation can be written
[D] All of the above
[E] None of these
70. Which of the following systems implementation approaches should be used if you want to run the old system and the new system at the same time for a specified period?
[A] Direct
[B] Pilot
(3)Phased
(4)Parallel
[E] None of these
71. In open (), the mode, that opens a binary file for readings is
[A] r
[B] r+
[C] rb
(4)r+b
[E] None of these
72. Dirty bit for a page in a page table
[A] Helps avoid unnecessary writers on a paging device
[B] Helps maintain LRU information
[C]Allows only read on as page
[D] All the above
73. ‘MICR’ technology used for clearance of cheques by banks refers to____
[A] Magnetic ink character recognition
[B] Magnetic intelligence character recognition
[C] Magnetic information cable recognition
[D] Magnetic insurance cases recognition
[E] None of these
74.Which of the following is not a logical database structure?
[A] Tree
[B] Relational
[C] Network
[D] Chain
[E] None of these
75. Which is not included in the UNIX file system?
[A] Bin
[B] Usr
[C] Dev
[D]  All the above
[E] None of these
76. The idea of automation with a stack as auxiliary storage----
[A] Finite automata
[B] Pushdown automata
[C] Deterministic automata
[D] All the above
[E] None of these
77. Which of the following derivations does a top-down parser while parsing an input string? The input is assumed to be scanned in left to right order.
[A] Left most derivation
[B] Left most derivation traced out in reverse
[C] Right most derivation
[D] Right most derivation traced out in reverse
[E] None of these
78. Layer one of the OSI model is:
[A] Physical layer
[B] Link layer
[C] Transport layer
[D] Network layer
[E] None of these
79. IE uses ……………………
[A] Active X controls for interaction between browser and third party application and the operating system
[B] Active X control for browser and operating system
[C] Both 1 and 2
[D] Active X controls for only operating system
[E] None of these
80. Parsing is also known as ----------
[A] Lexical analysis
[B] Syntax analysis
[C] Semantic analysis
[D] Code generation
[E] None of these
81. The derivation will be called a ………………….derivation if the non-terminal symmbol replaced at every step is the left most non-terminal symbol in the string.
[A] Left shifting
[B] Left recursion
[C] Left most
[D] Left pushdown
[E] None of these
82. Who provide the leased line?
[A] WWW
[B]TCP/IP
[C] ISDN
[D] ISP
[E] None of these
83. Master slave flip-flop is also referred to as the………….
[A] Level triggered flip-flop
[B] Pulse triggered flip-flop
[C] Edge triggered flip-flop
[D] All the above
[E] None of these
84. Which of the following circuit type is based up on time or clock pulse?
[A] Combinational circuit
[B] Sequential circuit
[C] Full adder
[D] All the above
[E] None of these
85. A solution to the problem were the source and destination hosts are on the same type of network, but there is a different network in between------
[A] Data link
[B] Packet
[C] Tunneling
[D] Hopping
[E] None of these
86. Which is true?
[A] Functional testing is called black box testing
[B] Structure testing is called glass box testing
[C] Glass box testing is called white box testing
(D) All the above
[E] None of these
87. Storage class defines
[A] The data type
[B]  The scope
[C] The scope and perfomance
[D]  The scope, performance and data type
[E] None of these
88. 128.167.152.2 is a class________ address
[A] A
[B] B
[C] C
[D] D
[E] None of these
89. DMA is
[A] High speed I/O devices
[B] It transfers blocks of data directly to and from its own buffer storage to memory
[C] In DMA transfer for I/O, CPU has no intervention
[D] All the above
[E] None of these
90. Randomized quick sort is an extension of quick sort where the pivot is chosen randomly. What is the worst case complexity of sorting n numbers using randomized quick sort?
[A] 0 (n)
[B] 0 (n log n)
[C] 0 (n2)
[D] 0 (log n)
[E] None of these
91. CIDR (Classless inter Domain Routing)
[A] It is used in class C Networks
[B] It is used in class B Networks
[C] It is used in class A Network
[D] All the above
[E] None of these
92. 253.45.67.9 is a class---------
[A] D
[B] A
[C] C
[D] E
[E] None of these
93. Internal auditors should review data system design before they are
[A] Developed
[B] Implemented
[C] Modified
[D] All the above
[E] None of these
94. Artifact based authentication method includes___
[A] Machine readable badges
[B] Electronic smart cards
[C] Both 1 and 2
[D] Vault cards
[E] None of these
95. What is the memory from 1K-640K called?
[A] Extended memory
[B] Normal memory
[C] Low memory
[D] Conventional memory
[E] None of these
96. I n most WANs, the network contains numerous cables or telephone lines,each one connecting a pair of______
[A] Packet
[B] Star topology
[C] Router
[D] Antennas
[E] None of these
97. Which of the following operators in ‘C’ does not associated from the right?
[A] ,
[B] =
[C] +=
[D] ++
[E] None of these
