Академический Документы
Профессиональный Документы
Культура Документы
3. The feature that database allows to access only certain records in database is:
a. Forms
b. Reports
c. Queries
d. Tables
4. Which filter method lets you filter the records that match the selected field?
a. Filter by form
b. Filter by selection
c. Auto filter
d. Advanced filter
5. Which filter method lets you filter records based on criterion you specify?
a. Filter by form
b. Filter by selection
c. Auto filter
d. Advanced filter
9. The text you typed in Description column in Table Design View is displayed on
a. Description bar in forms
10. What is the maximum allowed field size for Boolean (Yes/No) fields?
a. 1
b. 8
c. 50
d. 255
12. Which of the following field type can store maximum data?
a. Yes/No fields
b. Date/Time fields
c. Text fields
d. Memo fields
13. To display associated record from related table in datasheet view, you can
a. Double click the record
b. Apply filter by form command
c. Single click on expand indicator (+) next to the record
d. Double click on expand indicator (+) next to the record
15. What type of relationship exists between a Student table and Fees table?
a. One to one
b. One to many
c. Many to many
d. One to many and many to many
16. Identify the relationship between a Movie table and Stars table:
a. One to one
b. One to many
c. Many to many
d. None of above
17. What type of relationship exists between a Teacher table and Class table?
a. One to many
b. Many to many
c. One to one
d. Two to two
19. For which kind of relationship you need a junction table to reflect real world situation?
a. One to one
b. One to many
c. Many to many
d. None of above
20. What do you need if you should enforce many-to-many relationship between two tables?
a. Parent table
b. Child table
c. Junction table
d. Many-to-many relationship can't be created in database
22. What is the best data type for a field that stores mobile numbers?
a. Text
b. Number
c. Date/Time
d. Memo
24. Which of the following field type is used to store photograph of employees?
a. Memo
b. Picture
c. OLE
d. Photo
25. Which of the following method can be used to add more tables in a database?
a. Design View
b. Table Wizard
c. By Entering Data
d. All of above
26. From which version Microsoft introduced Backstage View for Access Interface?
a. Access 2003
b. Access 2007
c. Access 2010
29. The options like Save, Open Database, Print are available in
a. Home tab
b. Backstage View tab
c. File menu
d. Database Tools tab
34. The options like Relationship, SQL Server etc. are found in
a. External data tab
b. Database tools tab
c. Create tab
d. Home tab
36. You can filter the display of different Access objects in navigation pane from
a. View tab in ribbon
b. Drop down menu at the top of navigation pane
c. Sort & Filter group in Home menu
d. Database tab
3. The feature that database allows to access only certain records in database is:
c. Queries
4. Which filter method lets you filter the records that match the selected field?
b. Filter by selection
5. Which filter method lets you filter records based on criterion you specify?
a. Filter by form
9. The text you typed in Description column in Table Design View is displayed on
d. Status bar while entering data
10. What is the maximum allowed field size for Boolean (Yes/No) fields?
a. 1
12. Which of the following field type can store maximum data?
d. Memo fields
13. To display associated record from related table in datasheet view, you can
c. Single click on expand indicator (+) next to the record
15. What type of relationship exists between a Student table and Fees table?
b. One to many
16. Identify the relationship between a Movie table and Stars table:
c. Many to many
17. What type of relationship exists between a Teacher table and Class table?
b. Many to many
18. Which of following relationship type is not possible to realize in Access Database directly?
c. Many to many
19. For which kind of relationship you need a junction table to reflect real world situation?
c. Many to many
20. What do you need if you should enforce many-to-many relationship between two tables?
c. Junction table
22. What is the best data type for a field that stores mobile numbers?
a. Text
24. Which of the following field type is used to store photograph of employees?
c. OLE
25. Which of the following method can be used to add more tables in a database?
d. All of above
26. From which version Microsoft introduced Backstage View for Access Interface?
b. Access 2007
29. The options like Save, Open Database, Print are available in
c. File menu
34. The options like Relationship, SQL Server etc. are found in
b. Database tools tab
36. You can filter the display of different Access objects in navigation pane from
b. Drop down menu at the top of navigation pane
26. __________is the attribute or group of attributes that uniquely identify occurrence of each entity.
a. Foreign key
b. Super Key
c. Primary Key
d. All of these
27. _________is the real world object, such as a person, place etc.
a. Attribute
b. Entity
c. Records
d. All of these
a. Database associated
b. Database administrator
c. Database application
d. None of these
a. Database associated
b. Database administrator
c. Database application
a. CPU
b. Database
c. ALU
d. All of these
a. Data structure
b. Memory
c. Both
d. None
a. Start-user data
b. End-user data
c. Database
d. None of these
a. Memory
b. CPU
c. ALU
a. Register
b. Data
c. Memory
d. None of these
a. 1
b. 2
c. 3
d. 4
c. Both
d. None
10. _____is a collection of programs performing all necessary action associated with a database:
a. Database associated
b. Database administrator
c. Database application
11._______is a program or set of program that interacts with the database at some point in its execution:
a. A database system
b. A database application
c. Both
d. None
12.________is a collection of application programs that interacts with the database along with DBMS:
a. A database system
b. A database application
c. Both
d. None
13.In which services the processes of database management and data management are complementary:
a. Database associated
c. Database application
d. None of these
a. Register
b. Data
c. Logical view
d. Physical view
16.Which structure of data clearly is one of the main features of the database approach:
a. Logical view
b. Physical view
c. Both
d. None
17.A _____view of data expresses the way a user thinks about data
a. Logical view
b. Physical view
c. Both
d. None
18.A physical view of data refers to the way data is handled at a_____ its storage and retrieval:
a. High level
b. Low level
c. Medium level
d. All of these
19.In logical and physical view of data the set of principles that defines a data model may be divided into
how many parts:
a. 1
b. 2
c. 3
20.In logical and physical view of data the set of principles that defines a data model may be divided into
which part:
a. Data definition
b. Data manipulation
c. Data integrity
d. All of these
a. Data definition
b. Data manipulation
c. Data integrity
d. Database schema
22.Which is proper subset designed to support views belonging to different classes of users in order to hid
or protect information:
a. Schema
b. Subschema
c. Non-schema
d. None-subschema
a. Database
b. Memory
c. Metadata
d. All of these
a. Database
b. Memory
c. Metadata
d. All of these
a. CREATE
b. DROP
c. ALTER
d. None of these
a. Conceptual schemas
b. Internal schemas
c. Both
d. None
a. Conceptual schemas
b. Internal schemas
c. Both
d. None
a. DDL
b. DML
d. VDL
33. Which is used to specify the user views and their mappings to the conceptual schema:
a. DDL
b. DML
c. SDL
d. VDL
a. 1
b. 2
c. 3
d. 4
a. Low level
b. High level
c. Procedural DML
d. All of these
36. Which is requires a user to specify what data is needed and how to get it:
a. Low level
b. Procedural DML
c. Both
d. None
a. Data
b. DBMS
c. Register
d. All of these
a. Sublanguages
b. Host languages
c. VDL
d. DDL
a. Sublanguages
b. Host languages
c. VDL
d. DDL
a. DDL
b. DML
c. SDL
d. VDL
a. Art
b. Command
c. Languages
d. System
a. 2
b. 3
c. 4
d. 5
a. Physical
b. Logical
c. External
d. All of these
a. 1
b. 2
c. 3
d. 4
a. Physical
b. Logical
d. All of these
46.Which is the transformation of requests and results between different levels of abstraction:
a. Evaluation
b. Mapping
c. Compiler
d. Precompiler
a. Conceptual
b. Internal
c. Both
d. None
a. Conceptual
b. Internal
c. Both
d. None
49.The related and interconnected software components of a DBMS are described by the _______:
a. Logical architecture
b. Physical architecture
c. Both
d. None
a. Back end
b. Front end
c. Both
d. None
51.In which end is really just any application that runs on top of the DBMS and acts as a user interface:
a. Back end
b. Front end
c. Both
d. None
a. Data files
b. Data dictionary
c. Database
d. Data administrator
a. Data administrator
b. Database active
c. Define application
d. All of these
55.Which is the person responsible for overall control f the database system:
a. DDL
b. DBMS
c. DBA
d. SDL
a. Database maintenance
b. Database administrator
c. Database backup
d. Database designer
a. Memory
b. Record
c. Database
58.How many features of a DBMS which provide a number of advantages for data management:
a. 1
b. 3
d. 7
a. Backup
b. Recovery
c. Both
d. None
60.In which the database can be restored up to the last consistent state after the system failure:
a. Backup
b. Recovery
c. Both
d. None
a. Nave users
b. Casual users
c. Sophisticated user
d. All of these
62.Which are the not features of a DBMS which provide a number of advantages for data management:
a. DML
b. DDL
c. SDL
d. None of these
a. Data independence
b. Data consistency
c. Data integration
d. Data sharing
64.Who access the database occasionally and have different needs each time:
a. Nave users
b. Casual users
c. Sophisticated user
d. All of these
b. Casual users
c. Sophisticated user
d. All of these
66.Who interact with the system by invoking one of the permanent application program:
a. Nave users
b. Casual users
c. Sophisticated user
d. All of these
67.The main interface that a native user uses is a form interface using___:
a. DDL
b. GUI
c. OLAP
d. DML
a. Data independence
b. Data consistency
c. Data integration
d. Data sharing
69.Who is requested to carry out various operation, such as insert, delete, update and retrieval vwiours on
the database by the user:
a. DBA
b. DBMS
c. DBS
d. DDL
a. DBA
b. DBMS
c. DBS
d. DDL
a. Stack
b. Query
d. All of these
a. Data model
b. Data consistency
c. Data integration
d. Data sharing
73.Which is the central component of the DBMS software that can also be termed as the database control
system:
a. Data consistency
b. Data integration
c. Data sharing
d. Data manager
a. Data files
b. Data dictionary
c. Database
d. Data administrator
75.After conversion of high level queries into low level commands for file access and is called
compiled_____:
a. DDL
b. DML
c. SDL
d. VDL
a. DBA
b. DDL
c. DML
d. SDL
77.Which is incorporated to create an appropriate physical database that is transformed by a logical data
model:
a. SDL
b. VDL
c. Both
d. None of these
c. Both
d. None
83.Which is refers to the collection of related data values or items called fields:
a. Record
b. Record blocking
c. Fixed-length record
d. Variable-length record
84.Every record in the same size in bytes the file is constituted of_____:
a. Record
c. Fixed-length record
d. Variable-length record
a. Record blocking
b. Fixed-length record
c. Variable-length record
d. None of these
a. Mixed files
b. Repeating field
c. Both
d. None
87.The block containing the record is the unit of data transferred between the________:
d. All of these
a. The memory
b. The data
c. The user
d. The block
a. Data
b. Data item
c. File
d. All of these
a. 2
b. 4
c. 6
d. 8
a. Logical records
b. Physical records
c. Both
d. None
92.Which contain information about a file needed by system programs for accessing file records:
a. File blocks
b. File operations
c. File headers
d. None of these
a. 1
b. 2
c. 3
d. 4
94._____ take into account only such records that are valid:
a. Algorithm
b. Searching algorithm
c. Flow chart
d. All of these
95. ______ file organization is vital for ensuring the most efficient access of files and records:
a. File blocks
b. File operations
c. File headers
d. File organization
96.New records are placed at the end of the file it is referred to as____:
a. Heap file
b. Pile file
c. Both
d. None
a. Sorted field
b. Ordering field
d. None
a. Log(b)
b. Log2(b)
c. 2log(b)
d. Log(2b)
99.Which provides precise partition between abstract characteristics of the data type and its
implementation specifications:
a. Data
b. Data item
c. File
d. Data abstraction
d. All of these
d. All of these
a. DDL
b. ODBC
c. SOA
d. ADSL
d. None of these
106.______ is another name given to data integration when use in the management context:
a. EII
b. IEI
c. GUI
d. SUI
a. Logical as view
b. Local as view
c. Land as view
d. Last as view
a. Global as view
b. Global as verify
c. Both
d. None
a. LAV
b. GAV
c. Both
d. None
113.How many structure used in ontology based on data integration application are explained:
a. 1
b. 2
c. 3
d. 4
a. EII
b. IEI
c. GUI
d. SUI
c. Both
d. None
a. DBMS
b. DDL
c. SDL
d. CDL
2. Which provides mechanisms to structure data in the data base being modeled:
a. DBMS
b. DDL
c. SDL
d. CDL
a. Entry relationship
b. Entity relationship
c. Both
d. None
4. Which models a collection of various concepts that are use to describe the structure of a data base:
a. Data base
b. Data model
c. Data
d. Recorded
5. Data at the conceptual level and view level can be describe with the help of____:
b. Relation model
d. All of these
a. 1
b. 2
c. 3
d. 4
a. Relational
b. Network
c. Hierarchical
d. All of these
8. E-R model entities and their relationship are corresponded as ___ dimensional tables:
a. 2
b. 4
c. 5
d. 6
d. None of these
a. Super key
b. Primary key
c. Secondary key
d. Alternate key
e. Candidate key
f. Foreign key
g. Concatenated key
a. Domain
b. Data
c. Register
d. Models
a. 1969
b. 1970
c. 1971
d. 1972
a. E.F. codd
b. F.F. codd
c. E.E. codd
d. None of these
a. 1
b. 2
c. 3
d. 4
a. Structural
b. Manipulative
c. Integrity
a. Data model
b. Relation model
d. All of these
a. Relation schema
c. Both
d. None
a. Extension
b. Criterion
c. Relation
d. None of these
a. Domain
b. Data
c. Register
d. Models
a. Relational schema
b. Domain
c. Attribute
d. Relation
a. Relational schema
b. Domain
c. Attribute
d. Relation
22.A ______ is defined as the subset of the subset of the Cartesian product of domains:
a. Extension
b. Criterion
c. Relation
d. None of these
a. 2
b. 3
c. 4
d. 5
a. VIEWS
b. BASE RELATION
c. BOTH
d. NONE
d. None of these
a. Data types
b. Base relation
c. Semantic knowledge
d. All of these
a. DBMS
b. DBS
c. RDBMS
d. All of these
28.Which is used for searching and retrieving records from the database:
a. DBS
b. DBMS
c. DDL
d. DML
a. 2
b. 3
c. 4
d. 5
d. None
a. PCR
b. Records
c. Both
d. None
a. DATA
b. RELTION
c. PCR
d. All of these
33.Which is a database model used to represent objects and the relationship among these objects:
a. Data model
b. Relation model
c. Hierarchical model
d. Network model
a. Java
b. C++
c. Oracle
d. DBMS
a. MS SQL
b. DB2
c. MY SQL
d. ORACLE
a. 1978
b. 1979
c. 1980
d. 1981
a. V1
b. V2
c. V3
d. V4
a. V1
b. V2
c. V3
d. V4
a. 1977
b. 1979
c. 1983
d. 1985
a. V2
b. V3
c. V5
d. V6
8. Which has enhancements in the input/output operation of disk, scalability, locking of row, backup and
recovery:
a. Oracle V6
b. Oracle V5
c. Oracle V3
d. Oracle V4
a. 1977
b. 1979
c. 1983
d. 1985
a. PL
b. SQL
c. Both
d. None
a. 1979
b. 1989
c. 1999
d. None of these
a. V2i
b. V4i
c. V6i
d. V9i
a. 1999
b. 2000
c. 2001
d. 2002
a. 2001
b. 2002
c. 2006
d. 2007
18. The server process contains memory for a private session which is its own and is called_________:
a. SGA
b. PGA
c. Both
d. None
a. Data files
b. Control files
c. Online redo log files
d. All of these
20. Which files has metadata that specifies database structure that includes database name along with database
files names and locations:
a. Data files
b. Control files
c. Online redo log files
d. All of these
21. Which is also known as redo records, recording whatever changes are made to data:
a. Data files
b. Control files
c. Online redo log files
d. All of these
a. Data blocks
b. Extents
c. Segments
d. Tablespaces
a. Data blocks
b. Extents
c. Segments
d. Tablespaces
24. _____ shows a specified number of data blocks that are logically contiguous and keeps a particular type of
information in its storage:
a. Data blocks
b. Extents
c. Segments
d. Tablespaces
a. Data blocks
b. Extents
c. Segments
d. Tablespaces
a. Data blocks
b. Extents
c. Segments
d. Portable
33. Which refers to independent events of the main program flow of the systems that lacks concurrency:
a. RDBMS
b. Portable
c. Asynchronously
d. None of these
a. Storage
b. Process
c. Computing
d. None of these
a. 1
b. 2
1. Analysis of an existing system starts when a customer request either for computerizing his ________:
a. Non-computerized operations
b. Computerized operations
c. Relational operation
d. Database operation
2. Which is done by developers is centered on input and output expected by the customer:
a. Requires interaction
b. Analysis of starting
c. Analysis of existing
d. None of these
3. What dose a system design include:
a. I/O devices
b. CPU
c. Storage unit
d. All of these
4. Which are used by developers to extrapolate complexities of real world into a computer based model:
a. Data analysis techniques
b. Data analysis model
c. Data structure
d. Data analysis
5. A conceptual data model defines the structure of the data and method or processes that use:
a. File
b. Data
c. Operation
d. Testing
6. CDA stands for:
a. Confirmatory data analysis
7. EDA stands for:
a. Exploratory data analysis
8. WWW stands for:
a. World wide web
1. FD stands for:
a. Functional dependency
b. Facilitate dependency
c. Functional data
d. Facilitate data
a. Network model
b. Relational model
c. Hierarchical model
d. None of these
a. IBM
b. Apple
c. Intel
d. All of these
4. The database containing tables related to each other that help in the smooth processing of data is called
______:
a. Service database
b. Relation database
c. Related database
d. None of these
a. Rows
b. Columns
c. Both
d. None
a. Rows
b. Columns
c. Tables
d. All of these
a. Primary key
b. Candidate key
c. Foreign key
d. All of these
a. Primary key
b. Candidate key
c. Foreign key
d. All of these
a. Primary key
b. Candidate key
c. Foreign key
d. All of these
10. Which key is used to fined the customer from the table:
a. Primary key
b. Candidate key
c. Foreign key
d. All of these
a. Foreign key
b. Primary key
c. Both
d. None
a. Deleted
a. Microsoft
b. Microprocessor
c. Microcomputer
d. Memory
a. Service database
b. Relational database
c. Related database
d. None of these
15. In relationships how many different ways in which two tables may be related:
a. 1
b. 2
c. 3
d. 4
a. One-one
b. One-many
c. Many-many
d. All of these
17. Which rules are defined in relational models they from as an essential part of any relation database:
a. Integrity rules
b. Database
c. Record
d. Memory
a. 1
b. 2
c. 3
d. 4
a. General
b. Database specific
c. Both
d. None
20. How many general rules in a relational model and being general rules these are applicable to all database:
a. 2
b. 3
c. 4
d. 5
21. Which rules are know as entity integrity and referential integrity:
a. General
b. Database specific
c. Both
d. None
a. Entity integrity
b. Referential integrity
c. Both
d. None
23. Integrity constraints that do not fall under the preceding two integrity rules are referred to as______:
a. Entity integrity rule
