Computer Fundamental MCQ
Computer Fundamental MCQ
Questions)
Here are 1000 MCQs on Computer Fundamental (Chapterwise).
1. Who is the father of Computers?
a) James Gosling
b) Charles Babbage
c) Dennis Ritchie
d) Bjarne Stroustrup
View Answer
Answer: b
Explanation: Charles Babbage is known as the father of computers. Charles Babbage
designed and built the first mechanical computer and Difference Engine.
10. Which of the following unit is responsible for converting the data received from the user
into a computer understandable format?
a) Output Unit
b) Input Unit
c) Memory Unit
d) Arithmetic & Logic Unit
View Answer
Answer: b
Explanation: The Input Unit converts the data, which the user enters into a language that
the computer understands, i.e. it converts the data into binary format. The Output Unit is
responsible for giving the results in a user-understandable format. The Storage Unit is
responsible for storing the data after immediate results of processing whereas; the ALU is
responsible for various arithmetic and bitwise operations.
11. Which of the following monitor looks like a television and are normally used with non-
portable computer systems?
a) LED
b) LCD
c) CRT
d) Flat Panel Monitors
View Answer
Answer: c
Explanation: A CRT (or the Cathode Ray Tube) Monitor looks like a television ideally. The
flat-panel monitors are thinner and lighter in comparison.
13. Which of the following part of a processor contains the hardware necessary to perform
all the operations required by a computer?
a) Controller
b) Registers
c) Cache
d) Data path
View Answer
Answer: d
Explanation: A processor is a part of the computer which does all the data manipulation and
decision making. A processor comprises of:
A data path that contains the hardware necessary to perform all the operations. A controller
tells the data path what needs to be done.
The registers act as intermediate storage for the data.
15. Which of the following device use positional notation to represent a decimal number?
a) Pascaline
b) Abacus
c) Computer
d) Calculator
View Answer
Answer: b
Explanation: Abacus was used to do arithmetic calculations around 2500 years ago.
Pascaline was the pascal’s calculator by Blaise Pascal invented for doing laborious
calculations.
18. Which of the following defines the assigned ordering among the characters used by the
computer?
a) Accumulation
b) Sorting
c) Collating Sequence
d) Unicode
View Answer
Answer: c
Explanation: Collating sequence is the term used for ordering among characters. It may
vary depending upon the type of code used by a computer.
19. Which of the following storage is a system where a robotic arm will connect or
disconnect off-line mass storage media according to the computer operating system
demands?
a) Magnetic
b) Secondary
c) Virtual
d) Tertiary
View Answer
Answer: d
Explanation: Tertiary storage is the correct option. It is used in the realms of enterprise
storage and scientific computing on large computer systems and business computer
networks and is something a typical personal computer never sees firsthand.
20. Which of the following is known as the interval between the instant a computer makes a
request for the transfer of data from a disk system to the primary storage and the instance
the operation is completed?
a) Disk utilization time
b) Drive utilization time
c) Disk access time
d) Disk arrival time
View Answer
Answer: c
Explanation: The interval is referred to as the disk arrival time. It depends on several
parameters. Generally, a computer makes a request and the operation is served.
21. Which of the following devices provides the communication between a computer and
the outer world?
a) Compact
b) I/O
c) Drivers
d) Storage
View Answer
Answer: b
Explanation: The I/O i.e. the input/output devices provide a means of communication
between the computer and the outer world. They are often referred to as peripheral devices
sometimes.
22. Which of the following are the input devices that enable direct data entry into a
computer system from source documents?
a) System Access devices
b) Data acquiring devices
c) Data retrieving devices
d) Data Scanning devices
View Answer
Answer: d
Explanation: They are referred to as data scanning devices. They eliminate the need to key
in text data into the computer. It demands the high quality of input documents.
23. Which of the following is the device used for converting maps, pictures, and drawings
into digital form for storage in computers?
a) Image Scanner
b) Digitizer
c) MICR
d) Scanner
View Answer
Answer: b
Explanation: A digitizer serves the purpose given in the question. Digitizers are generally
used in the area of Computer-Aided Design by architects and engineers to design cars,
buildings, etc.
25. Which of the following is known as the language made up of binary-coded instructions?
a) High level
b) BASIC
c) C
d) Machine
View Answer
Answer: d
Explanation: The language made up of binary-coded instructions built into the hardware of a
particular computer and used directly by the computer is machine language.