98. Which of the following is a variation of frequency division multiplexing (FDM)?
[A] Time Division Multiplexing (TDM)
[B] Pulse Code Multiplexing (PCM)
[C] Wave length Division Multiplexing (WDM)
[D] All the above
[E] None of these
99. Race condition occur in which flip-flop
[A] RS flip-flop
[B] JK flip-flop
[C] D flip-flop
[D] T flip-flop
[E] None of these
100. The expansion of E-R diagram is:
[A] Entity-Relation diagram
[B] Entity-Relative diagram
[C] Entity-Relation diagram
[D] All the above
[E] None of these
101. BNF is a meta-language for
[A] Specifying the syntax of a language
[B] Specifying a context free language
[C] Shell programming
[D] Both 1 and 2
[E] None of these
102. What is the language used by most of the DBM’s for helping their users to access data?
[A] High level language
[B] Query language
[C] SQL
[D] 4 GL
[E] None of these
103. An expression_____
[A] Usually evaluates to a numerical value
[B] Indicate state of the program
[C] May be part of statement
[D] Both 1 and 2
[E] None of these
104. HTTP refers to_____
[A] Hyper text transmission protocol
[B] Hyper text transfer protocol
[C] Hyper text tie protocol
[D] Hyper text talent protocol
[E] None of these
105. Which language has recently become the difacto standard for interfacing application programs with relational database system?
[A] Oracle
[B] SQL
[C] D base
[D] 4 GL
[E] None of these
106. A program that place programs into main memory and prepares them for execution____
[A] Linker
[B] Assembler
[C] Loader
[D] Absolute entity
[E] None of these
107. Given √ (224)Ï€ = (13)Ï€ the value of the radix r is
[A] 10
[B] 8
[C] 6
[D] 5
[E] None of these
108. In a Third Normal Form relation, every …. Attribute is non-transitively and fully dependent on the every candidate key Z
[A] Prime
[B] Non-prime
[C] Unique
[D] Network
[E] None of these
109. Sockets are used in
[A] Physical layer
[B] Data link layer
[C] Network layer
[D] Transport layer
[E] None of these
110. A generalization of the Boyce Code Normal Form to relation schemes which includes the multi valued dependencies is called—
[A] Second normal form
[B] Third normal form
[C] Fourth normal form
[D] Fifth normal form
[E] None of these
111. The metal oxide semiconductor (MOS) is a ……….transistor that depends on the flow of only one type of carrier, which may be electrons or holes?
[A] Unipolar
[B] Bipolar
[C] n-polar
[D] s-polar
[E] None of these
112. Lexical Analyzer transforms an input streams into---
[A] Regular expression
[B] Sequence of tokens
[C] Binary
[D] Symbols
[E] None of these
113. IEEE 802-3
[A] Analog based deterministic
[B] Analog based non deterministic
[C] Digital based deterministic
[D] All the above
[E] None of these
114. Depth first search is
[A] Stack
[B] Queue
[C] Link list
[D] Tree search
[E] None of these
115. If we traverse a binary search tree, in which manner that we get in ascending manner
[A] In order
[B] Preorder
[C] Post order
[D] Graph
[E] None of these
116. Which is the world’s number #1 company for core banking solutions?
[A] Fidelity
[B] Fiserv
[C] Infosys
[D] Oracle
[E] None of these
117. One advantage of dial-up internet access is__________
[A] It utilizes broadband technology
[B] It utilizes existing telephone service
[C] It uses a router for security
[D] Modem speeds are very fast
[E] None of these
118. A computer checks the _____of user names and password for a match before granting access.
[A] Website
[B] Network
[C] Backup file
[D] Database
[E] None of these
119. Computer that is potable and convenient for users who travel is known as_______
[A] Super computers
[B] Laptops
[C] Mini computers
[D] File server
[E] None of these
120. Which of the following is true?
[A] Byte is a single digit in a binary number
[B] Bit represents a grouping of digital numbers
[C] Eight digit binary numbers is called a byte
[D] Eight digit binary numbers is called a bit
[E] None of these
121. Office LAN’s that are spread geographically apart on a large scale can be connected using a corporate________
[A] CAN
[B] LAN
[C] DAN
[D] VAN
[E] TAN
122. Which process check to ensure the components of the computer are operating and connected properly?
[A] Booting
[B] Processing
[C] Saving
[D] Editing
[E] None of these
123. How can the user determine what programs are available on a computer?
[A] Checking the hard disk properties
[B] Viewing the installed programs during the booting process
[C] Checking the operating system for a list of installed programs
[D] Checking the existing files saved on the disk
[E] None of these
124. In Dos, the ‘’Label’’ command is used to
[A] Display the label of disk
[B] Change the label of disk
[C] Remove the label of disk
[D] Both 1 and 2
[E] None of these
125. The subsystem of the kernel and hardware that virtual to physical addresses comprises.
[A] Process management sub-system
[B] Memory management sub-system
[C] Input/output management sub-system
[D] All the above
[E] None of these