b. Referential integrity rule
c. General integrity rule
d. Database specific integrity rule
24. Which has support for specification of global rule applicable to the whole table:
a. Microsoft access1.0
b. Microsoft access1.5
c. Microsoft access2.0
d. Microsoft access2.5
25. In creating a table a row contains:
a. Memory
b. Record
c. Field
d. None
a. Memory
b. Record
c. Field
d. None
a. DBS
b. DBMS
c. RDBMS
d. All of these
28. Which command creates database objects like tables views and indexes:
a. Create command
b. Update command
c. Both
d. None
29. Which command enables alteration the data stored in existing records:
a. Create command
b. Update command
c. Deletion command
d. All of these
30. Which query joins many dimension of tables to a fact table which contains large amount of rows and uses
aggregate:
a. IBM
b. SQL
c. ANSI
d. ORACLE
a. Single-valued
b. Double-valued
c. Both
d. None
32. Which relationship model provides a starting point for identifying schemas and integrity constraints:
a. Formal dependency
b. Functional dependency
c. Fact dependency
d. Superset dependency
a. IBM
b. SQL
c. ANSI
d. FD
35. Which are dependent on the information of what can be stored in the relation and serve as integrity
constraints:
a. IBM
b. SQL
c. ANSI
d. FD
36. A relation state r of R that satisfies the functional dependency constraints is called_____ of R:
a. Legal relation state
b. Unlegal relation state
c. FD
d. All of these
37. How many various types of dependencies:
a. 1
b. 2
c. 3
d. 4
a. Key
b. Key revisited
c. Superset key
d. None of these
a. Key
b. Key revisited
c. Superset key
d. None of these
a. Data
b. Database
c. Database design
d. All of these
42. Which is primarily the result of a thorough understanding of information about an enterprise:
a. Data
b. Database
c. Database design
d. Data modeling
a. Deletion anomalies
b. Insertion anomalies
c. Update anomaly
d. None of these
a. 1
b. 2
c. 3
a. E.F. codd
b. F.F. codd
c. E.E. codd
d. None of these
a. 1969
b. 1970
c. 1971
d. 1972
48. Which is a bottom-up approach to database design that design by examining the relationship between
attributes:
a. Functional dependency
b. Database modeling
c. Normalization
d. Decomposition
a. Functional dependency
b. Database modeling
c. Normalization
d. Decomposition
50. Which formal method that locates and analyses relation schemas on the basis of their primary, candidate
keys, and the FDs that are present among the attributes of these schemas:
a. Functional dependency
b. Database modeling
c. Normalization
d. Decomposition
a. ONE or MORE
b. TWO or MORE
c. THREE or MORE
d. FOUR or MORE
a. 1
b. 2
c. 3
d. 4
53. Consequently R.Boyce-Codd jointly launched powerful definition for the thired normal form called______:
a. Boyce-Codd normal form
b. First normal form
c. Second normal form
d. All of these
54. BCNF stands for:
a. Basic -Codd normal form
b. Build -Codd normal form
c. Boyce-Codd normal form
d. None of these
55. Which forms simplifies and ensures that there is minimal data aggregates and repetitive groups:
a. 1NF
b. 2NF
c. 3NF
d. All of these
56. Which forms every non-prime attribute is fully dependent functionally on the candidate key of a relational
schema:
a. 1NF
b. 2NF
c. 3NF
d. 5NF
57. Which forms is required when although NF is present more normalization is required:
a. 1NF
b. 2NF
c. 3NF
d. 4NF
58. Which forms has a relation that possesses data about an individual entity:
a. 2NF
b. 3NF
c. 4NF
a. 1NF
b. 2NF
c. 3NF
d. 4NF
1. A number system that uses only two digits, 0 and 1 is called the___________:
a. Octal number system
b. Binary number system
c. Decimal number system
d. Hexadecimal number system
2. In which computers, the binary number are represented by a set of binary storage device such as flip flop:
a. Microcomputer
b. Personal computer
c. Digital computer
1. _____ is a command given to a computer to perform a specified operation on some given data:
a. An instruction
b. Command
c. Code
d. None of these
a. PC
a. Opcode
b. Operand
c. Only a
d. Both a & b
a. Unique
b. Two
c. Three
d. Four
a. MOV
b. ADD
c. SUB
d. All of these
6. _______specify where to get the source and destination operands for the operation specified by the
_______:
a. Operand fields and opcode
b. Opcode and operand
c. Source and destination
d. Cpu and memory
7. The source/destination of operands can be the_______ or one of the general-purpose register:
a. Memory
b. One
c. both
d. None of these
8. The complete set of op-codes for a particular microprocessor defines the______ set for that processor:
a. Code
b. Function
c. Module
d. Instruction
a. Instruction selection
b. Selection control
c. Instruction sequencing
d. All of these
10. The simplest method of controlling sequence of instruction execution is to have each instruction explicitly
specify:
a. The address of next instruction to be run
b. Address of previous instruction
c. Both a & b
d. None of these
11. As the instruction length increases ________ of instruction addresses in all the instruction is_______:
a. Implicit inclusion
b. Implicit and disadvantageous
c. Explicit and disadvantageous
d. Explicit and disadvantageous
12. ______is the sequence of operations performed by CPU in processing an instruction:
a. Execute cycle
b. Fetch cycle
c. Decode
d. Instruction cycle
a. Fetch time
b. Execution time
c. Control time
d. All of these
14. _____is the step during which a new instruction is read from the memory:
a. Decode
b. Fetch
c. Execute
d. None of these
15. ________is the step during which the operations specified by the instruction are executed:
a. Execute
b. Decode
c. Both a& b
d. None of these
a. Initialized
b. Incremented
c. Decoded
d. Both b & c
17. The instruction fetch operation is initiated by loading the contents of program counter into the______ and
sends_____ request to memory:
a. Memory register and read
b. Memory register and write
c. Data register and read
d. Address register and read
18. The contents of the program counter is the _______ of the instruction to be run:
a. Data
b. Address
c. Counter
d. None of these
19. The instruction read from memory is then placed in the_______ and contents of program counter is______
so that it contains the address of_______ instruction in the program:
a. Program counter, incremented and next
b. Instruction register, incremented and previous
c. Instruction register, incremented and next
d. Address register, decremented and next
20. Execution of instruction specified by instruction to perform:
a. Operation
b. Operands
c. Both a & b
d. None of these
a. Data
b. Code
c. Address
d. Control
a. Binary code
b. Digit code
a. Nibble
b. Byte
c. Decimal
d. Digit
a. 1-10
b. 1-9
c. 0-9
d. 0-10
25. The ______ are assigned according to the position occupied by digits:
a. Volume
b. Weight
c. Mass
d. All of these
27. ________are the codes that represent alphabetic characters, punctuation marks and other special
characters:
a. Alphanumeric codes
b. ASCII codes
c. EBCDIC codes
d. All of these
30. Which code used in transferring coded information from keyboards and to computer display and printers:
a. ASCII
b. EBCDIC
c. Both
d. None of these
31. Which code used to represent numbers, letters, punctuation marks as well as control characters:
a. ASCII
b. EBCDIC
c. Both
d. None of these
a. 7
b. 8
c. 5
d. 9
34. Which code the decimal digits are represented by the 8421 BCD code preceded by 1111:
a. ASCII
b. EBCDIC
c. Both
d. None of these
35. _________ has the property that corrupting or garbling a code word will likely produce a bit string that is
not a code word:
38. The ability of a code to detect single errors can be stated in term of the _________:
a. Concept of distance
b. Even parity
c. Odd parity
d. None of these
39. The first n bit of a code word called __________ may be any of the 2 n n- bit string minimum error bit:
a. Information bits
b. String bits
c. Error bits
d. All of these
40. A code in which the total number of 1s in a valid (n+1) bit code word is even, this is called an __________:
41. A code in which the total number of 1s in a valid (n+1)bit code word is odd and this code is called
an__________:
a. n bit
b. n cube
c. n single
d. n double
43. Which method is used to detect double errors and pinpoint erroneous bits:
a. Even parity method
b. Odd parity method
c. Check sum method
d. All of these
44. A code that is used to correct error is called an _________:
a. Error detecting code
b. Error correcting code
c. Both
d. None of these
45. A received ___________with a bit error will be closer to the originally transmitted code word than to any
other code word:
a. Code word
b. Non code word
c. Decoding
d. All of these
46. Which code word was originally transmitted to produce a received word is called:
a. 1953
b. 1950
c. 1945
d. 1956
49. ____________ between two code words is defined as the number of bits that must be changed for one code
a. Hamming codes
b. Hamming distance
c. Both
d. None of these
50. It is actually a method for constructing codes with a minimum distance of ____:
a. 2
b. 4
c. 3
d. 5
i
51. The bit position in a ___________ can be numbered from 1 through 2 -1:
52. Each check bit is grouped with the information bits as specified by a____________:
53. The pattern of groups that have odd parity called the _________must match one of the of columns in the
parity check matrix:
a. Syndrome
b. Dynodes
c. Both
d. None of these
a. Programmer
b. Processors
c. Instruction
d. Opcode
56. The list of specific instruction supported by the CPU is termed as its ____________:
a. Instruction code
b. Parity set
c. Instruction set
d. None of these
57. __________is divided into a number of fields and is represented as a sequence of bits:
a. instruction
b. instruction set
c. instruction code
d. parity code
a. Timing
b. Control
c. Both
d. None of these
60. Which unit acts as the brain of the computer which control other peripherals and interfaces:
a. Memory unit
b. Cache unit
c. Timing and control unit
d. None of these
61. It contains the ____________stack for PC storage during subroutine calls and input/output interrupt
services:
62. Which unit works as an interface between the processor and all the memories on chip or off- chip:
a. Timing unit
b. Control unit
c. Memory control unit
d. All of these
a. 45 MHZ
b. 50 MHZ
c. 52 MHZ
d. 68 MHZ
64. ________ is given an instruction in machine language this instruction is fetched from the memory by the
CPU to execute:
a. ALU
b. CPU
c. MU
d. All of these
65. Which cycle refers to the time period during which one instruction is fetched and executed by the CPU:
a. Fetch cycle
b. Instruction cycle
c. Decode cycle
d. Execute cycle
a. 5
b. 6
c. 4
d. 7
a. Fetch
b. Decode
c. Execute
d. Derive effective address of the instruction
a. Memory address
b. Effective memory address
c. Both a and b
d. None of these
70. Which are instruction in which two machine cycle are required:
a. Instruction cycle
b. Memory reference instruction
c. Both
d. None of these
71. Which instruction are used in multithreaded parallel processor architecture:
72. Which instruction are arranged as per the protocols of memory reference format of the input file in a
simple ASCII sequence of integers between the range 0 to 99 separated by spaces without formatted text and
symbols:
73. ____________ is an external hardware event which causes the CPU to interrupt the current instruction
sequence:
a. Input interrupt
b. Output interrupt
c. Both
d. None of these
a. Save interrupt
b. Input/output interrupt
c. Service interrupt
d. All of these
a. Interrupt enter
b. Interrupt return
c. Interrupt delete
d. None of these
a. Speed
b. Accuracy
c. Storage
d. Versatility
a. Garbage-in-garbage-out
b. Garbage-in garbage-occur
c. Both
d. None of these
a. 5
b. 6
c. 4
d. 7
a. Intelligence
b. Storage
c. Versatility
d. Diligence
a. Inputting
b. Storing
c. Processing
d. Outputting
e. Controlling
f. All of these
88. The control unit and arithmetic logic unit are know as the ___________:
89. Which unit is comparable to the central nervous system in the human body:
a. Output unit
b. Control unit
c. Input unit
d. All of these
a. Storage capacity
b. Magnetic disk
c. Both
d. None of these
a. Electrical digit
b. Electrical component
c. Electronic bit
d. None of these
a. Byte
b. Bit
c. Digits
d. Component
a. Binary digit
b. Octal digit
c. Both
d. None of these
a. 5
b. 4
c. 7
d. 8
a. 3
b. 4
c. 6
d. 8
96. Which is the most important component of a digit computer that interprets the instruction and processes
the data contained in computer programs:
a. MU
b. ALU
c. CPU
d. PC
97. Which part work as a the brain of the computer and performs most of the calculation:
a. MU
b. PC
c. ALU
d. CPU
a. Execute of programs
b. Execution of programs
c. Both
d. None of these
a. 4
b. 3
c. 6
d. 8
a. Instruction register
b. Program register
c. Control register
d. None of these
a. Microprocessor
b. Microcode
c. Both
d. None of these
103. Which are microcomputers commonly used for commercial data processing, desktop publishing and
engineering application:
a. Digital computer
b. Personal computer
c. Both
d. None of these
104. Which microprocessor has the control unit, memory unit and arithmetic and logic unit:
a. Pentium IV processor
b. Pentium V processor
c. Pentium III processor
d. None of these
105. The processing speed of a computer depends on the __________of the system:
a. Clock speed
b. Motorola
c. Cyrix
d. None of these
a. Pentium III
b. Pentium II
c. Pentium IV
d. All of these
2. Which operations are used for addition, subtraction, increment, decrement and complement function:
a. Bus
b. Memory transfer
c. Arithmetic operation
d. All of these
3. Which language is termed as the symbolic depiction used for indicating the series:
a. Random transfer language
b. Register transfer language
c. Arithmetic transfer language
d. All of these
4. The method of writing symbol to indicate a provided computational process is called as a:
a. Programming language
b. Random transfer language
c. Register transfer language
d. Arithmetic transfer language
5. In which transfer the computer register are indicated in capital letters for depicting its function:
a. Memory transfer
b. Register transfer
c. Bus transfer
d. None of these
6. The register that includes the address of the memory unit is termed as the ____:
a. MAR
b. PC
c. IR
d. None of these
a. MAR
b. PC
c. IR
d. None of these
a. MAR
b. PC
c. IR
d. RI
a. 2
b. 4
c. 6
d. 8
11. Which are the operation that a computer performs on data that put in register:
a. Register transfer
b. Arithmetic
c. Logical
d. All of these
12. Which micro operations carry information from one register to another:
a. Register transfer
b. Arithmetic
c. Logical
d. All of these
a. R1->R2
b. R1<-R2
14. In memory transfer location address is supplied by____ that puts this on address bus:
a. ALU
b. CPU
c. MAR
d. MDR
a. 1
b. 2
c. 3
d. 4
a. Read
b. Write
c. Both
d. None
17. In memory read the operation puts memory address on to a register known as :
a. PC
b. ALU
c. MAR
d. All of these
18. Which operation puts memory address in memory address register and data in DR:
a. Memory read
b. Memory write
c. Both
d. None
19. Arithmetic operation are carried by such micro operation on stored numeric data available in_____:
a. Register
b. Data
c. Both
d. None
a. ALU
b. MAR
c. Both
d. None
21. Which operation are implemented using a binary counter or combinational circuit:
a. Register transfer
b. Arithmetic
c. Logical
d. All of these
22. Which operation are binary type, and are performed on bits string that is placed in register:
a. Logical micro operation
b. Arithmetic micro operation
c. Both
d. None
23. A micro operation every bit of a register is a:
a. Constant
b. Variable
c. Both
d. None
a. Register transfer
b. Arithmetic
c. Logical
d. All of these
a. Digital system
b. Register
c. Data
d. None
30. High level language C supports register transfer technique for______ application:
a. Executing
b. Compiling
c. Both
d. None
31. A counter is incremented by one and memory unit is considered as a collection of _______:
a. Transfer register
b. Storage register
c. RTL
d. All of these
32. Which is the straight forward register transfer the data from register to another register temporarily:
a. Digital system
b. Register
c. Data
d. Register transfer operations
33. In organization of a digital system register transfer of any digital system therefore it is called:
a. Digital system
b. Register
c. Data
d. Register transfer level
a. Demultiplexer
b. Multiplexer
a. Logic
b. Operation
c. Circuit
d. All of these
a. Flip-flop
b. Logics
c. Circuit
d. Operation
a. Data bus
b. Address bus
c. Memory bus
d. All of these
a. 2
b. 3
c. 5
d. 6
a. Analog circuit
b. Analog fundamentals
a. Logic 0
b. Logic 1
c. None of these
d. Both a & b
43. In 3 state gate third position termed as high impedance state which acts as:
a. Open circuit
b. Close circuit
c. None of these
d. All of above
a. Control signal
b. No signal
c. All signal
d. All of above
a. 2 common line
b. 3 common line
c. 1 common line
d. none of these
a. (^)
b. (v)
c. Both
d. None
a. (^)
b. (v)
c. Both
d. None
a. Serial output
b. Serial input
c. Both
d. None
a. 2
b. 4
c. 6
d. 8
55. Which shift is a shift micro operation which is used to shift a signed binary number to the left or right:
a. Logical
b. Arithmetic
c. Both
d. None of these
a. One
b. Two
c. Three
d. All of these
a. RAM
b. RTL
c. ALU
d. MAR
a. Chirsfraser 1980
b. J.davidson 1980
c. Chirs fraser 1920
d. J.davidson 1920
e. A and B
f. B and C
g. C and D
a. machine language
b. assembly language
c. code language
d. none of these
a. Instructions
b. Code
c. Symbolic codes
d. Assembler
3. Mnemonic represent:
a. Operation codes
b. Strings
c. Address
d. None of these
a. String characters
b. Arrays
c. Structure
d. Enum
a. First generation
b. Third generation
c. second generation
d. fourth generation
a. Object program
b. Source program
c. Oriented program
a. $ hello.s -o hello.o
b. $as hello.s o o
c. $ as hello o hello.o
d. $ as hello.s o hello.o
9. By whom address of external function in the assembly source file supplied by ______ when activated:
a. Assembler
b. Linker
c. Machine
d. Code
a. Input file
b. External file
c. Output file
d. None of these
11. The assembler translates ismorphically______ mapping from mnemonic in these statements to machine
instructions:
a. 1:1
b. 2:1
c. 3:3
d. 4:1
a. 1
b. 3
c. 2
d. 4
13. The assembler in first pass reads the program to collect symbols defined with offsets in a table_______:
a. Hash table
b. Symbol table
c. Both a& b
d. None of these
a. Link code
b. Decimal code
c. Assembly code
d. Binary code
a. syntax error
b. logical error
c. run time error
d. none of these
a. Syntax error
b. Run time error
c. Logical error
a. List
b. object
c. link
d. code
a. 1 pass
b. 2 pass
c. both a & b
d. none of these
a. S/340
b. S-350
c. S/320
d. S/360
a. S/370
b. S/380
c. S/390
d. S/360
a. Interpreter
b. Translator
c. Exchanger
d. None of these
a. Macro
a. Micro
b. Macro
c. Both a & b
d. None of these
a. Name
b. Definition
c. Identifier
d. All of these
a. NAME
b. MEND
c. DATA
d. MEMORY
a. Linker
b. Loader
c. Translator
d. None of these
a. Absolute
b. Relative
c. Both a & b
d. None of these
a. Absolute and 0
b. Relative and 0
c. Relative and 1
d. Relative and 3
a. Binder
b. Linkage editor
c. Both a & b
d. None of these
36. Loading is _______ with the task of storage management of operating system and mostly preformed after
assembly:
a. Bound
b. Expanded
c. Overlaps
d. All of these
a. Externally defined
b. Internally defined
c. Executable file
d. All of these
38. It is the task of the ________to locate externally defined symbols in programs, load them in to memory by
placing their _______of symbols in calling program:
