Q. Which variable type can have only two possible values?
(A) integer
(B) string
(C) double
(D) bool
The answer is: (D) bool ☑
Q. NTFS stands for?
(A) New Trend File Saving
(B) Network File Saving
(C) New Technology File System
(D) None Of These
The answer is: (C) New Technology File System ☑
Q. In C++, the library function exit() causes an exit from the
(A) statement
(B) loop in which it occurs
(C) function in which it occurs
(D) program in which it occurs
The answer is: (D) program in which it occurs ☑
Q. Consider the main body of a program,
string a = “4”;
string b = “8”;
string c = a + b;
cout << c << endl;
If the program is run, what will be displayed on the screen?
(A) 4
(B) 8
(C) 12
(D) 48
The answer is: (D) 48 ☑
Q. Consider the main body of a C++ program,
string var1 = “Computer “;
string var2 = “Science”;
string var3 = var1 + var2;
cout << “var3” << endl;
If the program is run, what will be displayed on the screen?
(A) var3
(B) Computer
(C) Science
(D) Computer Science
Ans: A
Q. Consider the main body of a C++ program,
string var1 = “Computer “;
string var2 = “Science”;
string var3 = var1 + var2;
cout << var3 << endl;
If the program is run, what will be displayed on the screen?
(A) var3
(B) Computer
(C) Science
(D) Computer Science
The answer is: (D) Computer Science ☑
Q. Internet uses _____ to communicate between devices and networks.
(A) HTTPS
(B) email
(C) website
(D) internet protocol suite
The answer is: (D) internet protocol suite ☑
Q. The amount of time taken by a device to begin reading data is called
(A) Seek time
(B) Read time
(C) Access time
(D) Write time
The answer is: (C) Access time ☑
Q. “Google Language Translator” is an example of the application of
(A) internet
(B) debugging
(C) computer simulations
(D) machine learning
The answer is: (D) machine learning ☑
Q. In peer-to-peer networking,
(A) there is only one server and many clients
(B) there is only one client and many servers
(C) every computer is capable of playing the role of server
(D) every computer is capable of playing the role of client, server or both at the same
time
The answer is: (D) ☑
Q. The network in which we connect each node to the network along a single piece of
network cable is called
(A) Bus Network Topology
(B) Star Network Topology
(C) Ring Network Topology
(D) None of these
The answer is: (A) Bus Network Topology ☑
Q. Algorithms that improve automatically through experience is known as
(A) computer program
(B) machine learning
(C) computer language
(D) artificial intelligence
The answer is: (B) machine learning ☑
Q. The basic medium of optical fiber is a fiber that is mostly made of
(A) glass
(B) wood
(C) copper
(D) lead
The answer is: (A) glass ☑
Q. Web pages are interlinked by using
(A) HTTP
(B) marquee
(C) hyperlinks
(D) slider
The answer is: (C) hyperlinks ☑
Q. Which operating system is used by most of the supercomputers in the world?
(A) Windows
(B) Linux
(C) Macintosh
(D) None of these
The answer is: (B) Linux ☑
Q. The “Macintosh” computers and laptops are manufactured by
(A) Apple
(B) Microsoft
(C) Samsung
(D) Lenovo
The answer is: (A) Apple ☑
Q. The major language of World Wide Web (WWW) is
(A) HTML
(B) PHP
(C) [Link]
(D) Java
The answer is: (A) HTML ☑
Q. Which computer language is used to design display of an HTML web page?
(A) PHP
(B) Java
(C) CSS
(D) [Link]
The answer is: (C) CSS ☑
Q. In a program where user inputs the roll number and the program displays the marks
obtained, which of the following is suitable?
(A) for loop
(B) do-while loop
(C) if/ else statement
(D) switch statement
The answer is: (D) switch statement ☑
Q. In C++, a pointer is
(A) address of a variable
(B) variable for storing addresses
(C) data type of an address variable
(D) constant value
The answer is: (B) variable for storing addresses ☑
Q. The goto statement causes control to go to a/an
(A) function
(B) operator
(C) variable
(D) label
The answer is: (D) label ☑
Q. What is the statement that displays the address of the variable myvar?
(A) myvar;
(B) &myvar;
(C) cout << myvar;
(D) cout << &myvar;
The answer is: (D) cout << &myvar; ☑
Q. An address is a _____, while a pointer is a _____.
(A) constant, variable
(B) variable, constant
(C) constant, constant
(D) variable, variable
The answer is: (A) constant, variable ☑
Q. A computer virus that replicates itself is called
(A) Bug
(B) Worm
(C) Bomb
(D) Hoax
The answer is: (B) Worm ☑
Q. The tool used to find a similar word in a document is called
(A) Finder
(B) Thesaurus
(C) Dictionary
(D) Find and Replace
The answer is: (B) Thesaurus ☑
Q. Which of the following components of physical database design refer to the
correctness and consistency of data?