126. Which of the following computer language is a mathematically oriented languages used for scientific problems?
[A] FORTRAN
[B] LISP
[C] COBOL
[D] APPLE
[E] None of these
127. Which of the following types of table’s constraints will prevent the entry of duplicate rows?
[A] Primary key
[B] Unique
[C] Null
[D] Foreign key
[E] None of these
128. The sharing of a medium and its path by 21 or more devices is called
[A] Modulation
[B] Encoding
[C] Line discipline
[D] Multiplexing
[E] None of these
129. Which multiplexing technique transmits along signals?
[A] FDM
[B] Synchronous TDM
[C] Asynchronous TDM
[D] Both 2 and 3
[E] None of these
130. How many values can be represented by a single byte?
[A] 4
[B] 16
[C] 64
[D] 256
[E] 512
131. Which of the following refers to a small, single-site network?
[A] LAN
[B] DSL
[C] RAM
[D] USB
[E] CPU
132. Microsoft office is
[A] Shareware
[B] Public-domain software
[C] Open-source software
[D] A vertical market application
[E] An application suite
133. Information travels between components on the mother board through
[A] Flash memory
[B] CMOS
[C] Bays
[D] Buses
[E] Peripherals
134. How are data organized in a spreadsheet?
[A] Lines and spaces
[B] Layers and planes
[C] Height and width
[D] Rows and columns
[E] None of these
135. The blinking symbol on the computer screen is called the
[A] Mouse
[B] Logo
[C] Hand
[D] Palm
[E] Cursor
136. Application software
[A] is used to control operating system
[B] is designed to help programmers
[C] Performs specific task for computer users
[D] is used for making design only
[E] All the above
137. The person contributing the idea of the stored program was
[A] John Neumann
[B] Charles Babbage
[C] Howard Aiken
[D] Daniel Thomas
[E] Dennis Ritenie
138.The speed at which the monitor accepts data is called
[A] Bandwidth
[B] Interlacing
[C] Response time
[D] Scanning
[E] Maximum speed
139. This component is required to process data into information and consists of integrated circuits.
[A] Hard disk
[B] RAM
[C] CPU
[D] ROM
[E] None of these
140. What is backup?
[A] Adding more components to your network
[B] Protecting data by copying it from the original source to a different destination
[C] Filtering old data from the new data
[D] Accessing data on tape
[E] None of these
141. Network components are connected to the same cable in the _____ topology.
[A] Star
[B] Ring
[C] Bus
[D] Mesh
[E] Mixed
142. Two or more computers connected to each other for sharing information from a_______
[A] Network
[B] Router
[C] Server
[D] Tunnel
[E] Pipeline
143. What is the term for unsolicited E-mail?
[A] Newsgroup
[B] Usenet
[C] Backbone
[D] Flaming
[E] None of these
144. What type of program controls the various computer parts and allows the user to interact with the computer?
[A] Utility software
[B] Operating system
[C] Word processing software
[D] Database program
[E] None of these
145. Each cell in a Microsoft office Excel document is referred to by its cell address, which is the ____
[A] Cell’s column label
[B] Cell’s column label and worksheet tab name
[C] Cell’s row label
[D] Cell’s row and column labels
[E] None of these
146 . What is the process of copying software from secondary storage media to the hard disk called?
[A] Configuration
[B] Download
[C] Storage
[D] Upload
[E] Installation
147. The code for a web page is written using_________
[A] A fifth generation language
[B] Win zip
[C] Peri
[D] Hypertext Markup Language
[E] URL
148. Small application programs that run on a web page and may ensure a form is completed properly or provide animation are known as__________
[A] Flash
[B] Spiders
[C] Cookies
[D] Applets
[E] Sparks
149. In a relation database, this is a data structure that organizes the information about a single topic into rows and columns.
[A] Block
[B] Record
[C] Tuple
[D] Table
[E] Command the interface
150. The first computers were programmed using_______
[A] Assembly language
[B] Machine language
[C] Source code
[D] Object code
[E] Formatting error
151. When the pointer is positioned on a ______, it is shaped like a hand.
[A] Grammar error
[B] Hyperlink
[C] Screen tip
[D] Spelling error
[E] For mating error
152. Dos and windows 3.x support file names upto______charecters in length
[A] Two
[B] Four
[C] Six
[D] Eight
[E] None of these
153. ______ is collection of web pages and ______ is the very first page that we see on opening of a website
[A] Home page, web- page
[B] Web-site, home-page
[C] Web-page, home -page
[D] Web-site, web-page
[E] None of these
154. When we run a program in HTML coding,_____ is used as backend and ____ works as frontend.
[A] Notepad-Internet-Explorer
[B] Notepad-Msn-messenger
[C] MS-word-Internet explorer
[D] Both 1 and 2
[E] None of these
155. If the _______ bit in X.25 standard is to 1. It means that there is more than one packet.
[A] Q
[B] D
[C] M
[D] J
[E] None of these
156. A device operating at the physical layer is called a
[A] Bridge
[B] Router
[C] Repeater
[D] All the above
[E] None of these