39. Linker creates a link file containing binary codes and also produces_______ containing address information
on linked files:
a. Link map
b. Map table
c. Symbol map
d. None of these
a. 4
b. 2
c. 3
d. 5
a. Absolute entities
b. Relative entities
c. Object program
d. All of these
42. ________have addresses where instructions are stored along with address of working storage:
a. Relative entities
b. Absolute entities
c. Both a & b
d. None of these
43. Absolute entities are __________whom value signify storage locations that are independent of resulting
machine code:
a. Numeric constants
b. String constants
c. Fixed addresses
d. Operation codes
e. All of these
44. A module contains machine code with specification on______:
a. Relative addresses
b. Absolute addresses
c. Object program
d. None of these
45. After actual locations for main storage are known, a ______adjusts relative addresses to these actual
locations:
a. Relocating loader
b. Locating loader
c. Default loader
d. None of these
46. If there is a module from single source-language only that does not contain any external references, it
a. Indirectly
b. Directly
c. Extending
d. None of these
47. Modern assemblers for RISC based architectures make optimization of instruction scheduling to make use
of CPU _______efficiently:
a. Pipeline
b. Without pipeline
c. Both a & b
d. None of these
a. 4
b. 5
c. 2
d. 3
a. For loop
b. While loop
c. Do-while loop
d. All of these
a. Assignment expression
b. Condition value
c. Increment/decrement
d. None of these
a. 11
a. Relational
b. Logical
c. Both a & b
d. None of these
54. <Increment> is the________ value of variable which will be added every time:
a. Increment
b. Decrement
c. Expanding
d. None of these
55. _______is the statement block of for loop lies inside block of another for loop:
a. For statement
b. Do-while statement
c. While statement
d. None of these
a. Goto
60. In Goto statement the place to which control is transferred is identified by a statement______:
a. Label
b. Display
c. Break
d. None of these
61. The continue statement is used to transfer the control to the________ of a statement block in a loop:
a. End
b. Beginning
c. Middle
d. None of these
62. The__________ statement is used to transfer the control to the end of statement block in a loop:
a. Continue
b. Break
c. Switch
d. Goto
63. ________function is used to transfer the control to end of a program which uses one argument( ) and takes
value is zero for_______ termination and non-zero for _______termination:
a. Program specification
b. Code specification
c. Instruction specification
d. Problem specification
65. Testing helps to ensure _______of the program for use within a system:
a. Quality, accuracy and except
b. Quality, accuracy and acceptance
c. Design, assurance and acceptance
d. Quality, accuracy and development
a. Linear
b. Top down
c. Both a & b
d. None of these
a. Branching
b. Condition
c. Both a & b
d. None of these
a. 3
b. 2
c. 1
d. 6
a. Sequence
b. Selection
c. Iteration
d. All of these
a. Repetition
b. Straight
c. Selection
d. Sequence
71. In ________instructions are followed one after the other in the preset order in which they appear within
program:
a. Sequence
b. Selection
c. Break
d. Iteration
72. _______means that one of two alternative sequences of instruction is chosen based on logical condition:
73. _________is sequence of instructions is executed and repeated any no. of times in loop until logical
condition is true:
a. Iteration
b. Repetition
c. Both a & b
d. None of these
74. A ________is a small program tested separately before combining with final program:
a. Module
b. Block
c. selection
d. none of these
75. _______uses various symbols to represent function within program and is _______representation:
a. Flowchart, pictorial
b. Algorithm, pictorial
c. Pictorial, flowchart
d. None of these
a. Flowchart
b. Algorithm
c. Both a & b
d. None of these
a. Right to left
b. Only right
c. Left to right
d. Only left
78. Flowchart that exceed page should be properly linked using ________to portions of flowchart on
different pages:
a. Connectors
a. Flowchart
b. Algorithm
c. Both a & b
d. None of these
a. Imitation
b. Imitate
c. In imitation
d. None of these
a. Less
b. More
c. Optimum
d. None of these
a. No
b. 4
c. 2
d. 6
83. ______are used to translate high level language instructions to a machine code:
a. Translators
b. Interpreters
c. Compilers
d. None of these
84. The compiler _______translate a program code with any syntax error:
a. Can
b. Cannot
c. Without
d. None of these
a. Register
b. Memory
c. Data
d. CPU
86. After compilation of the program ,the operating system of computer activates:
a. Loader
b. Linker
c. Compiler
d. None of these
87. The linker has utilities needed for ________within the translated program:
a. Input
b. Output
c. Processing
d. All of these
a. Symbolic
b. Diagrammatic
c. Both a & b
d. None of these
89. In flow chart symbols the _______operation represents the direction of flow:
a. Connector
b. Looping
c. Arrows
d. Decision making
a. Program counter
b. Instruction register
c. Stack pointer
d. Source index
92. Which are the following approaches used to design control unit:
a. Hardwired control
b. Microprogrammed control
c. Both a & b
d. None of these
a. CPU
b. Memory
c. Both a & b
d. None of these
e.
94. _______arrow represents the value obtained by evaluating right side expression/variable to the left side
variable:
a. Forth
b. Inbetween
c. Back
d. None of these
95. A ________ is written as separate unit, apart from main and called whenever necessary:
a. Subroutine
b. Code
c. Block
d. None of these
a. CPU
b. Microprocessor
c. register
d. memory
a. Main
b. Procedures
c. Program
d. Memory
a. Subroutine
b. Main program
c. Both a & b
d. None of these
100. When subroutine is called contents of program counter is location address of _______instruction
following call instruction is stored on ________and program execution is transferred to______ address:
a. Non executable, pointer and subroutine
b. Executable, Stack and Main program
c. Executable, Queue and Subroutine
d. Executable, Stack and Subroutine
101. A subroutine called by another subroutine is called:
a. Nested
b. For loop
c. Break
d. Continue
a. SCAL
b. SXIT
c. Both a & b
d. None of these
105. Markers in subroutine cannot be accepted as limits whereas this markers stands for:
a. Top of stack
b. Bottom of stack
c. Middle of stack
d. All of these
106. Subroutines are placed in identical section to caller so that SCAL and SXIT _______overpass divison
limits:
a. Dont
b. Does
c. Cross
d. By
a. Global
b. Local
c. Both a & b
d. None of these
108. subroutines are invoked by using their________ in a subroutine call statement and replacing formal
parameters with________ parameters:
a. Asterisk(*)
b. Arrow
c. Line
d. Pipeline
a. Conditional
b. Unconditional
c. Both a & b
d. None of these
112. A flag is a _________that keep track of a changing condition during computer run:
a. Memory
b. Register
c. Controller
d. None of these
113. When a subroutine is ________the parameters are loaded onto the stack and SCAL is executed:
a. Executed
b. Invoked
c. Ended
d. Started
a. In Same program
b. In external program
c. Both a & b
d. None of these
115. If internal subroutine is called global data is used to pass values defining parameters between
_________program and defined _______:
116. In what type of subroutine actual parameters are passed through the main program to formal
parameters in the related subroutine:
a. Internal
117. By defining the _________register as last in first out stack the sequence can handle nested
subroutines:
a. S
b. J
c. R
d. T
118. The ______stack can be 4-word memory addressed by 2 bits from an up/down counter known as the
stack pointer:
a. FIFO
b. PIPO
c. SISO
d. LIFO
a. Useful value
b. Get output
c. Get no output
d. None of these
121. The front panel display provides lights as green LED represent _____ and red LED represent _____for
device programmer who writes input/output basic:
122. The input data for processing uses the standard input device which by default is a ________:
a. Mouse
b. Scanner
123. The processed data is sent for output to standard ________device which by default is computer
screen:
a. Input
b. Output
c. Both a & b
d. None of these
a. Micro instructions
b. Mini instructions
c. Both a & b
d. None of these
125. For each micro operation the control unit generates set of______ signals:
a. Control
b. Address
c. Data
d. None of these
a. Hardware
b. Software
c. Firmware
d. None of these
127. The micro program is an ________written in microcode and stored in firmware which is also
referred as___________:
a. Interpreter and control memory
b. Translator and control store
c. Translator and control memory
d. Interpreter and Translator
128. Compared to hardware, firmware is ________to design micro programmed organization:
a. Difficult
b. Easier
c. Both a& b
d. None of these
a. Easier
b. Difficult
c. Mediator
d. Optimum
a. T.V. Wilkes
b. M.V. Wilkes
c. S.V. Wilkes
d. D.V. Wilkes
a. John Faircloughs
b. Johny fairclough
c. Mr. Redcliff
d. M.V. Wilkes
134. From1961-1964 John faircloughs research played an important role to pursue full range of
compatible computers as system:
a. System/360
b. System/460
c. System/560
d. System/780
a. Fetch
b. Execute
c. Code
136. One of use of microprogramming to implement ________ of processor in Intel 80x86 and Motorola
680x0 processors whose instruction set are evolved from 360 original:
a. Control structure
b. Without control
c. Control unit
d. Only control
137. The function of these microinstructions is to issue the micro orders to______:
a. CPU
b. Memory
c. Register
d. Accumulator
138. Micro-orders generate the_______ address of operand and execute instruction and prepare for
fetching next instruction from the main memory:
a. Physical
b. Effective
c. Logical
d. all of above
139. Which of the following 2 task are performed to execute an instruction by MCU:
a. Microinstruction execution
b. Microinstruction sequencing
c. Both a & b
d. None of these
a. Memory chips
b. Registers
c. accumulators
d. none of these
a. Control instruction
b. Memory instruction
c. Register instruction
d. None of these
a. Microinstruction
b. Program
c. Sets
d. All of these
147. During program execution content of main memory undergo changes and, but control memory
has______ microprogram:
a. Static
b. Dynamic
c. Compile time
d. Fixed
149. Control memory is part of ______ that has addressable storage registers and used as temporary
storage for data:
a. ROM
b. RAM
c. CPU
d. Memory
150. How many modes the address in control memory are divided:
a. 2
b. 3
c. 5
d. 7
a. Task mode
b. Executive mode
c. Both a & b
d. None of these
a. Executive mode
b. Task mode
c. Both a & b
d. None of these
153. Addresses in control memory is made by____ for each register group:
a. 3
b. 5
c. 6
d. 8
156. Which memory is used to copy instructions or data currently used by CPU:
a. Main memory
b. Secondary memory
c. Cache memory
d. None of these
a. Execution cache
b. Data cache
c. Instruction cache
d. All of these
a. Data cache
b. Execution cache
c. Address cache
d. Control cache
a. Cache directing
b. Cache mapping
c. Cache controlling
d. Cache invalidation
a. Main memory
b. External memory
162. When cache process starts hit and miss rate defines in cache directory:
a. Directories
b. Memory
c. Registers
d. Folders
167. Invalidation writes only to_____ and erases previously residing address in memory:
a. Folders
b. Memory
c. Directory
d. Files
168. _______machine instruction creates branching to some specified location in main memory if result of
last ALU operation is Zero or Zero flag is set:
a. Branch on One
b. Branch on Three
c. Branch on Nine
a. Branching
b. Non-branching
c. Both a & b
d. None of these
171. Which are 3 ways to determine address of next micro instruction to be executed:
a. Conditional
b. Unconditional
c. Both a & b
d. None of these
173. In which branching condition is tested which is determined by status bit of ALU:
a. Unconditional
b. Conditional
c. Both a & b
d. None of these
174. which branch is achieved by fixing status bit that output of multiplexer is always one:
a. Unconditional
b. Conditional
c. Looping
d. All of these
175. Which register is used to store addresses of control memory from where instruction is fetched:
a. MAR
a. Control words
b. Memory words
c. Multiplexers
d. Decoders
177. Opcode is the machine instruction obtained from decoding instruction stored in:
a. Stack pointer
b. Address pointer
c. Instruction register
d. Incrementer
178. Branch logic determines which should be adopted to select the next______ value among possibilities:
a. CAR
b. GAR
c. HAR
d. TAR
a. Decrementer
b. Incrementer
c. Postfix
d. Prefix
180. ________used to hold return address for operations of subroutine call branch:
a. TBR
b. HDR
c. SDR
d. SBR
181. Which of following 2 types of computer system considered by micro programmed unit:
a. Micro level computers
b. Machine level computers
c. Both a & b
d. None of these
182. Following are the components of micro programmed control unit:
a. BR
b. CR
c. AR
d. TR
a. 3
b. 4
c. 5
d. 2
190. _______is the data paths link CPU registers with memory or I/O modules:
191. ______is data paths there is movement of data from one register to another or b/w ALU and a
register:
a. External
b. Boreal
c. Internal
d. Exchange
a. Zero
b. One
c. Three
d. Eight
a. ROM
b. RAM
c. SAM
d. SAN
a. Microprogrammed
b. Hardwired
c. Betterwired
d. None of these
a. ROM
b. Random logic
c. Programmable logic array
d. All of these
200. In RISC architecture access to registers is made as a block and register file in a particular register can
be selected by using:
a. Multiplexer
b. Decoder
c. Subtractor
d. Adder
a. Reg R/W
b. Load/Reg-Reg
c. ALU function select
d. Load control
e. Read control
f. IR Latch
g. JUMP/Branch/Next PC
h. All of these
a. Minor
b. Major
c. Mixer
d. None of these
a. Fetch
b. Decode
c. Memory
d. Write back
e. All of these
a. Fetch
b. Decode
c. Complete
d. All of these
a. Major
b. Minor
c. Both a & b
d. None of these
a. 1
b. 2
c. 3
d. 0
207. Decoding of an instruction in RISC architecture means decision on working of control unit for:
a. Remainder of instructions
b. Divisor of instructions
c. Dividend of instructions
d. None of these
208. Which control is used during starting of instruction cycle:
a. Write
209. ________function select takes op code in IR translating to function of ALU and it may be compact
binary code or one line per ALU:
a. ALU
b. CPU
c. Memory
d. Cache
a. Jump
b. Branch
c. NextPC
d. All of these
211. __________dependent on instruction and major state and also comes in starting of data fetch state as
well as write back stage in CU:
a. Register read
b. Register write
c. Register R/W
d. All of these
a. Load register
b. Load Reg/Reg
c. Only Load
d. None of these
a. Microinstruction execution
b. Microinstruction sequencing
c. Both a & b
d. None of these
a. CD
b. RG
c. CC
d. CR
216. Who determine under what conditions the branching will occur and when:
a. By combination of CD and BT
b. By combination of CD and BR
c. By combination of CD and CR
d. By combination of TD and BR
217. The character U is used to indicate:
a. Undefined transfers
b. Unfair transfers
c. Unconditional transfers
d. All of these
a. DR
b. CR
c. TR
d. BR
a. CR
b. SR
c. BR
d. MR
2. Which unit is a pipeline system helps in speeding up processing over a non pipeline system:
a. CPU
b. RISC
c. ALU
d. MUX
3. The group of binary bits assigned to perform a specified operation is known as:
a. Stack register
b. Control word
c. Both
d. None
a. 1
b. 7
c. 14
d. 28
a. 1
b. 2
c. 3
d. 4
6. Three fields contains three bits each so one filed has how many bits in control word:
a. 2
b. 4
c. 5
d. 6
7. How is selects the register that receives the information from the output bus:
a. Decoder
b. Encoder
c. MUX
a. ALU
b. RISC
c. CPU
d. MUX
a. 1
b. 2
c. 3
d. 4
10. How many bits of OPR select one of the operations in the ALU:
a. 2
b. 3
c. 4
d. 5
11. five bits of OPR select one of the operation in the ____ in control register:
a. CPU
b. RISC
c. ALU
d. MUX
a. 2
b. 3
c. 4
d. 5
a. Pop
b. Push
c. Both
d. None
a. ALU
b. CPU
c. Memory unit
d. None of these
a. Memory stack
b. Stack pointer
c. Push operation
d. Pop operation
a. Infinite number
b. Finite number
c. Both
d. None
18. Which operation are done by increment or decrement the stack pointer:
a. Push
b. Pop
c. Both
d. None
a. Control word
b. Memory word
c. Transfer word
d. All of these
20. The stack pointer contains the address of the word that is currently on____:
21. In register stack items are removed from the stack by using the ____operation:
a. Push
b. Pop
c. Both
d. None
22. Which register holds the item that is to be written into the stack or read out of the stack:
a. SR
b. IR
c. RR
d. DR
23. In register stack the top item is read from the stack into:
a. SR
b. IR
c. RR
d. DR
24. In conversion to reverse polish notation the ____and____ operations are performed at the end:
a. Memory data
b. Main memory
c. CPU
d. ALU
a. Sequence
b. Parallel
c. Both
d. None
28. In instruction formats the information required by the ______ for execution:
a. ALU
b. CPU
c. RISC
d. DATA
a. Operand code
b. Opcode
c. Source code
d. All of these
30. Which are contains one or more register that may be referenced by machine instruction:
a. Input
b. Output
c. CPU
d. ALU
31. Memory mapped ___is used this is just another memory address:
a. Input
b. Output
c. Both
d. None
a. Arithmetic
b. Logical
c. Both
d. None
a. 1
b. 2
c. 3
d. 4
a. Data
b. Register
c. Address
d. None of these
a. Stack
b. Array
c. Queue
d. Binary
a. Logical
b. Arithmetic
c. Both
d. None
39. In the RPN scheme the numbers and operators are listed__________:
a. 1
a. Effective add
b. Effective absolute
c. Effective address
d. End address
a. Immediate addressing
b. Direct addressing
c. Register addressing
d. None of these
43. In which addressing the simplest addressing mode where an operand is fetched from memory is_____:
a. Immediate addressing
b. Direct addressing
c. Register addressing
d. None of these
a. Immediate addressing
b. Direct addressing
c. Register addressing
d. None of these
45. In which mode the main memory location holds the EA of the operand:
a. Immediate addressing
b. Direct addressing
c. Register addressing
d. Indirect addressing
a. Displacement addressing
b. Immediate addressing
c. Direct addressing
d. Register addressing
a. Implicit
b. Explicit
c. Both
d. None
49. In post-indexing the contents of the address field are used to access a memory location containing a___
address:
a. Immediate addressing
b. Direct addressing
c. Register addressing
d. None of these
a. Art
b. System
c. Computer
d. None of these
a. Immediate addressing
54. Which addressing offset can be the content of PC and also can be negative:
a. Relative addressing
b. Immediate addressing
c. Direct addressing
d. Register addressing
55. The length of instruction set depends on:
a. Data size
b. Memory size
c. Both
d. None
56. In length instruction some programs wants a complex instruction set containing more instruction, more
addressing modes and greater address rang, as in case of_____:
a. RISC
b. CISC
c. Both
d. None
57. In length instruction other programs on the other hand, want a small and fixed-size instruction set that
contains only a limited number of opcodes, as in case of_____:
a. RISC
b. CISC
c. Both
d. None
58. The instruction set can have variable-length instruction format primarily due to:
a. Varying number of operands
b. Varying length of opcodes in some CPU
c. Both
d. None
59. An instruction code must specify the address of the____:
a. Opecode
b. Operand
c. Both
d. None
a. 1
b. 2
c. 3
d. 4
e.