26. Which of the following package allows individuals to use personal computers for storing
and retrieving their personal information?
a) Personal assistance package
b) Graphics package
c) Spreadsheet package
d) Animation package
View Answer
Answer: a
Explanation: It is a personal assistance package that allows for the same. It helps in
planning and managing their schedules, contacts, finances, and inventory of important
terms.
27. Which of the following is created when a user opens an account in the computer
system?
a) SFD
b) MFD
c) Subdirectory
d) RFD
View Answer
Answer: c
Explanation: A subdirectory is created when a user opens an account in the computer
system. It is treated as a file, though flagged in MFD as a subdirectory.
28. Which of the following is a technique that marked the beginning of computer
communications?
a) User Environment
b) Batch Environment
c) Time Sharing
d) Message passing
View Answer
Answer: c
Explanation: The answer is time-sharing. In time-sharing, Users were able to interact with
the computer and could share its information processing resources.
29. Which of the following is a type of technique in which dumb terminals are connected to a
central computer system?
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
View Answer
Answer: a
Explanation: This happens in time-sharing. In this, users were able to interact with the
computer and could share its information processing resources.
30. Which of the following service allows a user to log in to another computer somewhere
on the Internet?
a) e-mail
b) UseNet
c) Telnet
d) FTP
View Answer
Answer: c
Explanation: Telnet is the answer. It is a service that enables the user to log into another
computer somewhere on the Internet.
31. Which of the following is not a type of computer on the basis of operation?
a) Digital
b) Analog
c) Hybrid
d) Remote
View Answer
Answer: d
Explanation: There are three types of computers basically on the basis of operation:
Analog, Digital, and Hybrid.
32. Which of the following type of computer is mostly used for automatic operations?
a) analog
b) digital
c) hybrid
d) remote
View Answer
Answer: c
Explanation: Hybrid computer is mostly used with automatic operations of complicated
physical processes and machines.
33. Which of the following invention gave birth to the much cheaper microcomputers?
a) PDAs
b) Microprocessors
c) Microcomputers
d) Mainframes
View Answer
Answer: b
Explanation: The invention of the microprocessor (also called a single-chip CPU) gave birth
to much cheaper microcomputers.
34. Which of the following computers are lower than mainframe computers in terms of
speed and storage capacity?
a) Mainframes
b) Hybrid
c) Mini
d) Super
View Answer
Answer: c
Explanation: The answer is a. Mini computers are compared to mainframe computers in
terms of:
1. speed and, 2. storage capacity.
1. Which unit is responsible for converting the data received from the user into a computer
understandable format?
a) Memory Unit
b) Arithmetic & Logic Unit
c) Input Unit
d) Output Unit
View Answer
Answer: c
Explanation: The Input Unit converts the data, which the user enters into a language which
the computer understands, i.e. it converts the data into binary format. The Output Unit is
responsible for giving the results in user-understandable format. The Storage Unit is
responsible for storing the data after immediate results of processing whereas; the ALU is
responsible for various arithmetic and bitwise operations.
6. The input machine which originated in the United States around 1880s is a ___________
a) Mouse
b) Joystick
c) Keyboard
d) Bar Code Reader
View Answer
Answer: c
Explanation: A keyboard is an input device which originated in the 1880s and is used to give
instructions to the computer in the form of letters and numbers. Mouse is used for the
selection of various objects on the screen, joystick is mainly used for gaming purpose and
bar code readers are used for reading the bar-codes.
8. 1 yottabyte = ______________
a) 1024 TB
b) 1024 EB
c) 1024 ZB
d) 1024 PB
View Answer
Answer: c
Explanation: 1 yottabyte is equal to 1024 ZB, which stands for zettabyte. Further, 1
ZB=1024 EB (exabyte) and and 1 EB=1024PB (petabyte).
a) 1.ALU 2. MU
b) 1.Output unit 2.Input Unit
c) 1.MU 2. ALU
d) 1.Input Unit 2.Output Unit
View Answer
Answer: d
Explanation: The above diagram is a simple explanation which describes how the
instruction is given to the CPU, how it is processed, and then how the result is obtained.
So here, the input unit is used to give instructions to the central processing unit and the
output unit is responsible for giving the result to the user.
Computer Fundamentals Questions and
Answers – The Output Unit
This set of Computer Fundamentals Interview Questions and Answers focuses on “The
Output Unit”.