157. For separating channels in FDM, it is necessary to use
[A] Time slots
[B] Band pass filters
[C] Differentiation
[D] All the above
[E] None of these
158. Encryption and decryption are function of
[A] Transport layer
[B] Session layer
[C] Presentation layer
[D] All the above
[E] None of these
159. Which type of switching uses the entire capacity of a dedicated link?
[A] Circuit switching
[B] Virtual circuit packet switching
[C] Datagram packet switching
[D] Message switching
[E] None of these
160. The _____is a device that connects n input to m output.
[A] Crossword
[B] Crossbar
[C] Modem
[D] RAM
[E] None of these
161. In _____each packet of a message follows the same path from sender to receiver.
[A] Circuit switching
[B] Message switching
[C] The virtual approach to packet switching
[D] All the above
[E] None of these
162. A permanent virtual circuit involves
[A] Connection establishment
[B] Data transfer
[C] Connection release
[D] All the above
[E] None of these
163. The search tool used to text that appears in gotherspace is
[A] Gobbler
[B] Archie
[C] Mikky
[D] Veronica
[E] None of these
164. X.21 protocol consists of
[A] Physical and frame levels
[B] Frame and packet levels
[C] Physical, frame and packet levels
[D] Only physical level
[E] None of these
165. Array is ______
[A] Linear data structure
[B] Non-linear data structure
[C] Complex data structure
[D] Simple data structure
[E] None of these
166. How many options does binary choice offer?
[A] None
[B] One
[C] Two
[D] It depends on the amount of memory in the computer
[E] It depends on the speed of the computer’s processor
167. Data going into the computer is called
[A] Output
[B] Algorithm
[C] Input
[D] Calculations
[E] Flow chart
168. Transformation of input into output is performed by
[A] Peripherals
[B] Memory
[C] Storage
[D] The input –output unit
[E] The CPU
169. Devices drivers are
[A] Tiny power cords for external storage devices
[B] Experts who know to maximize the performance of devices
[C] Small, special-purpose programs
[D] The innermost part of the operating system
[E] Substitutes for operating systems
170. A collection of program that controls how your computer system runs and processes information is called
[A] Operating system
[B] Computer
[C] Office
[D] Compiler
[E] Interpreter
171. A set of instructions telling the computer what to do is called
[A] Mentor
[B] Instructor
[C] Compiler
[D] Program
[E] Debugger
172. If you receive an e-mail form someone you don’t know, what should you do?
[A] Forward it to the police immediately
[B] Delete it without opening it
[C] Open it and respond to them saying you don’t know them
[D] Reply and ask them for their personal information
[E] Reply and tell them in touch with them
173. Which of the following can handle most system functions that aren’t handled directly by the operating system?
[A] Vertical market applications
[B] Utilities
[C] Algorithms
[D] Integrated software
[E] Compilers
174. Computer connected to a LAN (Local Area Network) can
[A] Run faster
[B] Go on line
[C] Share information and/or share peripheral equipment
[D] E-MAIL
[E] None of these
175. Which of the following refers to the memory in your computer?
[A] RAM
[B] DSL
[C] USB
[D] LAN
[E] CPU
176. One megabyte equals approximately
[A] 1000 bits
[B] 1000 bytes
[C] 1 million bytes
[D] 1 million bits
[E] 2000 bytes
177. When you are working on a document on PC, where is the document temporarily stored?
[A] RAM
[B] ROM
[C] The CPU
[D] Flash memory
[E] The CD-ROM
178. Magnetic tape is not practical for applications where data must be quickly recalled because tape is
[A] A random access medium
[B] A sequential access medium
[C] A read only medium
[D] Fragile and easily damaged
[E] An expensive storage medium
179. When cutting and pasting, the item cut is temporarily stored in
[A] ROM
[B] Hard drive
[C] Diskette
[D] Dashboard
[E] Clipboard
180. The hardware device that acts as both a switching and connecting unit is called
[A] RS-232 C port
[B] Concentrator
[C] Multiplexer
[D] Communication processor
[E] None of these
181. The device that assembles groups of characters into complete messages prior to their entering the CPU is called
[A] An interpreter
[B] A compiler
[C] A communication processor
[D] An editor
[E] A Translator
182. Data structure includes
[A] Array
[B] Execution statement
[C] Interaction
[D] Both 2 and 3
[E] List
183. What is the name of logic circuits which can add two binary digits?
[A] Hal adder
[B] Full adder
[C] Parallel adder
[D] Serial adder
[E] None of these
184. A program embedded in a semiconductor chip during their manufacture is called
[A] Humanware
[B] Firmware
[C] Liveware
[D] Hardware
[E] Software
185. A collection of related fields in data organization is called
[A] Group
[B] File
[C] Information
[D] Register
[E] Record
186. Plotter accuracy is measured in terms of repeatability and
[A] Vertical dimension
[B] Intelligence
[C] Resolution
[D] Pixels
[E] Buffer size