62. Which is data manipulation types are:
a. Arithmetic instruction
b. Shift instruction
c. Logical and bit manipulation instructions
d. All of these
63. Arithmetic instruction are used to perform operation on:
a. Numerical data
b. Non-numerical data
c. Both
d. None
64. How many basic arithmetic operation:
a. 1
b. 2
c. 3
d. 4
a. Addition
b. Subtraction
c. Multiplication
d. Division
e. All of these
f. None of these
66. In which instruction are used to perform Boolean operation on non-numerical data:
a. Logical and bit manipulation
b. Shift manipulation
c. Circular manipulation
d. None of these
a. Data
b. Register
c. ALU
d. CPU
a. Data control
b. Register control
c. Program control
d. None of these
a. Parallel
b. Sequence
c. Both
d. None
71. How many types of unconditional jumps used in program control are follows:
a. 1
b. 2
c. 3
d. 4
72. Which are unconditional jumps used in program control are follows:
a. Short jump
b. Near jump
c. Far jump
d. All of these
73. Which instruction is used in program control and used to decrement CX and conditional jump:
a. Loop
b. Shift manipulation
a. Conditional jump
b. Short jump
c. Near jump
d. Far jump
75. Who change the address in the program counter and cause the flow of control to be altered:
a. Shift manipulation
b. Circular manipulation
c. Program control instruction
d. All of these
a. Branch
b. Jump
c. Call a subroutine
d. Return
e. All of these
f. None of these
77. Which is a type of microprocessor that is designed with limited number of instructions:
a. CISC
b. RISC
c. Both
d. None
a. System multiprocessor
b. Symmetric multiprocessor
c. Both
d. None
a. Pipeline
b. CISC
c. RISC
d. Database
a. 1
b. 2
c. 3
d. 4
a. Weather forecasting
b. Artificial intelligence
c. Experts system
d. Images processing
e. Seismology
f. Gene mapping
g. Aerodynamics
h. All of these
i. None of these
88. Which types of jump keeps a 2_byte instruction that holds the range from- 128to127 bytes in the memory
location:
a. Far jump
b. Near jump
c. Short jump
d. All of these
89. Which types of register holds a single vector containing at least two read ports and one write ports:
a. Data system
b. Data base
c. Memory
d. Vector register
90. Parallel computing means doing several takes simultaneously thus improving the performance of
the________:
a. Data system
b. Computer system
c. Memory
d. Vector register
a. Pipeline
b. Vector processing
c. Both
d. None
92. Which processor is a peripheral device attached to a computer so that the performance of a computer can
be improved for numerical computations:
93. Which processor has a single instruction multiple data stream organization that manipulates the common
instruction by means of multiple functional units:
a. Rotate carry
b. Rotate through carry
c. Both
d. None
95. In the case of a left arithmetic shift , zeros are Shifted to the ______:
a. Left
b. Right
c. Up
d. Down
96. In the case of a right arithmetic shift the sign bit values are shifted to the_____:
a. Left
b. Right
c. Up
d. Down
a. Separation of responsibility
b. Addition of responsibility
c. Subtraction of responsibility
d. None of these
a. Client
b. Server
c. Both a & b
d. None of these
a. 3
b. 4
c. 5
d. 6
a. Oldest protocol
d. None of these
a. Infinite
b. Finite
c. Large
7. Layering the communications process means breaking down the communication process
into______ and _____ to handle interdependent categories
a. Smaller
b. Easier
c. Both a & b
d. None of these
8. The convention and rules used in such communications are collectively known as
a. Peer
b. Layer protocol
c. Network
d. None of these
9. The entities comprising the corresponding layers on different computers are called
________ which communicate by using layer protocol
a. Peer
b. Layer protocol
c. Network
d. None of these
e.
c. Both a & b
d. None of these
a. protocols
b. layers
c. Both a & b
d. None of these
a. Hardware implementation
b. Software implementation
c. Both a & b
d. None of these
13.Which are never form a part of the architecture because they are not visible from the
outside
a. Interface specification
b. Implementation details
c. Both a & b
d. None of these
e.
a. Electronics signal
b. Electrical signal
c. Physical signal
d. Physical circuits
15. For two computers to reliably exchange data, they must have a
c. Both a & b
d. None of these
16.Transmission media deals with the types of medium used , which is dictated by the
a. Desirable bandwidth
b. Immunity to noise
c. Attenuation properties
d. All of these
e.
a. Communication buffers
b. Communication media
c. Both a & b
d. None of these
a. Error control
b. Logical channels
c. Routing
d. All of these
a. Noise
b. Electromagnetic interference
c. Both a & b
d. None of these
a. 2
b. 3
c. 4
d. 5
21. Data exchange can take place between any _____ workstations
a. 1
b. 2
c. 3
d. 4
22.Depending on the nature of the involved application in layered architecture, the dialog
type may be
a. Duplex
c. Simplex mode
d. All of these
a. Checkpoint
b. Check mechanism
c. Character encoding
d. Terminal emulation
24.The check pointing circumvent session recovery requirement by retransmitting only the
a. Affected files
b. Saving time
c. Bandwidth
d. All of these
e.
25.Some good examples of presentation problems are the existing incompatibilities between
the__________ standard of character encoding
a. ASCII
b. EBCDIC
c. Both a & b
d. None of these
e.
26. This is the entities in the same layers but on different computers
a. Peer entities
b. Entities
c. Service provider
d. SAP
a. Peer entities
b. Entities
c. Service provider
a. Peer entities
b. Entities
c. Service provider
d. Service user
29.Which is the point from where services can be accessed .each point is the unique address
a. Peer entities
b. Entities
c. Service provider
d. SAP
30. Which are the active elements such as processes, IO chips in every layers
a. Peer entities
b. Entities
c. Service provider
d. SAP
a. Registered E-mail
b. Junk E-mail
c. Both a & b
d. None of these
a. Registered E-mail
b. Junk E-mail
c. Both a & b
d. None of these
e.
a. Client-server model
b. User model
d. None of these
a. connection-oriented
b. connectionless
c. Both a & b
d. None of these
a. Protocol
b. Primitives
c. Confirmed service
d. SAP
a. Request
b. Confirm
c. Response
d. Indication
e. Primitives
f. All of these
g.
a. Protocol
b. Primitives
c. Confirmed service
d. SAP
a. Request
b. Indication
c. Confirm
e. Both a & b
f. All of these
39.Which are the distinct concepts and are important to release connections between sender
and receiver
a. Services
b. Protocol
c. Both a & b
d. None of these
e.
a. Protocol to service
b. Service to protocol
c. Service primitives
d. None of these
a. Name
b. Content
c. Function
e. All of these
f.
c. Layer above it
d. Layer below it
43.________ the protocol can make communication between the two either difficult or
impossible
a. Breaching
c. Broaching
d. Brunching
a. Set of layers
b. Set of protocols
c. Set of machines
d. Both a & b
45.The hectic task of designing the whole network can be distributed in the
a. Smaller
b. Easier
d. All of these
46.Which is the computers from the same manufacturer it was not possible to run
both_______ solution and _______ simultaneously
a. IBM
b. DEC
c. Both a & b
d. None of these
47.ISO-OSI reference model these could only be run one at a time by the end__________
a. 1969s
b. 1971s
c. 1970s
d. 1972s
a. Message sequences
b. Byte streams
c. Both a & b
d. None of these
e.
a. Connection-oriented services
b. Connectionless services
c. Both a & b
d. None of these
50.The various types of services provided by the interface to the layers above them are listed
as follows
a. Connection-oriented services
b. Connectionless services
c. Both a & b
d. None of these
a. Unreliable datagram
b. Acknowledged datagram
c. Both a & b
d. None of these
a. Datagram service
b. Data service
d. None of these
53.By the end of _________, the Open System Interconnection model was developed by the
International Organization for Standardization to break the barrier
a. 1980
b. 1970
c. 1990
d. 1960
a. Physical layer
c. Hardware implementation
d. All of these
55.The seventh and the highest layer is the application layer that deals with the
a. User interface
b. Applications
c. Both a & b
d. None of these
56.In moving from layer one to layer seven, the level of abstraction ________
a. Increases
b. Decreases
d. None of these
e.
a. Hardware of networks
c. Both a & b
d. None of these
a. Signaling
b. Hardware
c. Both a & b
d. None of these
e.
59.The transport layer is the one, which links the communication process to this
_________________
a. Hardware-oriented protocol
b. Software-oriented protocol
c. Both a & b
a. Data
b. Header
c. Both a & b
d. None of these
61.The seventh layer does not deal with __________ concepts very much
a. Hardware
c. Both a & b
d. None of these
62.The basic philosophy of the seven-layer model is that each layer may be defined
d. None of these
63.The seven layers of the OSI model are categorized into ________ groupings
a. 2
b. 3
c. 4
d. 5
a. 1,2,3
b. 1,2,3,4
c. 1,2,3,4,5
d. 2,3,4,5,6
a. 5,6
b. 5,7
c. 6,7
66.The lower layers are implemented by using ______________ with the incidence of
hardware reducing to software from layer 1 to layer 4
a. Software
b. Hardware
c. Both a & b
d. None of these
e.
67.The upper layers are not expected to know anything about ____________
a. Networking
b. Network addresses
c. Both a & b
d. None of these
a. Networking
b. Network addresses
c. Both a & b
d. None of these
e.
69.The OSI interface is a process of communication between adjacent layers in which data is
passed between
a. Layer n
b. Layer n-1
c. Layer n+1
d. All of these
a. Pass control
c. Both a & b
d. None of these
a. Vertical communication
b. Horizontal communication
c. Protocols
d. OSI interfaces
72.Which is a communication process running at a particular layer on one host machine can
accomplish logical communication with a similar process running at the same layer on
another host machine
a. Vertical communication
b. Horizontal communication
c. Protocols
d. OSI interfaces
a. Modularity
b. Inter-layer interactions
c. Both a & b
d. None of these
e.
Layers Functions
2 Data link It tends to assemble packets into bytes and bytes into frames
and provides access to media by using MAC address
c. Coaxial cables
e. Wireless
f. All of these
a. Voltage
b. Current
c. Phase or frequency
d. All of these
77.The physical layer uses four types of bit signaling approaches these are
78.What are the two types of systems that are used to provide timing signal
a. Asynchronous communications
b. Synchronous communications
c. Both a & b
d. None of these
a. Bytes
b. Bits
c. Gigabyte
d. Megabyte
80.Which bit stream is to be transmitted with the objective that when the sending side sends
_____ bit
a. 1
b. 0
c. 1,0
d. None of these
81.Which bit stream is to be transmitted with the objective that when the received by the
receiving side as 1 bit, not as ___ bit
a. 1
b. 0
c. 1,0
d. None of these
82.It defines the electrical and mechanical aspects of interfacing to a physical medium for
transmitting data ________________________________
a. As well as setting up
b. Maintaining
d. All of these
d. All of these
84.The physical layer supports various encoding and signaling functions to convert data,
from bit stream to frame and vice versa, to send across the network
d. None of these
a. RS-323C/D
b. RS-232C/D
c. RS-233C/D
d. RS-322C/D
a. HDLC
b. Ethernet
c. Both a & b
d. None of these
c. Data framing
d. Addressing
f. All of these
88.The data link layer also deals with the issue of addressing what is popularly known as
a. Hardware
b. Address
d. All of these
c. Both a & b
d. None of these
a. Logical addressing
b. Routing
c. Datagram encapsulation
e. All of these
a. Static
b. Dynamic
c. Both a & b
d. None of these
e.
92.The network layer uses which service for delivering packets across the network
a. Connection-oriented
b. Connectionless service
c. Both a & b
d. None of these
93.In broadcast network ,the routing problem is ________, so the network layer is often thin
or even nonexistent
a. Complex
b. Simple
c. Both a & b
d. None of these
a. Software application
b. Hardware application
c. Both a & b
d. None of these
e.
95.The transport layer accepts data from the ______ and splits it up into smaller units so that
it can be passed to the network layer
a. Network layer
b. Session layer
c. Presentation layer
d. Physical layer
a. FTP
b. TFTP
c. HTTP
d. TCP/IP
a. Process-level addressing
f. Flow control
g. All of these
a. Establishing
b. Maintaining
d. All of these
e.
99. The session layer provides enhanced useful services in some applications such
as
a. Remote login
c. Both a & b
d. None of these
a. NetBIOS
b. TCP/IP sockets
d. All of these
101.Which enable an application to complete specified high level communications over the
network successfully and easily with the help of a standardized set of services
a. RPCs
b. APIs
c. TCP/IP
d. All of these
a. Link layer
b. Data layer
c. Open layer
d. None of these
a. HDLC
b. Ethernet
c. Both a & b
d. None of these
a. Physical layer
c. Transport layer
d. Presentation layer
105.Which layer is responsible for the reliable transfer of data across the physical link
a. Physical layer
c. Transport layer
d. Presentation layer
c. Frame formatting
e. Error detection
f. Link management
g. All of these
107.Which layer performs functions relative to the syntax and semantics of the information
transmitted
a. Physical layer
c. Transport layer
d. Presentation layer
108.The types of data handling issue that presentation layer provides are as follows
a. Translation
b. Compression
c. Encryption
d. All of these
a. PCs
b. Macintoshes
c. UNIX systems
d. AS/400 servers
e. All of these
a. Physical layer
c. Application layer
d. Presentation layer
a. Distributed database
b. Electronic mail
c. Resource sharing
d. File transfer
f. Network management
g. All of these
a. Physical layer
b. Application layer
c. Transport layer
d. Presentation layer
a. HTTP, FTP
b. SMTP, DHCP
c. NFS, Telnet
d. SNMP, POP3
f. All of these
114.Which model is considered the oldest protocol of all computer networks like the
ARPANET and its successor, the Internet
b. SMTP model
c. Telnet model
d. NNTP model
e.
115.Most users rely on ______ for the purpose of file transfers, electronic mail(e-mail) and
remote login services
a. TCP/IP
b. SMTP
c. DHCP
d. NFS
e.
a. 2
b. 3
c. 4
d. 5
a. Physical layer
b. Application layer
c. Transport layer
d. Presentation layer
a. Internet layer
b. Transport layer
c. Application layer
e. All of these
a. Application-specific processes
b. Host-specific processes
c. Network-specific processes
d. All of these
120.Which TCP/IP standards define protocols for TCP/IP networks for layer two
implementation to fill the gap between the network layer and the physical layer
b. Point-to-Point Protocol(PPP)
c. Both a & b
d. None of these
121.The Internet layer of the TCP/IP matches with the which layer of the OSI model
a. Network layer
b. Physical layer
c. Session layer
a. Network protocol
b. Internet protocol
c. OSI protocol
d. None of these
a. IP
b. ICMP
c. RIP
d. BGP
e. All of these
b. FDDI
c. Token Ring
d. All of these
e.
a. TCP
b. UDP
c. FDDI
d. Both a & b
a. FTP
b. TFTP
c. SMTP
d. NFS
e. TELNET
f. SNMP
g. All of these
h. None of these
a. Reliable
b. Connection-oriented
c. Connectionless
d. Unreliable
i. Both a & b
ii. Both c & d
iii. None of these
a. Numerous
b. UDP
d. IP
a. Sequence control
c. Flow control
d. All of these
130.TCP layer is a
a. Service
d. None of these
131.The basic functions of application layer are _____________ that wish to communicate
with one another
c. Both a & b
d. None of these
a. Remote machine
d. All of these
a. Issues of authentication
d. All of these
134.Another aspect of the application layer is to __________ ,this application is called telnet
a. Login remotely
c. Remotely
d. None of these
135.TCP connection with another location and then pass keystrokes from the _______
136.Similarly, there are many other applications such as NNTP enabling communication
between a ___________
a. News server
b. News client
d. All of these
a. Internet
b. Web
c. Both a & b
d. None of these
138.Which is a file server access protocol that enables a user to transfer files between two
hosts
a. SMTP
b. TCP
c. FTP
d. NNTP
139.FTP is widely available on almost all-browsers indicating that all computing platforms,
including _________
a. DOS
b. OS/2
140.Which dose not require any familiarity with the remote operating system
a. SMTP
b. TCP
c. FTP
d. NNTP
e.
a. TCPD
b. FTPD
c. SMTD
d. CTPD
a. Control connection
b. Data connection
c. Both a & b
d. None of these
e.