1. The process of producing useful information for the user is called ___________
a) Controlling
b) Outputting
c) Inputting
d) Processing
View Answer
Answer: b
Explanation: The Output Unit is responsible for giving the results to the user in the form of a
printed report or visual display. The process is referred to as outputting. Controlling is
nothing but the manner and sequence in which the instructions are being operated.
Inputting means giving instructions to the system whereas, processing means performing
certain operations and calculations.
2. The output unit converts the data entered by the user into computer understandable form.
a) True
b) False
View Answer
Answer: b
Explanation: The Output unit is responsible for converting the computer obtained data into
user understandable format. The Input Unit is responsible for converting the data in
computer understandable format.
6. A special request originated from some device to the CPU to acquire some of its time is
called ___________
a) Disturbance
b) Attenuation
c) Interrupt
d) Noise
View Answer
Answer: c
Explanation: An interrupt is a kind of request which takes control of the system bus for some
time, then performs all the operations and gives back control to the CPU. It is usually
identified by some number and is handled by the interrupt controller.
8. A ___________________ monitor looks like a television and are normally used with non-
portable computer systems.
a) CRT
b) LCD
c) LED
d) Flat Panel Monitors
View Answer
Answer: a
Explanation: A CRT (or the Cathode Ray Tube) Monitor looks like a television ideally. The
flat panel monitors are thinner and lighter in comparison.
2. Saving data and instructions to make them readily available is the job of __________
a) Storage Unit
b) Cache Unit
c) Input Unit
d) Output Unit
View Answer
Answer: a
Explanation: The storage unit is responsible for storing the data. It makes the instructions
readily available for additional or initial processing whenever required. The cache is a
software component that stores data to serve the data requests in future. It can contain the
result of some earlier computations.
3. The two basic types of memory in a computer are ________
10. The first practical form of Random Access Memory was the __________
a) SSEM
b) Cathode Ray Tube
c) William’s Tube
d) Thomas’s Tube
View Answer
Answer: c
Explanation: The first practical form of RAM was William’s Tube made in 1947. It stored
data as electrically charged spots on the face of a Cathode Ray Tube
1. The ‘heart’ of the processor which performs many different operations _____________
a) Arithmetic and logic unit
b) Motherboard
c) Control Unit
d) Memory
View Answer
Answer: a
Explanation: The Arithmetic and logic unit performs all the basic operations of the computer
system. It performs all the arithmetic(+,-,*,/,etc) as well as the logical operations( AND, OR,
NOT, etc.).
2. ALU is the place where the actual executions of instructions take place during the
processing operation.
a) True
b) False
View Answer
Answer: a
Explanation: ALU is a combinational electronic circuit which basically performs all the logical
or the bitwise operations and the arithmetic operations. Therefore, it is the place where the
actual executions of instructions take place.
6. The ALU gives the output of the operations and the output is stored in the ________
a) Memory Devices
b) Registers
c) Flags
d) Output Unit
View Answer
Answer: b
Explanation: Any output generated by the ALU gets stored in the registers. The registers
are the temporary memory locations within the processor that are connected by signal paths
to the CPU.
9. Which flag indicates the number of 1 bit that results from an operation?
a) Zero
b) Parity
c) Auxiliary
d) Carry
View Answer
Answer: b
Explanation: The parity flag indicates the number of 1 bit in any operation. The resultant bit
is called the parity bit. The main aim of the parity bit is to check for errors.
1. ____________ is the raw material used as input and __________ is the processed data
obtained as output of data processing.
a) Data, Instructions
b) Instructions, Program
c) Data, Program
d) Program, Code
View Answer
Answer: a
Explanation: Data can be assumed as a raw material which, in turns after processing gives
the desired output in the form of instructions. Further, a set of ordered and meaningful
instructions is known as a program.
a) Input Unit
b) Memory Unit
c) Control Unit
d) I/O Unit
View Answer
Answer: c
Explanation: The control unit manages and coordinates the operations of a computer
system. The ALU is responsible for performing all the arithmetic and bitwise operations .
Therefore, both these units combine to form the brain of the computer ,which is the central
processing unit.
advertisement
4. The part of a processor which contains hardware necessary to perform all the operations
required by a computer:
a) Data path
b) Controller
c) Registers
d) Cache
View Answer
Answer: a
Explanation: A processor is a part of the computer which does all the data manipulation and
decision making. A processor comprises of:
A data path which contains the hardware necessary to perform all the operations. A
controller tells the data path what needs to be done.