187. The data base III plus is mostly used for
[A] Office automation
[B] Database management problems
[C] Scientific problems
[D] Calculations only
[E] None of these
188. In the ‘’C’’ language the function scant ( ) reads
[A] Single character
[B] Character and strings
[C] Any possible number
[D] Any possible variable type
[E] Limited variable types
189. BIOS stand for
[A] Basic Input Output services
[B] Basic inner outer services
[C] Better input output services
[D] Better inner and outer services
[E] BIOS-Basic input/output system
190. A commonly used graphic format for the web is
[A] GIF
[B] BMP
[C] Text
[D] IMP
[E] TIF
191. The HTML code written in a text editor to make web-pages is
[A] HTML coding tags
[B] Source code
[C] Source element
[D] Tags
[E] None of these
192. The basic building block of a database that contains related records is
[A] Query
[B] Form
[C] Table
[D] Edited page
[E] Report
193. A set of rules that computer on a network use to communicate with each other are called
[A] Rules
[B] Regulations
[C] Protocol
[D] Netiquettes
[E] None of these
194. The process of connecting to the internet account is
[A] LOG IN
[B] LOG OUT
[C] SIGN IN
[D] SIGN OUT
[E] None of these
195. An image editing software in which we can draw and edit images, is
[A] Page maker
[B] MS-paint
[C] Photo image
[D] Front page
[E] Corel draw
196. Which out of the following is not DBMS software?
[A] DBASE
[B] FOXPRO
[C] ORACLE
[D] Sybase
[E] Data base 2000
197. The _____ of a system includes the programs or instructions.
[A] Hardware
[B] Icon
[C] Information
[D] Software
[E] None of these
198. Which of the following displays programs that are currently running? A single click on one of the program icons
[A] Menu bar
[B] Task bar
[C] Title bar
[D] Status bar
[E] None of these
199. In order to save a world documents as a web page you need to
[A] Put the appropriate graphics and links on the documents
[B] Save the document in simple text format
[C] Use your web browser as editor and save URL
[D] Save as HTML
[E] None of these
200. Which of the following displays to the space where the text will be inserted when you type?
[A] Screen tip
[B] Insertion point
[C] Rulers
[D] Office Assistant
[E] None of these
201. Something which has easily understood instructions is said to be
[A] User friendly
[B] Information
[C] Word processing
[D] Icon
[E] None of these
202. The copy command saves to
[A] The desktop
[B] The clipboard
[C] Microsoft word
[D] Paste
[E] None of these
203. An example of non-numeric data is
[A] Bank balance
[B] Examination marks
[C] Real Numbers
[D] Employee Address
[E] None of these
204. Which of the following displays the button for changing text style, Alignment and size?
[A] Standard toolbar
[B] Status bar
[C] Drawing tool bar
[D] Formatting tool bar
[E] None of these
205. Arranging of data in a logical sequence is known as
[A] Classifying
[B] Searching
[C] Sorting
[D] Reproducing
[E] None of these
206. Which of the following tools is not normally used during system analysis?
[A] Program flow chart
[B] Grid flow chart
[C] System flow chart
[D] Question check list
[E] None of these
207. A single application that combines the major features of several types of application is called
[A] Integrated software
[B] A suite
[C] A combo package
[D] High end
[E] None of these
208. The word processing task associated with changing the appearance of documents is
[A] Writing
[B] Formatting
[C] Editing
[D] Storing
[E] None of these
209. I n order to save an existing document with a different name you need to
[A] Retype the document and give it a different name
[B] Use the save as command
[C] Copy and paste the original document to a new document and then rename it
[D] Use windows explorer to copy the document to a different location and then rename it
[E] None of these
210. It is better to copy a file from as floppy disk, and then open the copy on the hard disk because
[A] A floppy disk is easily moved from one computer to another
[B] you can store more on a hard disk
[C] The computer cannot open a file stored on a floppy disk
[D] Reading a hard disk is much faster and safer
[E] None of these
211. The best reason that a computer needs to have a hard disk is because
[A] It can then use the same program as computers
[B] It would not work without one
[C] It can store information when it is switched off
[D] It can store information while it is working
[E] None of these
212. Firewalls are used to protect against________
[A] Unauthorized attacks
[B] Virus Attacks
[C] Data driven attacks
[D] Fire attacks
[E] None of these
213. The _________ directory is mandatory for every disk
[A] Root
[B] Base
[C] Sub
[D] Case
[E] None of these
214. ‘WWW’ stands for ________
[A] World word web
[B] World Wide Web
[C] World white web
[D] World work web
[E] None of these
215. Which of the following is NOT associated with computer?
[A] Bit
[B] Binary
[C] Pencil
[D] Mouse
[E] Screen
[E] None of these