143.Which is invoked for the entire duration of transfer of file or FTP session
a. Control connection
b. Data connection
c. Both a & b
d. None of these
a. Control connection
b. Data connection
c. Both a & b
d. None of these
e.
145.The main function of data connection is to facilitate transfer of file and directory to and
147.Which is also an internet service intended for the transfer of files from one computer to
another over a network
a. TFTP
b. FTP
c. Both a & b
d. None of these
a. Password protection
c. Both a & b
d. None of these
a. FTP
b. SMTP
c. NNTP
d. FTPD
a. Electronic message
b. Electronic mail
c. Electric mail
e.
a. Post mail
b. Postal mail
c. Post card
d. None of these
a. User agent
c. Both a & b
d. None of these
154.Which is a software package that transports the message created by a user to destination
mailboxes possibly on remote machines
a. User agent
b. MTA
c. Both a & b
d. None of these
155.The MTA has to perform more complex jobs than other applications
c. MTA allows mixing of text, voice appending documents, files and video in a
message
a. Mailbox names
b. Symbolic names
d. All of these
a. User agent
b. MTA
c. Both a & b
d. None of these
a. Mailbox names
b. Symbolic names
d. All of these
159.Which refers to an alias for a set of recipients, that consults an internal database to
specify the mail addresses
a. Mailbox names
b. Symbolic names
d. All of these
160.There are a number of e-mail packages available. Some of them are free like
____________________, while some are paid
a. Google mail
b. Yahoo mail
c. Hotmail
d. All of these
161.In MTA, all of them are also not alike but most of the e-mail software have common basic
functionality these are
g. All of these
b. An at sign(@)
c. The domain name, which basically specifies the address of the users mail server
d. All of these
a. dee facto
b. de facto
c. de fact
d. none of these
164.SMTP uses ______ transport for the reliably delivery of mail messages
a. FTP
b. TCP
c. MTA
d. FTPD
a. NNTP
b. Telnet service
c. FTPD
d. none of these
a. UUDP
b. UUCP
d. UCPD
a. EBCDIC strings
b. ASCII strings
c. Both a & b
d. None of these
169.________ standards were used to encode binary files for transfer through SMTP, which
has now become a standard with its varied version
a. FTPD
b. FTP
c. MIME
d. UUCP
e.
d. Posting of Protocol
b. POP3
c. IMAP
d. All of these
a. SMTP
b. POP3
c. IMAP
d. Both b & c
a. User-defined services
b. Well-known services
c. Both a & b
d. None of these
a. User-defined
b. Well-known
c. Client-server
d. All of these
e.
c. Both a & b
d. None of these
e. All of these
178.Telnet service is unique in the manner that is ___________ like other TCP/IP services
a. Platform-specific
b. Not platform-specific
c. Platform-service
d. None of these
Are You there(AYT) This command allows a client to send an out-of-band query to
verify whether the remote end is still there
180.Novell NetWare is a ___________ network operating system that was created by Novell,
Inc
a. Client type
b. Server type
c. Both a & b
d. None of these
a. 3 layers
b. 4 layers
c. 5 layers
d. 6 layers
183._______ is a networking protocol used by the Novell NetWare operating systems for
performing connectionless communication
a. NVT
b. IPX
c. IP
d. FTP
184.The rise 1985 saw the rise of Novell NetWare when _____________ were launched
c. Both a & b
d. None of these
185.Two methods of operation were supported by NetWare 286 2.x namely are
a. Dedicated
b. Non-dedicated
c. Both a & b
d. None of these
e.
186.Beginning with NetWare 3.x, assistance for _____ protected mode was included,
removing the 16MB memory limit of NetWare 286
a. 16-bit
b. 32-bit
c. 64-bit
d. 128-bit
187.Which managed all functions and was activated at startup or at the time of requirement
b. FTP
c. SMTP
d. FTPD
a. Protocol
b. Protocol stack
c. Protocol layer
d. None of these
e.
a. 2 layers
b. 3 layers
c. 4 layers
d. 5 layers
e.
a. Upper layer
b. Physical media
c. Next layer
d. Protocol
191.When data travels downwards from upper the layer in TCP/IP, each upper layer attaches
a
a. Footer
b. Header
c. Standard
d. None of these
e.
192.After the transmission of data in bit form to another machine it travels upward,
____________ the header till data reaches the application layer
a. Stripping in
b. Stripping off
c. Tackling off
d. Tackling in
193.In which year, Netware directory service were added to the Netware version 4
a. 1993
b. 1996
c. 1998
d. 2001
a. 1993
b. 1996
c. 1998
d. 2001
a. 1993
b. 1996
c. 1998
d. 2001
a. 1993
b. 1996
c. 1998
d. 2001
e.
a. Protocol stack
b. Protocol suite
c. Stack
d. Suite
198.Which is a file server access protocol that enables a user to transfer file between two
hosts, across the network or Internet using TCP
a. FTPD
c. Telnet
d. PPP
199.Which is a remote terminal protocol that enables a user at one location to establish a
TCP connection with another location
a. FTPD
b. FTP
c. Telnet
d. PPP
200.Which protocol is used by network computers operating system for sending error
messages
a. FTPD
a. FTP
b. Telnet
c. ICMP
Maximum 100 30 -
node/segment
Repeaters/Series 4 4 4
a. Images
b. Numbers
c. Words
d. All of these
a. Latin
b. Contextual
c. DB
d. None of these
a. 1
b. 2
c. 3
d. 4
a. Qualitative
b. Quantitative
c. Both a & b
d. None of these
a. Highest
c. Lowest
d. None of these
a. Highest
b. Middle
c. Lowest
d. None of these
a. Highest
b. Middle
c. Lowest
d. None of these
a. Numerical form
b. Non-numerical form
c. Both a & b
d. None of these
a. Numerical form
b. Non-numerical form
c. Both a & b
d. None of these
a. Things
b. Words
c. Text
d. None of these
b. Quantitative data
c. Both a & b
d. None of these
12.Which data are rich, poor, tall, short, good, bad, better
a. Qualitative data
b. Quantitative data
c. Both a & b
d. None of these
a. Values
b. Operations on values
c. Both a & b
d. None of these
a. Integers
b. Floating-point numbers
c. Characters
d. Alphanumeric strings
e. All of these
15. The smallest addressable unit of data is defined as a group of ___ bits is known as a byte:
a. 4
b. 8
c. 16
d. 32
a. Word
b. Number
c. Bit
d. Byte
a. 8 bit or 16 bit
b. 16 bit or 32 bit
c. 32 bit or 64 bit
18.In a 32-bit word it can represent unsigned integer values ranging from
a. 0 to 232 -1
31 31
b. -2 to 2 -1
c. 0 to 264 -1
31
d. 0 to 2 -1
19.In a 32-bit word it can represent signed integer values ranging from
a. 0 to 232 -1
31 31
b. -2 to 2 -1
c. 231 to 264 -1
31
d. 0 to 2 -1
20.A signal is an
a. Electric current
b. Electromagnetic field
c. Electronic current
d. Both a & b
c. Both a & b
d. None of these
a. A telephone user
c. Both a & b
d. None of these
a. Physical
b. Logical
c. Both a & b
d. None of these
a. Hard wired
b. Wireless
c. Both a & b
d. None of these
a. Upgrades
b. Degrades
c. Both a & b
d. None of these
a. Reproduced
c. Both a & b
d. None of these
a. Images
b. Audio
c. Text
d. Programs
e. Telemetry
f. All of these
a. Electrical form
b. Electromagnetic form
c. Both a & b
d. None of these
a. Internal
b. External
c. Both a & b
d. None of these
a. 300kHz
b. 300MHz
c. 300GHz
d. 300Hz
32.The noise generated which is lower than the high frequency range of ____ and may have
more interface with the signal of information:
a. 300MHz
b. 300kHz
c. 300GHz
d. 300Hz
e. All of these
a. Channels
b. Receivers
c. Transmitter
d. Both a & b
35.Internal noise is less dependent on frequency, but has a significant effect at:
a. Higher frequency
b. Low frequency
c. Middle frequency
d. No frequency
a. More
b. Less
c. No
d. None of these
c. Both a & b
d. None of these
a. S/N
b. SNR
c. S/M
d. Both a & b
a. decibels
b. Hertz
c. Micron
e.
40.____________ defined as the size of the range of frequencies that can be transmitted
through a channel
a. Channel Bandwidth
c. Channel noise
d. Channel capacity
41.In other words channel bandwidth may be define it as the volume of information per unit
time that a _____________________
a. Computer
b. Person
d. All of these
a. decibels
b. Hertz
c. Micron
a. decibels
b. Hertz
c. Micron
a. Highest frequency
b. Lowest frequency
c. Both a & b
d. None of these
45.__________ is determined by the maximum number of bits that can be transmitted per
unit time through the physical medium:
a. Channel Bandwidth
c. Channel noise
d. Channel capacity
a. decibels
b. Hertz
c. Micron
a. H.Nyquist in 1924
b. H.Nyquist in 1934
d. None of these
b. Media characteristics
c. Transmission distance
d. All of these
49._____________ is the amount of time that is needed for the information to propagate from
the source to destination through the channel:
a.
b. Propagation time
d. Channel Utilization
e. Both a & b
a. bits
b. characters
c. blocks passing
d. All of these
a. Bandwidth
b. Channel noise
c. Bit rate
d. Channel latency
a. More
b. Less
c. Medium
d. None of these
a. Nature of medium
c. Nature of distance
d. Both a & b
a. Frequency
b. Frequency spectrum
c. Carrier frequency
d. None of these
a. Baud rate
b. Pass band
c. Band data
d. Pass
a. Lesser
b. Greater
c. Medium
d. None of these
57.________ refers to the minimum or maximum spatial separation between devices over a
link, in the context of a complete, end to end circuit
a. Bandwidth
b. Channel
c. Distance
d. None of these
58._________ is the rate over network speed which is used to detect errors while transmitting
data
a. Bit rate
b. Data rate
c. Baud rate
d. Pass band
a. >1008GHz
b. <1018GHz
c. >1018GHz
d. <1008GHz
60.The most popular method for detecting errors in bit rate is ________ a parity bit alongside
the data bit for a character
b. Inserting
c. Modifying
d. Updating
61.TDM means
62.FEC means
d. Parity bit
a. TDM
b. FEC
c. Framing Bit
d. All of these
b. FEC
c. Framing Bit
d. All of these
d. None of these
d. None of these
69.The size of the multimedia file is the length of recording in seconds divided by:
a. 4
b. 8
c. 12
d. 16
e.
e. All of these
a. Fixed
b. Uniform
a. 1Gbit/s
b. 1Mbit/s
c. 1Mbyte/s
d. 1Gbyte/s
74.Bit rate is used to calculate the speed of time to access the network
a. Equal
b. More
c. Equal or more
d. None of these
a. Signal
b. Data
c. Symbol
d. None of these
77.Lesser bandwidth is required to move these signal units with _____ bits for an efficient
system
a. Less
b. Large
d. None of these
a. 8-key
b. 6-key
c. 5-key
d. 9-key
a. ITA 1
b. ITA 2
c. ITA 3
d. ITA 4
a. 00011
b. 00101
d. 10101
a. Line Feed
b. Light Feed
c. Line Format
d. None of these
85.The basic idea behind coding was really workable if number of characters it had to handle
do not require more than
a. 8 characters
b. 16 characters
c. 32 characters
d. 64 characters
a. Characters
b. Punctuation marks
e. All of these
a. Inside computer
b. Outside computer
c. Both a & b
d. None of these
d. Unicode
e. Manchester Code
g. Return to Zero(RZ)
j. MLT-3
k. 4B/5B
l. 5B/6B
m. All of these
a. UTF-7
b. UTF-8
c. UTF-16
d. UTF-32
e. UTF-EBCDIC
f. All of these
90.Binary Coded Decimal system makes use of a series of _____ to represent a decimal
number
a. 4
b. 8
c. 16
d. 32
e.
a. 8 bits
b. 4 bits
c. 16 bits
d. 32 bits
a. 8 bit
b. 4 bit
c. 16 bit
d. 32 bit
a. 3
b. 4
c. 2
d. 6
a. Zone
b. Digit
c. Byte
d. Bit
a. Zone
b. Digit
c. Byte
d. Bit
a. Characters belong
b. Integers belong
c. String belong
d. None of these
a. 64 bit
b. 7 bit
d. 32 bit
e.
a. 1964
b. 1965
c. 1963
d. 1966
a. Unicode Consortium
b. Unique Consortium
c. Unicode Constant
d. None of these
101.Unicode is appeared in
a. 1992
b. 1991
c. 1993
d. 1994
a. Unicode 1.0
b. Unicode 2.0
c. Unicode 3.0
d. None of these
a. 2005
b. 2006
c. 2007
d. 2004
104.In Unicode there were codes for representing characters and their basic graphical
representation are known as
a. Graphical
c. Graphs
d. None of these
105.The first 256 code points belong to __________ for conversion to Roman Text
a. ISO 5589-1
b. ISO 5569-1
c. ISO 5579-1
d. ISO 5559-1
c. Both a & b
d. None of these
107.Every communication channel has a ________ which is defined as the frequency range
a. Channel
b. Bandwidth
c. Carrier
d. Data rate
a. Physical
b. Logical
c. Both a & b
d. None of these
a. 1M
b. 2M
c. 3M
d. 4M
110.Data rate that can be achieved using a channel depends on the _____________ of a
channel
b. Bandwidth
c. Data rate
d. Capacity
a. Anti-Aliasing
b. Aliasing
c. Channel
d. Bandwidth
d. None of these
a. 1
b. 2
c. 3
d. 4
a. Analog
b. Digital
c. Both a & b
d. None of these
b. Discrete form
c. Both a & b
d. None of these
b. Discrete form
c. Both a & b
d. None of these
a. Analog Modulation
b. Analog Manipulation
c. Amplitude Modulation
d. Analog Modeling
a. Frequency Modulation
b. Fourier Manipulation
c. Frequency Manipulation
d. Frequency Modeling
a. 4000Hz
b. 5000Hz
c. 6000Hz
d. 3000Hz
a. 2MHz
b. 4MHz
c. 6MHz
d. 8MHz
e. All of these
d. All of these
a. Analog
b. Digital
c. Both a & b
d. None of these
124.SS7 means
a. Signal Source7
b. Signaling source7
c. Signaling system7
d. Signal system7
125.SS7 is a
a. System
b. Source
c. Protocol
d. None of these
126.The PSTN provides a _________ path between the destination and source
a. Logical
b. Physical
c. Both a & b
d. None of these
a. Controlling network
d. All of these
129.SSPs uses Query Service Control Point (SCP) database using Packet switches called
a. Asynchronous
b. Synchronous
c. Synchronization
d. None of these
a. Asynchronous systems
d. All of these
a. Start
b. Stop
c. Start-stop
d. None of these
a. 20MHz
b. 15MHz
c. 10MHz
d. 5MHz
e.