(A) Indexes
(B) Integrity constraints
(C) File organization
(D) Data Distribution strategy
The answer is: (C) File organization ☑
Q. conio.h stands for
(A) character input output
(B) console input output
(C) common input output
(D) complex input output
The answer is: (B) console input output ☑
Q. Duplication of data in multiple files is called
(A) Data Redundancy
(B) Data Dependence
(C) Data Inconsistency
(D) None Of These
The answer is: (A) Data Redundancy ☑
Q. A relation that contains minimal redundancy and allows easy use is called
(A) Clean
(B) Simple
(C) Complex
(D) Well-Structured
The answer is: (D) Well-Structured ☑
Q. Which register stores the result of ALU operations?
(A) Data Register
(B) Instruction Register
(C) Data Address Register
(D) Accumulator Register
The answer is: (D) Accumulator Register ☑
Q. A collection of rules for writing programs in a programming language is known as
(A) Syntax
(B) Program logic
(C) Program Standards
(D) None Of These
The answer is: (A) Syntax ☑
Q. Which one connects two similar network segments?
(A) Router
(B) Bridge
(C) Gateway
(D) Node
The answer is: (B) Bridge ☑
Q. Which of the following device uses the parallel transmission?
(A) Mouse
(B) Keyboard
(C) Printer
(D) Light Pen
The answer is: (C) Printer ☑
Q. What is a diagrammatic way of representing the relationship between the entities in a
database?
(A) Flowchart
(B) ERD
(C) DFD
(D) Algorithm
The answer is: (B) ERD ☑
1. Component level design is concerned with
a. Flow oriented analysis
b. Class based analysis
c. Both of the above
d. None of the above
B.
RAD stands for ______.
a. Rapid and Design
b. Rapid Aided Development
c. Rapid Application Development
d. Rapid Application Design
C.
Basis path testing falls under
a. system te
b. white box
c. black box
d. unit testin
B
4. _________ is an “umbrella” activity that is applied throughout the software engineering process.
a. Debugging
b. Testing
c. Designing
d. Software quality assurance
D.
5. The factors that determine the quality of a software system are
a. correctness, reliability
b. efficiency, usability, maintainability
c. testability, portability, accuracy, error tolerances, expandability, access control, audit
d. All of the above
D.
6. ______ establishes information about when, why and by whom changes are made in a software
a. Software Configuration Management
b. Change Control
c. Version Control
d. An Audit Trail
D.
7. The relationship of data elements in a module is called
a. Coupling
b. Modularity
c. Cohesion
d. Granularity
C.
8. Software Configuration Management is the discipline for systematically controlling
a. the changes due to the evolution of work products as the project proceeds
b. the changes due to defects (bugs) being found and then fixed
c. the changes due to requirement changes
d. all of the above
D.
9. Which one of the following is not a step of requirement engineering?
a. Requirement elicitation
b. Requirement analysis
c. Requirement design
d. Requirement documentation
C.
10. Testing of software with actual data and in actual environment is called
a. Alpha testing
b. Beta testing
c. Regression testing
d. None of the above
B.
12. Match the following
a. data coupling i. module A and module B have shared data
b. stamp coupling ii. dependency between modules is based on the fact they communicate by on
passing of data
c. common coupling iii. when complete structure is passed from one module to another
d. content coupling iv. when the control is passed from one module to the middle of another
codes:
abcd
a. iii ii i iv
b. ii iii i iv
c. ii iii iv i
d. iii ii iv i
B.
13. A process which defines a series of tasks that have the following four primary objectives is know
1. to identify all items that collectively define the software configuration.
2. to manage changes to one or more of these items.
3. to facilitate the construction of different versions of an application.
4. to ensure that software quality IS maintained as the configuration evolves over time
b.
Software Configuration Management Process
Which technology is used in compact disks? Answer: b) Optical storage
Ans: Compact discs (CDs) use optical technology for data storage and retrieval.
The technology used in CDs is called "optical storage." CDs store data in the form of
tiny pits and lands on the surface of the disc. These pits and lands represent binary
information (0s and 1s), which can be read by a laser beam.
Who is the father of Internet ?
The father of the Internet is often attributed to Vinton Cerf and Bob Kahn.
They are considered the key architects of the Internet's fundamental
protocols and technologies.
In the early 1970s, Vinton Cerf and Bob Kahn developed a set of
communication protocols called the Transmission Control Protocol (TCP) and
the Internet Protocol (IP).
A light sensitive device that converts drawing, printed text or other
images into digital form is ?
Ans: A light-sensitive device that converts drawing, printed text, or other images
into digital form is called a scanner.
The term ‘Computer’ is derived from? Answer: a) Latin language
The term "computer" is derived from the Latin word "computare," which means "to
calculate" or "to reckon." The word "computer" originally referred to a person who
performed calculations or computations manually.
The basic operations performed by a computer are?
Answer: a) Input, processing, output, and storage
The term "computer" is derived from the Latin word "computare," which means "to
calculate" or "to reckon." The word "computer" originally referred to a person who
performed calculations or computations manually
What type of operating system MS-DOS is?