ANSWERS:

1
A
26
C
51
C
76
B
101
D
126
A
151
B
176
C
201
A
2
D
27
D
52
B
77
A
102
B
127
A
152
D
177
A
202
B
3
C
28
A
53
E
78
A
103
D
128
D
153
B
178
B
203
D
4
B
29
A
54
B
79
A
104
B
129
A
154
A
179
E
204
D
5
D
30
C
55
D
80
B
105
B
130
D
155
C
180
C
205
C
6
A
31
B
56
E
81
C
106
C
131
A
156
C
181
C
206
D
7
A
32
D
57
A
82
D
107
D
132
E
157
B
182
A
207
A
8
A
33
D
58
C
83
B
108
B
133
5
158
B
183
A
208
B
9
A
34
A
59
E
84
B
109
B
134
D
159
C
184
B
209
B
10
A
35
A
60
E
85
C
110
C
135
E
160
B
185
C
210
D
11
A
36
A
61
B
86
D
111
A
136
C
161
D
186
E
211
B
12
A
37
D
62
E
87
C
112
B
137
A
162
C
187
B
212
B
13
A
38
D
63
B
88
B
113
B
138
A
163
D
188
D
213
A
14
A
39
B
64
E
89
D
114
A
139
C
164
D
189
E
214
B
15
A
40
A
65
D
90
B
115
A
140
B
165
A
190
A
215
C
16
A
41
A
66
D
91
A
116
B
141
A
166
C
191
B


17
A
42
B
67
A
92
D
117
B
142
A
167
C
192
E


18
A
43
A
68
A
93
B
118
D
143
E
168
E
193
C


19
A
44
C
69
C
94
C
119
B
144
B
169
C
194
A


20
A
45
C
70
D
95
D
120
C
145
D
170
A
195
E


21
B
46
C
71
C
96
C
121
D
146
C
171
D
196
E


22
A
47
C
72
A
97
A
122
A
147
D
172
B
197
D


23
C
48
C
73
A
98
C
123
D
148
A
173
B
198
B


24
D
49
A
74
D
99
A
124
D
149
D
174
C
199
D


25
B
50
C
75
D
100
A
125
B
150
B
175
A
200
E

































































































































































































































































































































































































































































































































































































































































































































































































































































































































No comments:

Post a Comment