a. Absence
b. Presence
c. Both a & b
d. None of these
a. Rest Condition
c. Both a & b
d. None of these
a. less
b. more
d. none of these
a. Rest
b. Zero
c. Neutral
d. None of these
a. 2
b. 3
c. 4
d. 5
d. None of these
a. ANSI X3T9.7
b. ANSI X5T9.6
c. ANSI X3T9.5
d. ANSI X6T9.5
144.FDDI uses ANSI X3T9.5 for obtaining 100Mbps from a signal of ______
b. 31.25MHz
c. 31.24MHz
d. 32.26MHz
a. Block coding
b. Bit coding
c. Byte coding
d. Block character
a. 1000MHz
b. 100MHz
c. 10MHz
d. 99MHz
147.The 5B/6B scheme encodes the scrambled 5-bit data pattern into predetermined _____
bit symbol
a. 5
b. 4
c. 6
d. 3
a. Audio
b. Video
c. Music
d. Data
150.The modulation/demodulation is a
a. Linear process
b. Non-linear process
c. Both a & b
d. None of these
a. Special character
b. Start bit
c. Stop bit
d. None of these
a. STN
b. SYN
c. SBN
d. SRN
a. 01001111
b. 10001110
c. 00010110
d. 00110011
a. 2bit
b. 4bit
c. 8bit
d. 16bit
a. 100MHz
b. 10MHz
c. 1000MHz
a. 1
b. 0
c. Both a & b
d. None of these
a. 10
b. 100
c. 1000
d. 10000
a. Audio
b. Music
c. Video
d. Data
e. All of these
159.Modulation/ demodulation is a non linear process where two different sinusoids are
_________
a. Addition
b. Subtraction
c. Multiplied
d. Division
a. Once
b. Twice
c. Thrice
d. None of these
161.The frequencies that comprise the message (base band) are translated into a _________
a. Lower
b. Higher
c. Zero
d. None of these
162.Modulation also reduces the size of antenna for higher frequencies with ________
frequency
a. Lower
b. Greater
c. Middle
d. None of these
a. Even
b. Odd
c. Both a & b
d. None of these
164.Harmonics are the _________ of the frequency, that is the message frequency
a. Addition
b. Subtraction
c. Multiply
d. Division
a. Radio wave
b. Light wave
c. Both a & b
d. None of these
166.The amplitude of carrier frequency ________ in accordance with the modulated signal
b. Change
b. Change
d. None of these
a. DSB-SC
b. DBS-CS
c. BDS-SC
d. BSD-CS
a. Direct data
b. Digital data
c. Device data
d. None of these
a. 32Kbps
b. 64Kbps
d. 256Kbps
a. Less
b. Middle
c. High
d. None of these
174.In digital signal the main source of noise is ___________, which introduces as the finite
number of quantization levels during the conversion to PCM code
a. Quantization noise
b. Equalization noise
c. Digital noise
d. None of these
175.The main parameters in determining the quality of a PCM system are the
a. Dynamic range
b. Signal-to-Noise Ratio(SNR)
c. Both a & b
d. None of these
a. Original level
b. Quantized level
c. Both a & b
d. None of these
177.The maximum error occurs when the original level falls exactly halfway between ______
quantized levels
a. 2
b. 3
c. 4
d. 1
c. Both a & b
d. None of these
179.For a six bits system the dynamic range will be approximately equal to ___
a. 34dB
b. 36dB
c. 40dB
d. 38dB
180.In dynamic range, the largest voltage amplitude is _______ the smallest voltage
amplitude
a. 32times
b. 64times
c. 125times
d. 256times
a. Slope overload
b. Granular noise
c. Both a & b
d. None of these
a. Telephone lines
b. Television lines
c. Digital lines
d. None of these
a. Digital media
b. Analog media
c. Both a & b
184.In the case of telephone lines, the usable bandwidth falls in the range of _______
a. 300Hz to 3000Hz
b. 300Hz to 3300Hz
c. 30Hz to 3300Hz
d. 33Hz to 3300Hz
a. 0
b. 1
c. both a & b
d. none of these
h. All of these
a. Signals
c. Both a & b
d. None of these
188.Telephone lines limit amplitude changes to some _________ changes per second
a. 3000
b. 3300
c. 3100
d. 3330
a. Modulation
b. Data
c. Signals
d. None of these
190.In the Phase Shift Keying method a sine wave is transmitted and the phase of the sine
wave carries the ______
a. Analog data
b. Digital data
c. Signal data
d. None of these
a. 0
b. 45
c. 90
d. 180
a. 0
b. 45
c. 90
d. 180
d. None of these
d. None of these
195.In the differential phase shift keying, For a 0 the modem shifts the phase of each
succeeding signal in a certain number of degrees
a. 0
b. 45
c. 90
d. 180
196.In the differential phase shift keying, For a 1 the modem shifts the phase of each
succeeding signal and a different certain number of degrees
a. 0
b. 90
c. 180
d. 270
197.In binary phase shift keying, the case of 4 different phase shifts, where each symbol
represents ____, the modulation technique is called quadrature PSK(QPSK)
a. 2 bits
b. 4 bits
c. 8 bits
d. 16 bits
198.In binary phase shift keying, the case of 8 different phase shifts, where each symbol
represents ____, the modulation technique is called
a. QPSK
b. 8PSK
c. 8QAM
d. 8FSK
a. Decibel
b. Baud
c. Hertz
a. 0
b. 45
c. 90
d. 180
a. Linear process
b. Non-linear process
c. Both a & b
d. None of these
202.The FM is considered as a
a. Linear process
b. Non-linear process
c. Both a & b
d. None of these
a. Amplitude Modulation
b. Frequency Modulation
c. Angle Modulation
a. Frequency
b. Phase
c. Both a & b
d. None of these
e.
a. 21Kbps
b. 24Kbps
c. 64Kbps
206.In data communication using computers ,________ signal are normally converted into
PCM
a. Analog
b. Digital
c. Both a & b
d. None of these
a. Analog
b. Digital
c. Both a &b
d. None of these
208.________ is a process where multiple analog message signals or digital data streams are
combined into one medium over a shared medium
a. Multiplexing
b. Modulation
c. Encoding technique
d. De-multiplexing
e. All of these
210.In which , Multiple channels are combined onto a single aggregate signal for
transmission
a. Bandwidth
b. Signal
c. Frequency
d. None of these
212._________ was the foremost multiplexing scheme to have the benefits of wide scale
network deployment and till today, such systems are still in use and are used with analog
transmission
e. Both b & c
f. Both a & b
g. Both c & d
214._______ provides a means for merging data from the varied sources into a single
channel to support communication over a microwave system , satellite system or a
telephone lines
a. Synchronous TDM
b. Asynchronous TDM
c. Both a & b
e.
216.In which type of TDM , a single channel is divided into time slots and each transmitting
device is assigned for least one of the time slots for its transmission
a. Synchronous TDM
b. Asynchronous TDM
c. Both a & b
d. None of these
a. Statistical TDM
b. Static TDM
c. Dynamic TDM
d. None of these
a. FDM
b. TDM
c. CDM
d. None of these
219.In which way of multiplex ,the whole amount for a certain amount of time is provided to
the user and all user uses the same frequency but at different time
a. FDM
b. TDM
c. CDM
d. None of these
a. CDM
b. FDM
c. STDM
d. CDMA
b. Ultra Half-Form
c. Ultra- High-Frequency
d. Ultra-Half-Frequency
222.________ may be defined as the form of multiplexing where the transmitter encodes the
signal using a pseudo random sequence
a. CDM
b. FDM
c. STDM
d. CDMA
a. Bit rate
b. Data rate
c. Baud rate
d. Chip rate
224.If one or more bits are transmitted at the same frequency are called
a. Frequency doping
b. Frequency hopping
c. Frequency hoping
d. Frequency hipping
d. All of these
a. 1963
b. 1989
c. 1979
d. 1958
a. Different
b. Same
c. Both a & b
d. None of these
e.
a. More secure
c. Both a & b
d. None of these
e.
229.A CDMA call starts with a standard rate of ___________ bits per second
a. 9500
b. 9200
c. 9300
d. 9600
d. Both a & b
231.In spread spectrum technique, a receiver is only capable of selecting the desired signal if
it has the knowledge about the code of the intended
a. Receiver
b. Transmitter
c. Both a & b
d. Signal
e. All of these
a. Hipping
b. Hyping
c. Harping
d. Hopping
236.________ is best known spread spectrum technique in which a pseudo random noise
code multiples the signal
a. FHSS
b. FCSS
c. DSSS
d. DHSS
237.A pseudo random noise code is a sequence of chips valued________ with noise-like
properties
a. -1 and1(polar)
b. 0 and 1(non-polar)
c. Both a & b
e.
a. FDM
b. Dwell
c. Dowel
d. Dowry
e.
a. FDM
b. TDM
c. CDM
d. Both a & b
e.
a. Data
b. Audio
d. All of these
a. System
b. Carrier
c. Carrier system
d. None of these
a. Bell Laboratory
b. Hell Laboratory
c. Dull Laboratory
d. None of these
a. Japan
b. North America
c. Both a & b
d. None of these
a. T1
b. E1
c. DS0
d. DS1
a. Direct Service-Level 1
b. Digital Service-Level 1
c. Double Service-Level 1
d. Digital Slide-Level 1
a. North America
b. Japan
c. South Korea
d. All of these
a. 24 channels
b. 26 channels
c. 28 channels
d. 30 channels
a. Timeslots
b. DS0
c. Both a & b
d. None of these
a. 68Kbit/s
b. 64Kbit/s
c. 62Kbit/s
d. 70Kbit/s
250.DS1 is full-duplex circuit in which the circuit does concurrent transmission and
reception at a data rate of ___
a. 1.533Mbit/s
b. 1.544Mbit/s
c. 1.566Mbit/s
d. 1.555Mbit/s
251.By sampling each 8-bit frame for 8000 times per second, total bandwidth achieved is
________
a. 1.537Kbit/s
b. 1.536Kbit/s
c. 1.538Kbit/s
d. 1.539Kbit/s
a. Super Frame(SF)
c. Both a & b
d. None of these
253.Framing channel has been divided into two each with ______ in Super Frame
a. 2Kbit/s
b. 3Kbit/s
c. 4Kbit/s
d. 6Kbit/s
a. 10
b. 12
d. 16
255.There are _____ contiguous frames of 193-bit each in a Extended Super Frame
a. 20
b. 22
c. 24
d. 26
256.Framing channel has been divided into two each with _______ in Super frame
a. 2Kbit/s
b. 4Kbit/s
c. 6Kbit/s
d. 8Kbit/s
a. Terminal frame
b. Signaling frame
c. Super frame
d. Switching frame
e.
a. Terminal frame
b. Signaling frame
c. Super frame
d. Switching frame
e.
259.Alignment of terminal is carried out with frames having _______ in the super frame
a. Even-number
b. Odd-number
c. Prime-number
d. None of these
260.A frame having _________ in the super frame is used for signaling alignment of frame
b. Odd-number
c. Prime-number
d. None of these
a. 1.566Mbit/s
b. 1.544Mbit/s
c. 1.555Mbit/s
d. 1.533Mbit/s
a. AMI
b. LAN
c. DS1
d. CEPT
263.AMI means
a. Bandwidth
b. Signal
c. Both a & b
d. None of these
265.CEPT means
d. None of these
266.CEPT after ten years of launch of T1 system used _____ for framing known as European
a. 2bits
b. 4bits
c. 8bits
d. 16bits
a. 2.084Mbps
b. 2.048Mbps
c. 2.044Mbps
d. 2.088Mbps
a. 30
b. 32
c. 34
d. 36
269.32 time slots implements an individual communication channel supporting a bit rate of
________
a. 60Kbps
b. 62Kbps
c. 64Kbps
d. 66Kbps
a. 128bits
b. 256bits
c. 64bits
d. 192bits
271.Which is used to exchange information over the E1 carriers that connect remote zones
b. Cell Relay
c. Both a & b
e.
a. T-carrier system
b. E-carrier system
c. Both a & b
d. None of these
e.
a. T-carrier system
b. E-carrier system
c. E1 system
d. T1 system
274.ITU-T finds wide use all over the world except three nations namely
275.PDH means
276. In 32 timeslots of E1, only ___ are used two of these are used for framing and signalling
call setup
a. 20
b. 15
c. 30
d. 40
a. Latency
b. Capacity
c. Both a & b
d. None of these
a. TS16
b. TS15
c. TS14
d. TS13
a. Teardown
b. Call setup
c. Both a & b
d. None of these
280.E1 is different from earlier T-carrier systems since all ___ of every sampling are available
for every call
a. 4bits
b. 8bits
c. 16bits
d. 32bits
a. Bounded(guided) media
b. Unbounded(unguided) media
c. Both a & b
d. None of these
a. Twisted pair
b. Coaxial cable
d. all of these
a. Physical conductor
c. Logical conductor
d. Both a & b
a. Copper
b. Glass
c. Both a & b
d. None of these
e.
a. Microwave
b. Satellite
c. Infrared
a. Radio
b. TV
c. Cellular phones
d. All of these
a. Satellite signal
b. Satellite relay
d. Digital signal
c. Both a & b
d. None of these
a. Mutual interference
c. Both a & b
d. None of these
291.PDAs means
292.ADSL means
293.A pair of copper wires twisted together and wrapped with a plastic coating as a twisted
pair and which has a diameter of ____:
a. 0.2-0.6
b. 0.4-0.7
c. 0.2-0.8
d. 0.4-0.8
a. Teflon(r)
c. Polyvinyl chloride
d. Polyethylene
e. All of these
f.
a. 24Kbps
b. 28Kbps
c. 30Kbps
d. 32Kbps
e.
a. Copper medium
b. Copper signal
c. Copper set up
d. None of these
e.
297.The unshielded twisted pair states the link between the end in the communication closet
and the outlet which is further restricted to
a. 60metres
b. 90metres
c. 100metres
d. 190metres
a. 2 to 240
b. 2 to 4200
c. 2 to 2400
d. None of these
a. Bandwidth is lower
c. Bandwidth is limited
d. Bandwidth is dynamic
a. 1 pair
b. 2 pairs
c. 3 pairs
d. 4 pairs
a. 2 pairs
b. 3 pairs
c. 4 pairs
d. 5 pairs
a. 52.5/125
b. 72.5/125
c. 62.5/125
d. 82.5/125
a. Flexibility
b. Cost-effective media
d. All of these
305.LED means
a. Spacing of amplifiers
e. All of these
a. 10BASE5
b. 10BASE2
c. 10BASET
d. All of these
a. Baseband
b. Broadband
c. Both a & b
d. None of these
a. Thicker
b. Thinner
c. Heavy
d. Bulky
a. Thick
b. Heavy
c. Bulky
d. All of these
a. 2
b. 3
c. 4
d. 5
c. Both a & b
d. None of these
313.The bandwidth is typically ________ over a length of one kilometer of fibre expressed as
MHz-Km
a. 10 to 20
b. 20 to 30
c. 30 to 40
d. 40 to 50
314.In which multimode fibre, light is refracted by an increasing amount as it moves away
from the core
d. All of these
c. Both a & b
d. None of these
d. All of these
318.In which multimode fibre , different wavelength of light travel at a different speeds
d. All of these
b. Lowest cost
d. All of these
b. Large bandwidth
f. All of these
a. Light sources
b. Cables
c. Light detectors
d. All of these
b. EMI
c. RMI
d. RFI
323.EMI/RFI means
d. None of these
324.Monomode fibre optic systems routinely are capable of transmitting signal over distances
in excess of
a. 250Km
b. 350Km
c. 225Km
d. 325Km
325.CAD means
d. None of these
a. Wired
b. Wireless
c. Both a & b
d. None of these
a. Attenuation
b. Distortion
c. Noise
d. All of these
329.___________ is the loss of the signal power while traversing a transmission media
including electronic circuitry
a. Attenuation
b. Distortion
c. Noise
d. None of these
a. Hertz
b. Micro
c. decibel
d. Kilometer
c. Both a & b
d. None of these
a. Loss
d. None of these
a. Loss
b. Gain
d. None of these
e.
b. Transmitter powers
c. Modulation techniques
e. Atmospheric conditions
f. All of these
a. Atmospheric conditions
b. Modulation techniques
c. Operating frequency
d. Operating system
336.Equalizing devices are ________ at intermediate points to keep the shape of the signal
intact
a. Created
b. Inserted
c. Modified
d. Deleted
337.Data processing and transmission systems experience errors due to several reasons
d. All of these
338.The main constraints are due to the physical medium that produces
a. Noise
b. Distortion
c. Attenuation
d. Dropouts
e. All of these
339.The digital signals do not suffer from ___________ but they are susceptible to dropouts
a. Noise
b. Distortion
c. Both a & b
d. None of these
d. All of these
341.SECDEC means
b. Burst Errors
c. Both a & b
d. None of these
e.
a. Inductance
b. Capacitance
c. Resistance
d. All of these
c. Both a & b
d. None of these
a. Causes the amplitude of the signal to reduce and therefore loss of power
c. Both a & b
d. None of these
a. Burst errors
c. Both a & b
d. None of these
e.
a. Burst errors
c. Both a & b
d. None of these
348.ENQ means
a. Enquiry
b. Encryptions
c. Enquire
350.NAK means
a. None Acknowledge
b. Noise Acknowledge
c. Negative Acknowledgement
d. Network Acknowledgement
351.The No of bits that get affected in burst errors depends upon the
c. Both a & b
d. None of these
a. correction of errors
b. detection of errors
c. Redundancy check
d. All of these
a. Parity check
c. Checksum
d. All of these
e.
a. CRC
c. Checksum
d. All of these
e.
355.Which redundancy process can detect the more than 95 per cent of all errors
a. CRC
b. Parity check
c. Checksum
d. All of these
356.CRC means
d. None of these
d. None of these
a. Signal attenuation
b. Signal bandwidth
c. Frequency
d. Data rate
a. 1
b. 2
c. 3
d. 4
c. Both a & b
d. None of these
1. The device used for splits data into frames and then combines frames into data in frame
relay is termed as
b. Framing
c. Both a & b
c. Both a & b
d. None of these
b. Flips of bits
e. All of these
a. Header
b. Trailer
c. Both a & b
d. None of these
c. DE-1 is set for the part that can be discarded first when congestion occurs
e. All of these
6. Which is a simple data link protocol based on certain ideal assumptions to explain the
working of the data link layer
a. Stop ARQ
b. Wait ARQ
c. Go back-N ARQ
d. Both a & b
b. Half Duplex
e. All of these
d. HDLC
d. None of these
c. Both a & b
d. None of these
a. easy to Implement
c. Both a & b
d. None of these
d. All of these
13. Which protocol enables the source machine to possess more than one outstanding frame
at a time by using buffers
a. Stop ARQ
b. Wait ARQ
c. Go back-N ARQ
d. Both a & b
a. PAR
b. PER
c. PRA
d. DAR
15.Another important issue in the design if the data link is to control the rate of data
transmission between _____________
d. None of these
a. Sliding protocol
d. None of these
a. Window
b. Sending window
d. Sliding window
18.Which protocol is for data transmission and is bi-directional, used in the data link layer
that corresponds to layer 2 of OSI model
a. Sending window
d. Sliding window
19.Sliding window protocol keeps record of frame sequences sent and acknowledged when
communication takes place between ____________
a. Users
b. Two users
c. More users
d. None of these
d. None of these
21.Which is used by many users to establish their home PC to the Internet via a phone-line
connection
a. FTP
c. OSI
d. PAR
e.
22. Sliding window protocol works on _________ in which there is simultaneous two-way
communication
a. no duplex
b. half duplex
c. full duplex
d. single duplex
e.
a. Data frame
b. Acknowledgement frame
c. Both a & b
d. None of these
24.Another improvement is done over this stop and wait type protocol by use of ________
a. Back
b. Piggybacking
c. Piggy
d. None of these
25.A technique in which acknowledgement is temporarily delayed and then hooked onto next
outgoing frame is known as
a.
b. Back
c. Piggybacking
d. Piggy
e. None of these
a. Go back n
b. Selective repeat
c. Selective reject
d. All of these
a. A wait approach
b. A stop approach
c. Both a & b
d. None of these
a. Bit-oriented
b. Byte-oriented
c. Both a & b
d. None of these
e.