The registers act as intermediate storage for the data.
5. What does MAR stand for?
a) Main Address Register
b) Memory Access Register
c) Main Accessible Register
d) Memory Address Register
View Answer
Answer: d
Explanation: MAR is a type of register which is responsible for the fetch operation. MAR is
connected to the address bus and it specifies the address for the read and write operations.
6. If the control signals are generated by combinational logic, then they are generated by a
type of _______________ controlled unit.
a) Micro programmed
b) Software
c) Logic
d) Hardwired
View Answer
Answer: d
Explanation: The main task of a control unit is to generate control signals. There are two
main types of control units:
A hardwired control unit generates control signals by using combinational logic circuits and
the Micro programmed control unit generates control signals by using some softwares.
5. A transmission mode that can transmit data in both the directions but transmits in only
one direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: b
Explanation: The half duplex mode supports two way traffic but only in one direction at a
time. The interactive transmission of data within a time sharing system may be best suited
to half-duplex lines.
5. A transmission mode that can transmit data in both the directions but transmits in only
one direction at a time.
a) simplex
b) half duplex
c) full duplex
d) semi-duplex
View Answer
Answer: b
Explanation: The half duplex mode supports two way traffic but only in one direction at a
time.
10. The purpose of communication system is to transfer information from _______ to the
destination.
a) user
b) source
c) system
d) station
View Answer
Answer: b
Explanation: The answer is source. A communication system transfers information from
source to the destination
10. In this technique, there is a link between subscriber and network and a local loop.
a) SSDL
b) DSDL
c) ASDL
d) TSDL
View Answer
Answer: c
Explanation: In ASDL, there is a link between the subscriber and the network. It uses
currently installed twisted pair cable.
3. _____ LAN topology describes the possible connections between pairs of networked
end-points that can communicate.
a) Complex
b) Physical
c) Logical
d) Incremental
View Answer
Answer: c
Explanation: A logical LAN topology describes the possible connections. LAN stands for
Local Area Network.
advertisement
4. A term that refers to the way in which the nodes of a network are linked together.
a) network
b) topology
c) connection
d) interconnectivity
View Answer
Answer: b
Explanation: Topology is a term that refers to the way in which the nodes are connected.
There are 4 major topology networks.
2. Partial mesh is a highly flexible topology that can take a variety of very different
configurations.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Partial mesh is a highly flexible topology that can take a
variety of very different configurations. The routers are tightly coupled than the basic
topologies. But they are not fully interconnected, as would be the case in a fully meshed
network.
5. A type of technique in which dumb terminals are connected to a central computer system.
a) Time Sharing
b) Message passing
c) Batch environment
d) User environment
View Answer
Answer: a
Explanation: This happens in time sharing. In this, users were able to interact with the
computer and could share its information processing resources.
1. A network that links many different types of computers all over the world.
a) Intranet
b) Internet
c) Arpanet
d) LAN
View Answer
Answer: b
Explanation: Internet is a network of computers that links many different types of computers.
It is a network of network sharing a common mechanism for addressing computers.
3. A service that allows a user to log in into another computer somewhere on the Internet.
a) Telnet
b) FTP
c) e-mail
d) UseNet
View Answer
Answer: a
Explanation: Telnet is the answer. It is a service that enables the user to log into another
computer somewhere on the Internet.
advertisement
4. An internet service that allows the user to move a file.
a) FTP
b) Telnet
c) UseNet
d) Time Sharing
View Answer
Answer: a
Explanation: The answer is FTP. FTP stands for File Transfer Protocol. It allows the user to
move a file from one computer to another on the internet.
9. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
d) WWW
View Answer
Answer: c
Explanation: Web Browsers help the user to maintain a personal favorite list of URLs. Also,
allows the user to download information on various formats.
2. In the Client-server model, the client receives a request from the server.
a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. The server receives a request from the client. It then
performs the requested work.
9. Allows the user to create and maintain a personal list of favorite URL addresses.
a) Software
b) Web Servers
c) Web Browsers
d) WWW
View Answer
Answer: c
Explanation: Web Browsers help the user to maintain a personal favorite list of URLs. Also,
allows the user to download information on various formats.