If a computer has more than one processor then it is known as?
WWW stands for ?
Who is the father of Computer?
A collection of system programs that controls and co-ordinates the
overall operations of a computer system is called ?
Ans: A collection of system programs that controls and coordinates the overall
operations of a computer system is called an operating system
Which of the following is a part of the Central Processing Unit?
The Central Processing Unit (CPU) is composed of several key components,
including:
1. Control Unit (CU): The control unit is responsible for managing and
coordinating the activities of the CPU. It fetches instructions from memory,
decodes them, and controls the execution of instructions by coordinating
other components of the CPU.
2. Arithmetic Logic Unit (ALU): The ALU performs arithmetic operations
(such as addition, subtraction, multiplication, and division) and logical
operations (such as AND, OR, NOT) on data. It is the component
responsible for performing calculations and logical comparisons.
3. Registers: Registers are small, high-speed storage units located inside
the CPU. They hold instructions, data, and intermediate results during
processing. Examples of registers include the program counter (PC),
instruction register (IR), and general-purpose registers.
These three components (Control Unit, ALU, and Registers) are integral parts of the
CPU and work together to execute instructions and perform calculations.
Additionally, the CPU may also have other components such as cache memory and
microcontrollers, but the Control Unit, ALU, and Registers are the fundamental parts
of the CPU's core functionality.
UNIVAC is___________?
UNIVAC (Universal Automatic Computer) is the name of a series of early electronic
digital computers that were developed by the Eckert-Mauchly Computer Corporation
(EMCC) in the 1950s. The UNIVAC computers were among the first commercially
successful general-purpose computers.
Which device is required for the Internet connection?
Ans: Modem
What is a light pen?
You can organize files by storing them in__________?
EBCDIC stands for__________?
EBCDIC stands for Extended Binary Coded Decimal Interchange Code. It is a
character encoding scheme that was primarily used on IBM mainframe computers
and systems. Developed by IBM in the 1960s, EBCDIC was designed to represent
characters and symbols for data processing and communication within IBM
environments.
The capacity of 3.5 inch floppy disk was__________?
CAD stands for_________?
CAD stands for Computer-Aided Design. CAD refers to the use of computer software
and systems to assist in the creation, modification, analysis, or optimization of
designs for various purposes, such as architecture, engineering, industrial design,
and product development.
MICR stands for_________?
What type of resource is most likely to be a shared common resource
in a computer Network?
In a computer network, the most common type of shared common resource is a
printer. A printer is a device that allows users connected to a network to print
documents and other materials. By connecting a printer to a network, multiple users
can access and utilize the printer from their respective computers or devices.
The amount of vertical space between lines of text in a document is
called___________?
The amount of vertical space between lines of text in a document is called line
spacing.
Where are data and programme stored when the processor uses
them?
When the processor uses data and programs, they are typically stored in the
computer's memory. The memory, also known as RAM (Random Access Memory), is
a hardware component that provides fast and temporary storage for the data and
instructions that the processor needs to access quickly.
Junk e-mail is also called_________?
Junk e-mail is also commonly called spam.
First page of Website is termed as__________?
The first page of a website is typically referred to as the home page.
What type of computers are client computers (most of the time) in a
client-server system? Answer: c) Personal computers (PCs)
In a client-server system, client computers are typically general-purpose computers
that are used by end-users to access and interact with the services provided by the
server. These client computers can vary in form and can include desktop
computers, laptops, tablets, smartphones, or any device capable of connecting to
the network and running client software.
Most of the time, client computers in a client-server system are: a) General-
purpose computers b) Specialized server computers c) Mainframe computers
d) Supercomputers
The correct answer is: a) General-purpose computers
Example of non-numeric data is_________?
A. Text or alphanumeric characters
Which statement describe “Hackers”?
Answer: b) Individuals who use their programming skills to identify and fix software
vulnerabilities
B. Hackers are individuals with advanced computer skills who seek to identify and
exploit vulnerabilities in computer systems and networks for various purposes,
including gaining unauthorized access, stealing sensitive information, or causing
damage.
A computer cannot ‘boot’ if it does not have the__________?
A computer cannot 'boot' if it does not have the operating system (OS).
What is embedded system? Answer: c) A computer system integrated into a
larger mechanical or electronic system.
An embedded system is a computer system designed to perform specific functions
within a larger mechanical or electrical system. It is typically a combination of
hardware and software that is purpose-built to carry out dedicated tasks, often with
real-time constraints and limited resources.
When a file is saved for the first time?
It is being created and stored for the first time. [Correct]
Which of the following is not anti- viruses software?
__________represents raw facts, where-as__________is data made
meaningful?
a) Data, information
Which of the following is a storage device?
ASCII stands for__________?
When did John Napier develop logarithm? Answer: b) 16th century
What do you call the programs that are used to find out possible
faults and their causes? Diagnostic programs
What characteristic of read-only memory (ROM) makes it useful?
Answer: d) Non-volatile nature