30.HDLC provides
a. Switched protocol
c. Both a & b
d. None of these
a. ADCCP
b. SDLC
c. ISO
d. OSI
b. SDLC
c. ISO
d. FRAD
33.Which is another subset of HDLC that finds use in packet switched networks of ITU-TS
X.25
a. ADCCP
b. SDLC
d. None of these
34.In HDLC three types of stations are specified by the data link layer
a. Primary Station
b. Secondary Station
c. Combined Station
d. All of these
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. All of these
36.Frames of secondary station are known as _________ are sent only on request by the
primary station
a. Response
b. Responses frame
c. Both a & b
d. None of these
a. Frame
c. HDLC
38.A configuration has at least two combined stations in which every station has equal and
complimentary responsibility known as __________________
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. None of these
39.Balanced configurations find use only in the such cases as given below
c. Both a & b
d. None of these
40. A configuration has one primary station and at least one secondary station , and it exists
as one station exercises control over other stations known as ________
a. Balanced configurations
b. Unbalanced configurations
c. Symmetrical configurations
d. None of these
a. Two independent
b. Unbalanced stations
d. All of these
e.
a. 1
b. 2
c. 3
d. 4
e.
a. Transmission
b. Transparency
c. Transparent
d. Transport
a. Data loss
b. Data duplication
c. Data corruption
d. All of these
45.How many modes of operations are defined for the HDLC protocol
a. 2
b. 3
c. 4
d. 5
d. All of these
47.In primary station initializes links for controlling the data flow between ___________
b. Error control
d. All of these
a. Point
b. Point-to-point
c. First-to-end-point
d. None of these
a. Three fields
b. Four fields
c. Five fields
d. Six fields
e.
a. 01111111
b. 01111110
c. 11101110
d. 11101110
51.In the HDLC protocol, every frame consists of __________ with a flag
a. Starts
b. End
c. Both a & b
d. None of these
52.A 8-bit address is used when the total number of stations exceeds _______
a. 64
b. 128
c. 256
d. None of these
a. Long
b. Empty
c. Full
d. Both a & b
c. Both a & b
a. 4bit
b. 16bit
c. 32bit
d. 64bit
e. All of these
a. SLIP
b. X.25
c. Both a & b
d. None of these
e.
58.PPP was designed to work with layer 3 network layer protocols including ___________
a. IP
b. IPX
c. Apple talk
d. All of these
e. All of these
b. PPP
c. IP
d. IPX
61.RAS has an important role in the proliferation of Internet based services in the form of
_________________
a. VoIP
b. Data over IP
c. Both a & b
d. None of these
62.Which is opening new challenges in the development of RAS where VoIP enabled RAS are
the need of time
a. Voice convergence
b. Data convergence
d. None of these
d. Dedicated line
e. All of these
a. Communication
b. Communication server
c. Layer
d. None of these
a. Enterprise
b. Infrastructure
d. None of these
a. Encapsulating datagrams
d. All of these
a. DTE
b. DCE
c. Both a & b
d. None of these
a. RS232C
b. RS-423
c. Both a & b
d. None of these
e.
70.In PPP, the default maximum length of the information field is ________
a. 1000bytes
b. 1500bytes
c. 2000bytes
d. 2500bytes
e.
71.The protocols that are differentiate PPP from HDLC are the
c. Both a & b
d. None of these
a. Link establishment
d. Configuration terminates
e. All of these
c. Both a & b
d. None of these
d. None of these
d. All of these
76.The NCP phase in PPP link connection process is used for establishing and configuring
different network layer protocols such as
a. IP
b. IPX
c. AppleTalk
a. NCP
b. LCP
d. All of these
c. Both a & b
d. None of these
b. The called peer can assign the caller one from a pool of addresses
c. Both a & b
d. None of these
80.If the calling peer does not have an IP address, it tells the
b. The called peer can assign the caller one from a pool of addresses
c. Both a & b
d. None of these
a. RADIUS server
c. Both a & b
d. None of these
82.The Authentication transaction used between a Remote access user and RAS can be divided
into two categories are
d. None of these
83.The digest is a
a. One-way encryption
84.The technology which is useful for creating Virtual Private Networks (VPNs) has been
developed by
a. Microsoft Corporation
b. U.S. Robotics
d. All of these
85.PPTP means
86.The PPTP is used to ensure that message transmitted from one VPN node to another are
a. Not secure
b. Secure
c. Networks
d. IPX
a. PPP
b. RAS
d. None of these
c. Both a & b
d. None of these
a. ADSL
b. Dialup POTS
c. ISDN
d. Other service
e. All of these
90.Which is a platform on which Internet service providers(ISP) and other service providers
enables their user to access the various internet based services
a. RAS
b. TCP
c. ARQ
d. SLIP
a. Resources
b. Information
c. Both a & b
d. None of these
2. The first operational computer network in the world was the _________ for the United
States Department of Defense
a. ARPANET
b. ERNET
c. SKYNET
d. DARPANET
e.
4. _______ is the technology that connects the machines and people within a site in a small
area
a. LAN
b. MAN
c. WAN
d. None of these
5. ______ is a network that covers geographic areas that are larger, such as districts or cities
a. LAN
b. MAN
c. WAN
d. None of these
e.
6. ______ is a network that this technology connects sites that are in diverse locations
a. LAN
b. MAN
c. WAN
d. None of these
a. LAN
b. MAN
c. WAN
d. Ring topology
8. ______ refers to tone signals used for various control purposes via the telephone network
a. SMS
b. DTMF
c. GSM
a. Small area
b. Large area
c. Both a & b
d. None of these
a. Hardware
b. Cabling protocols
c. Standards
d. All of these
e.
a. Ethernet
b. Token ring
c. Both a & b
d. None of these
12.The Institute of Electrical and Electronics Engineers established a project named IEEE
project 802 during the year _____
a. 1990
b. 1970
c. 1980
d. 1960
a. 2
b. 3
c. 4
d. 5
14.ISO revised these standards and reintroduced them as ISO 8802 standards during
____
b. 1987
c. 1997
d. 1999
a. IEEE 802.1- overview and relationship among the various IEEE standards
f. All of these
16.When compared with the OSI reference model, the IEEE standard contains the following
layers:
a. Physical layer
b. Medium access control(MAC) equivalent to the lower part of the OSI data link layer
c. Logical link layer(LAC) equivalent to the upper part of the data link layer
d. Network layer, the OSI network layer, that performs some of the higher order layer
functions
e. All of these
17.The 802.2 compatible interfaces provide two major types of services, which are
a. Unacknowledged
b. Connectionless
c. Both a & b
d. None of these
a. IBM of LAN
b. LAN of IBM
c. Both a & b
d. None of these
e.
a. Logical ring
b. Physical ring
c. Both a & b
d. None of these
e.
a. Four-byte
b. Three-byte
c. Two-byte
d. One-byte
21.Start of frame and end of frame are used to _______ the frame boundaries
a. Mark
b. Modify
c. Delete
d. Find
a. Frame technique
b. Frame type
c. Both a & b
d. None of these
a. Send messages
b. Send data
c. Delete data
25.The maximum length of this field is _______ when the address is _______
26.The maximum length of this field is _______ when the address is _______
a. Error correction
b. Error detection
c. Both a & b
d. None of these
e.
a. Sending station
b. Successor
c. Both a & b
d. None of these
29.Government agencies and local libraries often use a MAN to connect to private
a. Industries
b. Citizens
c. Both a & b
d. None of these
e.
d. None of these
a. Telephone exchange
b. Computer wires
c. Both a & b
d. None of these
a. RS-232
b. X.25
c. Frame relay
e. ISDN
f. OC-3lines(155 Mbps)
34.WAN technologies function at the lower three layers of the OSI reference model
a. Physical layer
c. Network layer
d. All of these
e.
a. Local exchange
c. Both a & b
36. Packet switching technologies such as _____________ are used to implement WAN along
with statistical multiplexing
a. ATM
b. Frame relay
d. X.25
e. All of these
a. Long exchange
b. Local carrier
c. Both a & b
d. None of these
e.
a. Hardware
b. Protocols
c. Both a & b
d. None of these
e.
a. Hardware
b. Protocols(software)
c. Applications(useful software)
a. Education
b. Productivity
d. All of these
41.The Government of India had set up ERNET in ______ to provide TCP/IP connections for
education and research communities in India
a. 1976
b. 1986
c. 1996
d. 1999
a. DISHNET
b. JAINTV
c. Mantra online
d. All of these
43.The other government organizations like _______________ to enter this field to bring the
Internet to common people
a. NIC
b. VSNL
c. MTNL
e.
44.The major network infrastructure available in the country has two types of WAN
a. Terrestrial WAN
b. VSAT WAN
c. Both a & b
d. None of these
e.
45.Following are different options for setting up the Intranet, education portal or e-
commerce, etc.
a. Leased line
b. Dial Up connection
d. Radio link
46. The networks can be broadly divided into three categories namely
a. Main frame
b. Dumb terminals
c. Both a & b
d. None of these
48.TC means
a. Terminal Computer
b. Terminal Controller
c. Technical Computer
d. None of these
a. Internetwork
b. Internet
c. Network
d. None of these
e.
a. Control packet
b. Data packet
c. Both a & b
d. None of these
51.A terminal controller may be used to integrate two or more terminals for connection with
d. Both a & b
d. None of these
a. ISDN
b. Leased Line
c. Frame relay
d. All of these
e.
54.Which function allows selection of the appropriate route based on IP header information
and sends packets through this route
a. Forwarding function
b. Filtering function
c. Both a & b
d. None of these
55.Which function allows dumping of invalid packets for a specific network instead of
forwarding
a. Forwarding function
b. Filtering function
c. Both a & b
d. None of these
a. Local routing
c. Dynamic routing
d. Distributing routing
c. Both a & b
d. None of these
a. Fixed routing
b. Dynamic routing
c. Both a & b
d. Distributed routing
59.If routing information is automatically updated by routers when changes are made to the
network configuration are called
a.
b. Fixed routing
c. Dynamic routing
d. Both a & b
e. Distributed routing
60.The processing required to transferring a packet from the source host to the destination
host or to the relaying router are called
a. Fixed routing
b. Dynamic routing
c. Local routing
d. Distributed routing
e.
62.If two or more routers are connected to the same subnet, the network administration
determines which of the routers the messages should be sent to.. to eliminate this
problem._____ are used
a. MAC messages
b. ICMP messages
c. INDP messages
d. IMCP messages
e.
63.If two or more routers are available in distributed routing, which route should be selected
c. Link cost
d. Both b & c
64.If there is no any specific intention, the cost for a single link is usually set at ___
a. 1
b. 2
c. 3
d. 4
a. Distance-vector type
b. Link-state type
c. Both a & b
d. None of these
66. If there are two or more routes to reach the same destination at the same cost, which
method is applicable to determine how to select this route
c. Mixed method
67.The Mixed method remains _________ for the amount of processing required
a. Effective
b. Ineffective
c. Both a & b
d. None of these
68. A set of networks interconnected by routers within a specific area using the same routing
protocol is called
a. Domain
b. Backbone
c. Inter-domain router
d. All of these
a. Domain
b. Backbone
c. Inter-domain router
d. All of these
a. Domain
b. Backbone
c. Inter-domain router
d. All of these
a. Domain
b. Backbone
c. Inter-domain router
d. Higher-order domain
a. Operation domain
b. Backbone
d. All of these
e.
73.Routing protocol in such an internet system can be broadly divided into two types named
c. Both a & b
d. None of these
c. Both a & b
d. None of these
d. All of these
76.________ are the algorithms are available to update contents of routing tables
a. Distance-Vector Protocol
b. Link-State Protocol
c. Both a & b
d. None of these
a. RIP
c. Both a & b
d. None of these
c. Both a & b
d. None of these
a. Small
b. Large
c. Medium
d. None of these
e.
a. Complex
b. Simple
c. Both a & b
d. None of these
82.Which protocol are used in link state type routing protocol developed for use in large scale
network
c. Both a & b
d. None of these
a. Packet type
b. Packet length
c. Router ID
d. Area ID
f. Authentication data
g. Version
h. Checksum
j. All of these
b. Internal router
d. All of these
a. Intra-area routing
b. Inter-area routing
c. Inter-domain routing
d. All of these
a. Serial Line IP
b. Standard Line IP
c. Serial Link IP
d. Standard Link IP
88.________ is used mainly for connection between LANs that are remotely located from one
another
a. SLIP
b. PPP
d. None of these
e.
89. _________ is used for connection between routers or equipment that must be highly
reliable
a. SLIP
b. PPP
c. Both a & b
d. None of these
c. Both a & b
d. None of these
a. 24Mbps
b. 2 Mbps
c. 4 Mbps
d. 8 Mbps
b. 2GHz bands
c. 5 GHz bands
d. All of these
93. A hub antennae is located at a _________ from where line-of-sight can be established
with the various terminal antennae.
a. Highest point
b. Lowest point
c. Central point
d. None of these
a. 1 to 2 Mbps
b. 2 to 3 Mbps
c. 3 to 4 Mbps
d. 4 to 5 Mbps
97._______ are wireless network standard with a data rate of only 2Mbps
a. IEEE802.11a
b. IEEE802.11b
c. IEEE803.11a
d. IEEE803.11b
a. IEEE802.11a
b. IEEE802.11b
c. IEEE803.11a
d. IEEE803.11b
99.IEEE802.11a and IEEE802.11b have a distance limitation up to _____ from the access
point router
a. 1000feet
b. 100feet
c. 101feet
a. 1.4GHz
b. 2.4GHz
c. 3.4GHz
d. 4.4GHz
a. IEEE802.11g
b. IEEE803.11a
c. IEEE803.11b
d. IEEE802.11a
e.
a. User mobility
b. Device portability
c. Both a & b
d. None of these
e.
103.A user can access to the same or similar telecommunication services at different places
a. User mobility
b. Device portability
c. Both a & b
d. None of these
e.
a. Sensor
b. Mobile-phone
c. PDA
d. Embedded controller
e. Pager
g. Notebook
h. All of these
i.
105.The availability of _________ made the wireless communication popular among the
masses.
b. Digital switching
c. Both a & b
d. None of these
a. Cellular mobile
b. Cellular phone
c. Both a & b
d. None of these
a. Receiver
b. Transmitter
c. Both a & b
d. None of these
a. Use of radio
c. Both a & b
a. Modulation
b. Radiation
c. Both a & b
d. None of these
110.A transmitter and an antenna are used to ____________ the modulated signal within
radio spectrum
a. Modulate
b. Radiate
c. Both a & b
d. None of these
e.
111.In telephone system as we know that a voice with bandwidth of approximately ____
modulates the current of a telephone line
a. 2kHz
b. 3 kHz
c. 4 kHz
d. 5 kHz
a. Radio transmission
b. Reception of signals
c. Both a & b
d. None of these
a. Reused
b. Used
c. Not be used
d. Not be reused
116.The shape of cell mat not be a ___________ and depends up on the environment
a. Hexagon
b. Circle
c. Pentagon
d. Both a & b
118.Frequencies for communication may vary from very high frequency to ________
a. Medium range
b. Microwave range
c. Digital range
d. None of these
e.
a. Amplitude
b. Frequency
c. Phase modulation
d. All of these
e. All of these
a. Higher capacity
d. More robust
f. Transmission area
g. All of these
d. All of these
a. Cell sizing
d. All of these
124.In the beginning around 1980, analog cellular telephone systems were developing in
___________
a. USA
b. UK
c. Europe
d. Japan
e. ISDN compatibility
f. All of these
a. First generation
b. Second generation
c. Third generation
d. None of these
e.
a. 8.6kbps
b. 9.6kbps
c. 7.6kbps
d. 8.8kbps
129.The uplink and downlink frequencies for GSM are different and therefore a channel has
a pair of frequencies _______ apart
a. 70MHz
b. 80MHz
c. 90MHz
d. 60MHz
a. Duplex distance
b. Double distance
d. None of these
131.In a channel the separation between adjacent carrier frequencies is known as channel
separation which is _______ in case of GSM
a. 100kHz
b. 200 kHz
c. 300 kHz
d. 400 kHz
a. Telephony
c. Call forwarding
d. Caller ID
e. Call waiting
f. All of these
b. ISDN
e. All of these
a. X.25
b. X.32
c. Both a & b
d. None of these
a. Telephony or teleservices
c. Supplementary services
a. Bearer
b. Teleservices
c. Both a & b
d. None of these
e.
137.Dual tone signals are used for various control purposes via the
a. Telephone network
c. Both a & b
d. None of these
a. 150
b. 160
c. 170
d. 180
a. CCIIT
b. CCITT
c. CCCIT
d. CCTTI
a. Telephony or teleservices
c. Supplementary services
d. All of these
e. All of these
a. Mobile station(MS)
d. Operation subsystem(OSS)
e. All of these
a. Mobile station
c. Both a & b
d. None of these
c. Operation subsystem
d. All of these
a. Mobile station(MS)
c. Both a & b
d. None of these
a. BSS
b. Cellular layout
d. All of these
148.MS contains a SIM card in the form of a very _______ inside the equipment
a. Large chip
b. Small chip
c. Both a & b
d. None of these
a. Base station
b. Antennas
c. Both a & b
d. None of these
e.
a. Cell sites
b. Cell systems
c. Cell forwarding
d. None of these
a. Pentagon
b. Hexagon
c. Both a & b
d. None of these
e.
152.The size of cells in case of GSM and Personal Communication Service(PCS) are much
a. 5Kms
b. 10Kms
c. 15Kms
d. 20Kms
a. Portions
b. Sectors
c. Cell sector
d. None of these
a. RBS
b. PCS
c. GSM
d. SIM
a. Antennas
b. Signal processors
c. Amplifiers
d. All of these
e.
156.Base station may also be placed near center of cell and known as
a. Excited cell
c. Center cell
d. None of these
157.The actual cell is the _____ hexagon, with the towers at the corners
a. Red
b. Blue
158.Antenna always transmits inward to each cell and area served depends on
a. Topography
b. Population
c. Traffic
d. All of these
d. All of these
a. BTS
b. BSS
c. BSC
d. Um
a. BTS
b. BSS
d. Um interface
e. Both c & d
a. FDMA
b. TDMA
c. CDMA
d. All of these
b. 35MHz
c. 24MHz
d. 20MHz
164.The FDMA channel are further divided in time with a burst period of approximately
_______ using a TDMA technique
a. 0.277ms
b. 0.377ms
c. 0.477ms
d. 0.577ms
165.The eight burst period are grouped into a TDMA frame which forms the basic unit for
definition of
a. Physical channel
b. Logical channel
c. Both a & b
d. None of these
a. Physical channel
b. Logical channel
c. Both a & b
d. None of these
a. GSM
b. No of base station
c. No of mobile station
d. Transmitter power
a. GSM
b. No of base station
c. No of mobile station
a. BS(Base Station)
b. MS(Mobile Switch)
d. Both b & c
a. Mobile station
b. Base station
c. Transmitter station
d. None of these
a. MSCs
b. PSTN
c. ISDN
d. None of these
a. Switching
d. None of these
a. Registration
b. Handover
c. Authentication
d. Location updating
f. All of these
174.The MSC provided to establish link with other fixed networks termed as
a. Local MSC
c. Gateway MSC
d. Remote MSC
a. Interworking function(IWF)
d. SS7
e. All of these
c. Both a & b
d. None of these
c. Both a & b
d. None of these
e.