1. A program that can retrieve files from the world wide web and render text, images or
sounds encoded in the files.
a) Browser
b) Internet
c) Server
d) Web Server
View Answer
Answer: a
Explanation: A browser or a web browser is a program that can retrieve files from the world
wide web. Certain examples are IE, Mozilla, etc.
5. In HTML, the tags that tell the browser how to display the page.
a) markup
b) style
c) body
d) head
View Answer
Answer: a
Explanation: Markup is a general term used to refer the types of tags in HTML. The markup
tags tell the browser how to display the page.
9. A _________ partitions a web browser window so that multiple web documents can be
displayed simultaneously.
a) Frame
b) set
c) Frameset
d) div
View Answer
Answer: c
Explanation: A frameset partitions a web browser window so that multiple web documents
can be displayed simultaneously. Frameset can have attributes like cols.
10. The _________ attribute specifies the web page to be placed in the frame initially.
a) name
b) src
c) cols
d) rows
View Answer
Answer: b
Explanation: The src attribute or the source specifies the web page to be placed in the
frame initially. It may be subsequently overwritten.
2. Media literacy can help youth and adults understand how media shapes our culture.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Media literacy also develops our critical thinking. It also
helps in the better understanding of how media shapes our culture.
6. This part of image analysis refers to those primary signs, often part of the technique of
photography, which are about how the image is made.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: a
Explanation: Treatment in image analysis refers to those primary signs, often part of the
technique of photography, which is about how the image is made.
7. In image analysis, this part refers to objects represented within the image, which may
signify to us because of, for example, their symbolic power or because of their composition
in relation to each other.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: c
Explanation: Content refers to objects represented within the image. Treatment in image
analysis refers to those primary signs, often part of the technique of photography, which are
about how the image is made.
9. __________ describes the effect of involving the reader with the story, of constructing it
as truth.
a) Narration
b) Identification
c) Plot
d) Characters
View Answer
Answer: b
Explanation: Identification describes the effect of involving the reader with the story, of
constructing it as truth. It produces a meaning of truth, a belief in the validity of the text and
of all the other meanings that we make from it.
10. The notion of norms also links to the idea that representations are given force through a
process of:
a) naturalization
b) identification
c) media
d) casting
View Answer
Answer: a
Explanation: The notion of norms also links to the idea that representations are given force
through a process of naturalization.
1. The media texts may throw up discourses and are called ____________
a) Binary oppositions
b) Violations
c) Oppositions
d) Media Illiteracy
View Answer
Answer: a
Explanation: Some texts may also throw up discourses and their meanings if you attend to
what are called binary oppositions. The discourse is also marked by what it is not, by what it
is opposed to.
2. In terms of image analysis, it is important to attend to primary level signs in visual codes,
most obviously for examples of still photography.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. This approach categorizes the image analysis into
three: position, treatment and content.
3. The notion of __________ is one which is especially associated with semiotics and with
genres.
a) Media
b) Web
c) codes
d) Text
View Answer
Answer: c
Explanation: The notion of codes is one which is especially associated with semiotics and
with genres. The textual codes may be summarized into: written, spoken, non-verbal and
visual.
advertisement
4. The idea of _________is central to understanding the production of meaning through
texts.
a) Identity
b) Content
c) Represntation
d) Network
View Answer
Answer: c
Explanation: The idea of representation is central to understanding the production of
meaning through texts. Texts are nothing but representations in both a material and an
ideological sense.
6. A system of interlinked documents, websites, portals etc. accessed through the Internet.
a) WWW
b) Internet
c) Web
d) Media
View Answer
Answer: a
Explanation: World Wide Web a system of interlinked documents, websites, portals etc.
accessed through the Internet. Since these links are not physical or mechanical, they are
called `virtual’ links or `hyperlinks’.
7. In image analysis, this part refers to objects represented within the image, which may
signify to us because of, for example, their symbolic power or because of their composition
in relation to each other.
a) Treatment
b) Position
c) Content
d) Media
View Answer
Answer: c
Explanation: Content refers to objects represented within the image. Treatment in image
analysis refers to those primary signs, often part of the technique of photography, which are
about how the image is made.
9. _________ are the web-based interactive applications to express and share your ideas
and thoughts with interested people.
a) Website
b) Blog
c) Web directories
d) Corporate Websites
View Answer
Answer: b
Explanation: Blogs are the web-based interactive applications to express and share your
ideas and thoughts with interested people. It is an open platform that can be used as on-line
diaries, a journal, or editorial.
10. A term used in the context of web design to suggest the path that user takes while
browsing a website.
a) navigation
b) identification
c) graphics media
d) casting
View Answer
Answer: a
Explanation: Navigation is a term used in the context of web design to suggest the path that
user takes while browsing a website
2. In terms of image analysis, it is important to attend to primary level signs in visual codes,
most obviously for examples of still photography.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. This approach categorizes the image analysis into
three: position, treatment and content.
5. A term for Illusion of immersion by projecting stereo images on the walls and floor of a
room.
a) CAVE
b) BOOM
c) GUI
d) HMD
View Answer
Answer: a
Explanation: CAVE is the term. CAVE stands for Cave Automatic Virtual Environment.
7. A term to describe the extent to which a user can modify form and content of a mediated
environment.
a) Vividness
b) Richness
c) Interactivity
d) Mapping
View Answer
Answer: c
Explanation: Interactivity is the extent to which a user can modify form and content of a
mediated environment. It comprises speed and mapping.
8. A type of VR environment in which subjects are visually isolated from the real
environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer
Answer: a
Explanation: In immersive VR, subjects are visually isolated from the real environment. A
virtual scene is responding to the subjects actions.
10. In this type of VR environment, the subjects can perform both in the real and virtual
environment.
a) Immersive
b) Semi immersive
c) Non immersive
d) Augmented
View Answer
Answer: b
Explanation: The Semi-Immersive Virtual Reality provides an experience partially based in a
virtual environment.
9. ___________ animation is used to animate things that are smaller than life size.
a) Immersive
b) Claymotion
c) Stop motion
d) Augmented
View Answer
Answer: c
Explanation: Stop motion animation is used to animate things that are smaller than life size.
Willis Harold O’Brian pioneered motion picture special effects, which were perfected in stop
motion.
8. In this generation Time sharing, Real time, Networks, Distributed Operating System was
used.
a) 1st
b) 2nd
c) 5th
d) 4th
View Answer
Answer: d
Explanation: The fourth generation of computers is marked by the use of Very Large Scale
Integrated (VLSI) circuits. In this generation Time sharing, Real time, Networks, Distributed
Operating System was used.
2. A remote object is an object whose method can be invoked from another virtual
environment.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. JVM is java virtual environment. RMI uses stub and
skeleton object for communication with the remote object. A remote object is an object
whose method can be invoked from another virtual environment.
3. A typical _________ program creates some remote objects, makes references to these
objects accessible, and waits for clients to invoke methods on these objects.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
Answer: a
Explanation: A server program creates remote objects. It gives reference to these objects
and then waits for clients to invoke methods on these objects.
advertisement
4. A typical __________ program obtains a remote reference to one or more remote objects
on a server and then invokes methods on them.
a) Server
b) Client
c) Thread
d) Concurrent
View Answer
Answer: b
Explanation: A client program obtains a remote reference to one or more remote objects on
a server. It then invokes methods on them.
5. The ___________ layer, which provides the interface that client and server application
objects use to interact with each other.
a) Increasing
b) Count
c) Bit
d) Stub/skeleton
View Answer
Answer: d
Explanation: The stub or skeleton layer provides the interface that client and server
application objects use for interaction with each other.
10. RMI uses stub and skeleton for communication with the ________ object.
a) client
b) remote
c) server
d) any
View Answer
Answer: b
Explanation: RMI uses stub and skeleton object for communication with the remote object.
A remote object is an object whose method can be invoked from another JVM.
8. The measure of the “effort” needed to maintain efficiency while adding processors.
a) Maintainablity
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer
Answer: c
Explanation: The measure of the “effort” needed to maintain efficiency while adding
processors is called as scalabilty.
9. The rate at which the problem size need to be increased to maintain efficiency.
a) Isoeffciency
b) Efficiency
c) Scalabilty
d) Effectiveness
View Answer
Answer: a
Explanation: Isoefficiency is the rate at which the problem size need to be increased to
maintain efficiency.
6. In this type of cloud, an organization rents cloud services from cloud providers on-
demand basis.
a) Private
b) Public
c) Protected
d) Hybrid
View Answer
Answer: b
Explanation: This happens in public cloud. Services are provided to the users using utility
computing model.
7. In this type of cloud, the cloud is composed of multiple internal or external cloud.
a) Private
b) Public
c) Protected
d) Hybrid
View Answer
Answer: d
Explanation: The hybrid cloud is composed of multiple internal or external clouds. This is
the scenario when an organization moves to public cloud computing domain from its internal
private cloud.
8. _____________ enables the migration of the virtual image from one physical machine to
another.
a) visualization
b) virtualization
c) migration
d) virtual transfer
View Answer
Answer: b
Explanation: Virtualization enables the migration of the virtual image from one physical
machine to another. This feature is useful for cloud as by data locality lots of optimization is
possible.
5. ______________ are used for solving complex application such as Global Weather
Forecasting.
a) Super Computers
b) Public computers
c) Mobile computers
d) Hybrid computers
View Answer
Answer: a
Explanation: Super computers are used with complex applications like Global Weather
Forecasting, Creating graphic images, engineering design and testing, space exploration,
etc.
6. The invention of _______________ gave birth to the much cheaper micro computers.
a) Mainframes
b) Microcomputers
c) Microprocessors
d) PDAs
View Answer
Answer: c
Explanation: The invention of microprocessor (also called as single chip CPU) gave birth to
the much cheaper microcomputers.
7. They can operate on batteries and hence are very popular with travelers.
a) Mainframes
b) Laptops
c) Microprocessors
d) Hybrid
View Answer
Answer: b
Explanation: Laptops can operate on batteries and hence are very popular with travelers.
The screen folds down onto the keyboard when not in use.
10. ______computers are lower to mainframe computers in terms of speed and storage
capacity.
a) Mini
b) Super
c) Mainframes
d) Hybrid
View Answer
Answer: a
Explanation: The answer is a. Mini computers are compared to mainframe computers in
terms of:
1. speed and, 2. storage capacity.
5. Making the smaller and smaller things have the ability to connect and interact.
a) Micro Tech
b) Smart tech
c) Nano tech
d) RFID
View Answer
Answer: c
Explanation: Nano Tech is the term used when smaller things are made to interact and
communicate. It is involved in the working of Iot also.
9. Collect->Communicate->__________->Act
a) Acknowledge
b) Analyze
c) Examine
d) Rectify
View Answer
Answer: b
Explanation: The correct option is analyze. This shows the lifecycle of IoT.
Collect->Communicate->Analyze->Act.
1. The technology that has the ability to interact with the world.
a) AI
b) ML
c) IOT
d) IT
View Answer
Answer: a
Explanation: AI which is artificial intelligence is the ability to interact with the world. It is the
ability to model the world and to learn and adapt.
1. The field that covers a variety of computer networks, both public and private, that are
used in everyday jobs.
a) Artificial Intelligence
b) ML
c) Network Security
d) IT
View Answer
Answer: c
Explanation: Network security covers a variety of computer networks, both private and
public. Everyday jobs like conducting transactions and communications among business
and government agencies etc.
8. Security features that control that can access resources in the OS.
a) Authentication
b) Identification
c) Validation
d) Access control
View Answer
Answer: d
Explanation: Access control refers to the security features. Applications call access control
to provide resources.
9. An algorithm in encryption is called _____________
a) Algorithm
b) Procedure
c) Cipher
d) Module
View Answer
Answer: c
Explanation: An algorithm used in encryption is referred to as a cipher. cipher is an
algorithm for performing encryption or decryption
2. The protocol designed to make the security of wireless LAN as good as that of wired
LAN.
a) WTLS
b) WEP
c) RSN
d) WP
View Answer
Answer: b
Explanation: WEP stands for Wired Equivalent Privacy. WEP has been broken already in
2001. WEP protocol designed to make the security of wireless LAN as good as that of wired
LAN.
3. A person who enjoys learning details about computers and how to enhance their
capabilities.
a) Cracker
b) Hacker
c) App controller
d) Site controller
View Answer
Answer: b
Explanation: The person is called hacker. A person who enjoys learning the details of
computer systems and how to stretch their capabilities is called hacker.
advertisement
4. A program created by Farmer and Venema for auditing capability.
a) SAAS
b) SATAN
c) SAN
d) SAT
View Answer
Answer: b
Explanation: SATAN is the Security analysis tool for auditing networks. It is created by
farmer and venema.
8. Creating a computer or paper audit that can help detect wrong doings.
a) Auditing
b) Validation
c) RSN
d) Verification
View Answer
Answer: a
Explanation: The answer is auditing. It is done to keep an eye on wrong doings. Auditing
can be used as a deterrent.
11. Attack in which a user creates a packet that appears to be something else.
a) Smurfing
b) Trojan
c) E-mail bombing
d) Spoofing
View Answer
Answer: d
Explanation: The attack is a spoofing attack. It is when a user creates a packet that appears
to be something else or from someone else.
7. Under DES, the data encryption standard took a 64-bit block of data and subjected it to
______ levels of encryption.
a) 64
b) 8
c) 16
d) 4
View Answer
Answer: c
Explanation: The answer is 16. It was subjected to 16 levels of encryption. DES is the data
encryption standard.
10. An electronic document that establishes your credentials when you are performing
transactions.
a) Digital code
b) OTP
c) E-mail
d) Digital certificate
View Answer
Answer: d
Explanation: Digital certificate is an electronic document that is responsible for secure
internet transactions.
1. A field of technology that deals with a combination of real world and the data generated
from computer.
a) ML
b) AI
c) AR
d) IoT
View Answer
Answer: c
Explanation: AR that is Augmented Reality is a field of technology that deals with a
combination of real world and the data generated from computer.
2. AR is interactive in real-time.
a) True
b) False
View Answer
Answer: a
Explanation: The statement is true. Augmented Reality is the field of computer research that
deals with the combination of real-world and computer generated data.
3. A stage in which individual components are integrated and ensured that they are error-
free to meet customer requirements.
a) Coding
b) Testing
c) Design
d) Implementation
View Answer
Answer: b
Explanation: Hardware and software components are tested individually. Testing stage in
which individual components are integrated and ensured that they are error-free to meet
customer requirements.
advertisement
4. ___________ is a step in which design is translated into machine-readable form.
a) Design
b) Conversion
c) Debugging
d) Coding
View Answer
Answer: d
Explanation: Coding is the step in which design in translated into machine-readable form. If
design is efficient, coding can be done effectively.
5. The customer requirements are broken down into logical modules for ease of
_______________
a) inheritance
b) design
c) editing
d) implementation
View Answer
Answer: d
Explanation: The requirements are broken down for ease of implementation. Hardware and
software requirements are identified and designed accordingly.
6. What do you call a technical person who is capable of understanding the basic
requirements?
a) team leader
b) analyst
c) engineer
d) stakeholder
View Answer
Answer: b
Explanation: The person is called an analyst. An analyst is a software engineering who is
responsible for requirements gathering.
7. A step in waterfall model that involves a meeting with the customer to understand the
requirements.
a) Requirement Gathering
b) SRS
c) Implementation
d) Customer review
View Answer
Answer: a
Explanation: A waterfall model involves requirement gathering as its first step. This is the
most important phase. It is important to understand the customer requirements.
10. A planned program if work that requires a definitive amount of time, effort and planning
to complete.
a) Problem
b) Project
c) Process
d) Program
View Answer
Answer: b
Explanation: The answer is Project. A project is a program which is something which is
planned and needs effort and time to complete.
1. A set of activities that ensure that software correctly implements a specific function.
a) verification
b) testing
c) implementation
d) validation
View Answer
Answer: a
Explanation: Verification ensures that software correctly implements a specific function. It is
a static practice of verifying documents.
8. A testing strategy that tests the application in the context of an entire system.
a) System
b) Validation
c) Unit
d) Gray box
View Answer
Answer: a
Explanation: In system testing, it tests the application in the context of an entire system. The
software and other system elements are tested as a whole.
9. A ________ is tested to ensure that information properly flows into and out of the system.
a) module interface
b) local data structure
c) boundary conditions
d) paths
View Answer
Answer: a
Explanation: A module interface is tested to ensure that information properly flows into and
out of the system.
2. Abstraction combines the data and functions into a single unit called a class.
a) True
b) False
View Answer
Answer: b
Explanation: The statement is false. Data abstraction involves hiding the details and giving
only the necessary information to the user.
5. The ability for programmers to use the same written and debugged existing class.
a) Reusability
b) Design
c) Debugging
d) Implementation
View Answer
Answer: a
Explanation: The programmer can add features to the existing class. The programmer on
further developing the application, and allowing users to achieve increased performance.
6. A concept that combines data and functions into a single unit called class.
a) inheritance
b) encapsulation
c) polymorphism
d) abstraction
View Answer
Answer: b
Explanation: Encapsulation enables the important concept of data hiding possible. It
combines data and functions into a single unit.