179.Subscribers all administrative information along with the current location in GSM
network including in database of HLR are
a. IMEI number
b. Directory number
c. Current city
f. All of these
180.HLR keeps the ____________ of each mobile that belongs to the MSC to which it is
interacting
a. Last location
b. First location
c. Current location
d. None of these
a. Delivery of calls
c. Both a & b
d. None of these
a. Static information
b. Dynamic information
c. Both a & b
d. None of these
c. Account status
d. All of these
184.The dynamic information is the _________ area of the mobile subscriber which is the
identity of the currently serving VLR
a. Last location
b. First location
c. Current location
a. MSCs
b. VLR nodes
c. Both a & b
d. None of these
e.
a. MSC
b. IMSI
c. TMSI
d. Roaming
e. All of these
187.In nutshell we can say that both the ___________work together to provide local
connections as well as roaming outside the local service area
a. HLR
b. VLR
c. Both a & b
d. None of these
e.
188.The operations and Maintenance Center oversees the all important for__________
a. Proper operation
d. All of these
189.Operation Subsystem also provides interface NSS via O-Interface that may be
__________
a. X.25 interface
b. X.32 interface
c. X.23 interface
e.
a. Authentication
c. Cryptographic codes
d. All of these
191.AuC is responsible for maintaining all data needed to authenticate a call and to encrypt
__________________
a. Voice traffic
b. Signaling messages
c. Both a & b
d. None of these
a. Security
b. Authentication
c. Both a & b
d. None of these
194.SIM card has a secret key for ________________ over the radio channel
a. Authentication
b. Encryption
c. Both a & b
d. None of these
e.
195.GSM network checks the __________________ of a mobile device through EIR database
b. Serial number
c. Both a & b
d. None of these
e.
a. Manufacturing devices
b. Malfunctioning devices
c. Functioning devices
d. None of these
a. Mobile station
b. Base station
c. Both a & b
d. None of these
e.
a. 890-910MHz
b. 890-915MHz.
c. 890-901MHz
d. 890-911MHz
e.
a. 935-960MHz
b. 940-970MHz
c. 945-950MHz
d. 925-960MHz
a. Addition
b. Divide
d. None of these
a. Normal burst
b. Access burst
c. Synchronization burst
e. Dummy burst
f. All of these
b. Approximately 572ms
c. Approximately 567ms
d. Approximately 578ms
a. Frequency space
b. Guard space
c. Information space
d. Bandwidth space
204.Which is a dedicated time slots within a data or bit stream which repeats after a certain
period of time
a. Frequency
b. Amplitude
c. Channel
d. Normal burst
a. Dedicated channel
b. Common channel
c. Both a & b
d. None of these
a. Base station
b. Mobile station
c. Mobile switch
d. All of these
e.
207.When a slot repeated every 4.615ms constitute a _______ channel which can be split
into several logical channel
a. Logical
b. Physical
c. Both a & b
d. None of these
208. TDMA is used to split carrier frequency of 200kHz into_______ time slots
a. 4
b. 8
c. 16
d. 24
a. 125
b. 124
c. 248
d. 247
a. 125
b. 124
c. 248
d. 247
a. Logical channel
b. Physical channel
d. None of these
e.
a. 9.6kb/s
b. 4.8kb/s
c. 2.4kb/s
d. All of these
e.
a. 120ms
b. 130ms
c. 150ms
d. 160ms
214. How many frames are included for traffic in 26TDMA frames
a. 1
b. 24
c. 25
d. 16
215.How many frames are included for Slow Associated Control Channel(SACCH) in
26TDMA frames
a. 1
b. 24
c. 25
d. 16
216.How many frames are included for currently unused in 26TDMA frames
a. 1
b. 24
c. 25
d. 16
a. CCHs
b. TCH
c. Both a & b
d. None of these
e.
218.Depending upon the task performed by the Control Channels(CCHs),they are categorized
in
d. All of these
a. Idle mode
c. Both a & b
d. None of these
a. BCCH
b. CCCH
c. DCCH
d. All of these
a.
b. BCCH
c. CCCH
d. DCCH
e. All of these
a. BCCH
b. CCCH
c. DCCH
d. All of these
a. Multiframe
b. Traffic-multiframe
c. Multiprogramming
d. None of these
224.Out of 26 frames, 24 are used for traffic, one is used for the __________ and one is
currently unused
c. BCCH
d. CCCH
a. 4.516ms
b. 4.615ms
c. 4.156ms
d. 4.165ms
a. 234.5ms
b. 233.5ms
c. 235.4ms
d. 235.3ms
b. lowerframe
c. strongerframe
d. none of these
a. Physical layer
d. All of these
229.In OSI model, the lower three layers usually terminate in the ______ but it is not true in
case of GSM
a. Another node
b. Same node
c. Two nodes
d. None of these
a. MS
b. BTS
c. BSC
d. MSC
e. All of these
231.Physical layer is the ___________ which provides transfer of bit streams over the
physical radio links through Um interface
a. Lowest layer
b. Highest layer
c. First layer
d. None of these
a. Creation of bursts
f. All of these
233.The digital modulation and security related issues such as encryption of digital data are
carried over the radio interface between ____________
a. MS
b. BTS
c. Both a & b
d. None of these
e.
234.The communication on Abis interface between _____ and BSC is established by using the
standard LAPD
a. MS
b. BTS
c. MTS
d. None of these
235.A reliable data link service is provided between _________ through Message Transfer
Part of SS7
a. BSC
b. MSC
c. Both a & b
d. None of these
e.
b. MM(Mobility management)
d. All of these
a. Location update
b. Authentication
d. Reallocation
e. All of these
f.
238.CM performs
a. Establishment
b. Maintenance
d. All of these
e.
a. Supplementary service(SS)
c. Both a & b
d. None of these
a. BSC
b. BSS
c. MSC
d. MTS
241.The radio resource management is used to establish physical connections over the call-
related signaling and traffic channels between the ______________
a. BSC
b. BSS
c. MS
d. Both b & c
242.The RR layer is the part of RR layer is implemented in the BTS to provide functions
a. BTS
b. BSC
c. MSC
d. Both a & b
a. Handover
b. Handoff
c. Both a & b
d. None of these
244.Which uses signal strength measurements and cell congestion information to determine
when a handoff should occur
a. MSC
b. BSS
c. BSC
d. Both a & b
245.Handoff notifications are sent to respective ____ which in turn forward them to HLRs
a. VLRs
b. VLCs
c. VCDs
d. LCDs
246.The mobility management sublayer on the _____ of the RR is terminated at the MSC
a. Low
b. Top
c. Center
d. First
247.MM is used to
a. Establish
b. Maintain
e. All of these
a. first-to-end
b. end-to-end
c. end-to-first
d. first-to-first
c. Both a & b
d. None of these
250.MAP is used between _________in the form of query and response messages
a. MSC
b. VLR
c. HLR
d. AuC
e. All of these
251.____________ Together with the MSC. Provide the call routing and roaming capabilities
of GSM where a subscriber can roam nationally and even internationally
a. HLR
b. VLR
c. CLR
d. Both a & b
b. IMSI number
c. TMSI number
d. MSRN
c. Subscriber number
d. All of these
c. Subscriber number
d. All of these
a. MSISDN Number
b. IMSI Number
c. TMSI Number
d. MSRN
257.It sits inside SIM card, which can be carried out anywhere and can be used in any MS
a. MSISDN Number
b. IMSI Number
c. TMSI Number
d. MSRN
d. All of these
259.Which is used in the place of the IMSI for the definite identification and addressing of
a. MSISDN Number
b. IMSI Number
c. TMSI Number
d. MSRN
260.In TMSI nobody can determine the identity of the subscriber by listening to the
__________
a. Video channel
b. Radio channel
c. Audio channel
d. None of these
e.
261.GSM used the _______ byte TMSI for local subscriber identification
a. 2
b. 4
c. 6
d. 8
a. MSISDN Number
b. IMSI Number
c. TMSI Number
d. MSRN
c. The identification of the current MSC along with the subscriber number(SN)
d. All of these
c. Both a & b
d. None of these
265.___________ becomes necessary when mobile moves from area of one BSC into another
area of the same or into another BSC
a. Handoff
b. Handover
c. Haddon
d. Handwork
a. Intra-cell handover
e. All of these
267.Which involve the transfer of connections from one channel to another channel on the
same BTS
a. Intra-cell handover
268.Which involve the transfer of the connection from one BTS to another BTS on the same
BSC
a. Intra-cell handover
269.The connections is transferred between BTS belonging to two different BSCs within one
MSC is called
a. Intra-cell handover
270.Which involve the transfer of a connection to a BTS between two cells within another
MSC
a. Intra-cell handover
a. Internet
b. Internetwork
c. Network
d. Internetworking
a. Internet
b. Internetwork
c. Network
d. Internetworking
a. SMTP
b. PPP
c. TCP/IP
d. NNTP
a. Gateway
b. Router
c. TCP/IP
d. Both a & b
275.If single computer network is divided into segments and router are added between them
it forms an
b. Internetwork
c. Network
d. Internetworking
276.Which was used as original term for an internetwork which meant a method for
connecting networks with disparate technologies
a. Catenet
b. Bridge
c. PANs
d. Novell netware
b. Novell Netware
c. Both a & b
d. None of these
a. Different
b. Same
d. None of these
a. internet
b. Internet
c. Both a & b
d. None of these
a. internet
b. Internet
c. Both a & b
d. None of these
a. TCP
b. UDP
c. IP
d. Both a & b
a. TCP
b. UDP
c. IP
d. Both a & b
a. IP
b. UDP
c. TCP
d. None of these
a. 0 to 245
b. 0 to 254
c. 0 to 255
d. 0 to 265
e.
286.__________ is used for every computer needs one protocol stack for communicating on
the Internet
a. Protocol stack
c. Transmission protocol
d. None of these
287.Which protocol layer uses the protocols are WWW, HTTP, FTP, SMTP, e-mail etc
d. Hardware Layer
288.Which protocol uses TCP routes to an application on a computer by use of a port number
d. Hardware Layer
d. Hardware Layer
290.Which contains network interface cards, modems for phones or wireless lines for
converting binary packet data to network signals and vice versa
d. Hardware Layer
a. Bytes of data
b. Bits of data
c. Both a & b
d. None of these
292.Where is the TCP layer is situated in the application layer in the protocol stack
b. Top
c. Center
d. None of these
a. Source computer
b. Destination computer
c. Both a & b
d. None of these
a. Textual
b. Not textual
c. None of these
d.
a. 16bit
b. 16byte
c. 32bit
d. 32byte
a. 80
b. 25
c. 23
d. 20/21
a. 25
b. 23
c. 20/21
d. 27960
b. 23
c. 20/21
d. 27960
a. 25
b. 23
c. 20/21
d. 27960
a. 25
b. 23
c. 20/21
d. 27960
301.TCP is ______________
a. Connection-oriented
b. Reliable
c. Both a & b
d. None of these
e.
302.IP is ___________
a. Connectionless
b. Unreliable
c. Both a & b
d. None of these
e.
303.IP does not ensure movement of a packet to its destination and have no knowledge of
__________
a. Port numbers
b. Connections
d. None of these
e.
a. May
b. May not
d. None of these
e.
306.SMDS is a packet switched, high speed, connectionless public data service that extends
d. All of these
a. IEEE 802.5
b. IEEE 802.4
c. IEEE 802.6
d. IEEE 802.2
b. Broadband ISDN(B-ISDN)
c. Both a & b
d. None of these
a. 1.5Mbit/s
b. 45Mbits/s
c. 1.6Mbit/s
d. 46Mbit/s
e.
a. 1.5Mbit/s
b. 45Mbits/s
c. 1.6Mbit/s
d. 46Mbit/s
312.SMDS network also planned to link B-ISDN and SONET OC3 with a data rate of
a. 1.5Mbit/s
b. 45Mbits/s
c. 155Mbit/s
d. 1.9Mbit/s
313.SMDS is a
a. Data service
b. Telephone service
c. Frame service
d. Video service
314.SMDS is a
a. Technology
b. Protocol
c. Both a & b
d. None of these
a. Continuous traffic
b. Finite traffic
c. Bursty traffic
d. All of these
a. Continuous traffic
b. Finite traffic
c. Bursty traffic
d. All of these
a. Country code
b. Area code
c. Subscriber code
d. All of these
a. Only area
b. Only nationally
c. Internationally
d. None of these
e.
320.Address of source and destination in SMDS both consists of 4 bit code followed by a
telephone no of max.
a. 12 decimal digits
c. 15 decimal digits
d. 20 decimal digits
e.
c. Both a & b
d. None of these
a. 53 octets
b. 56 octets
c. 58 octets
d. 55 octets
e.
a. IEEE802.3
b. IEEE802.5
c. FDDI
d. All of these
a. Copper
b. Fiber media
c. Both a & b
d. None of these
325.In SMDS, with a tick every 10msec user can send_________ on the average
a. 100,000 bytes/sec
b. 10,000 bytes/sec
c. 100,0000 bytes/sec
d. 100,000,00 bytes/sec
a. SNMP
b. Scalability
c. Screening
d. Simple
e.
327. Which is a network protocol that is based on UDP and is a component of the component
of the Internet Protocol Suite, defined by IETF(Internet Engineering Task Force)
a. SNMP
b. Scalability
c. Screening
d. Multicasting
e.
328.The user can have access to high speed lines ______ connected to MAN
a. 32Mbits/s
b. 33Mbits/s
c. 34Mbits/s
d. 35Mbits/s
a. 151Mbits/s
b. 152Mbits/s
c. 154Mbits/s
d. 155Mbits/s
a. 139Mbits/s
b. 140Mbits/s
c. 155Mbits/s
d. 134Mbits/s
a. 34Mbits/s
c. 10Mbits/s
d. 16Mbits/s
e. 25Mbits/s
a. LAN
b. MAN
c. WAN
d. PAN
a. Ethernet
c. Both a & b
d. None of these
334.SMDS networks have many underlying devices for supporting high-speed service are
b. Carrier equipment
d. All of these
a. PCs(Personal computers)
b. Intermediate nodes
c. Terminals
d. All of these
e.
a. Multiplexers
b. Modems
c. Routers
337.PDUs contain
a. Source address
b. Destination address
c. Both a & b
d. None of these
a. Group addressing
b. Security features
c. Both a & b
d. None of these
b. Address screening
c. Both a & b
d. None of these
a. Timesharing connection
b. Terminal connection
c. Both a & b
d. None of these
a. Low cost
b. High cost
c. Medium cost
a. Speed
b. Matching
c. Speed matching
d. None of these
344.In X.25 DTEs are not required to use the same line speed because of the
a. Store
d. All of these
345. In X.25, A host connected at 56kbps and communicating with numerous remote sites
can be linked with cheaper______ lines
a. 18.2kbps
b. 19.2kbps
c. 20.2kbps
d. 22.2kbps
a. Layer 2 to Layer 3
b. Layer 1 to Layer 2
c. Layer 1 to Layer 3
d. Layer 3 to Layer 2
347.Based on X.25 rules, how many logical channel can be set on a single physical line
a. 256
b. 16
c. 4096
d. 2556
e.
348.To enable control of 4096 logical channels in X.25, there are ____ channel groups
a. 256
c. 4096
d. 2556
a. 256
b. 16
c. 4096
d. 2556
c. Both a & b
d. None of these
351.X.25 is a
a. Protocol
b. Data service
c. Telephone service
d. Technology
a. 1975
b. 1976
c. 1977
d. 1978
a. A node
b. A user device
c. Both a & b
d. None of these
a. DTE
c. Both a & b
d. None of these
355.A terminal of 1.2kbit/s can communicate with host computer at _______ through the
packet switched network
a. 9600bits/s
b. 8600bits/s
c. 7600bits/s
d. 6600bits/s
356.The transmission speed of sender should be ___________ as that of receiver in the X.25
a. Same
b. Different
c. Both a & b
d. None of these
a. Connectionless
b. Connection-oriented
c. Both a & b
d. None of these
a. Control packet
b. Data packet
c. Both a & b
d. None of these
e.
a. Frame field
b. Data field
c. Information field
a. 64bytes to 128bytes
c. 64bytes to 256bytes
d. 32bytes to 64bytes
d. None of these
d. All of these
a. First
b. Second
c. Third
d. Fourth
d. QLLC
a. 0 and 1025
b. 0 and 125
c. 0 and 256
d. 0 and 1023
e.
367.The device which splits data into frames as well as combines frames into data is referred
as
b. FDLC
c. HDLC
d. DLCI
368.Frame relay indicates network congestion using two flags namely ________ bits in data
frames
c. Both a & b
d. None of these
369.Cell relay is data transmission services that uses transmission technology referred to as
b. BTM
c. STM
d. DTM
a. Cell
b. Frame
c. Relay
d. Cell relay
a. High-speed transmission
c. Both a & b
d. None of these
b. High cost
c. Both a & b
d. None of these
a. One
b. Two
c. Three
d. Four
374.The part that corresponds to second layer, that is, data link layer is referred to as
a. DLC layer
b. ATM layer
c. STM layer
d. Protocol layer
a. Virtual Channels(VCs)
b. Virtual Paths(VPs)
c. Both a & b
d. None of these
a. Frames
b. Cells
c. Relay
d. Protocol
377.VP is a bundle of
a. VCs
c. VCI
d. VIP
378.Identifiers are called ___________________ are used to identify VPS and VCs
a. VCIs
b. VIPs
c. Both a & b
d. None of these
a. Two VP
b. Two VC
c. VP and VC
d. VP and VCI
380.ATM is an
a. International Telecommunication
b. International Telecommunication-Union
a. Connectionless
b. Interconnected
c. Connection oriented
d. None of these
382.In today ATM, separate networks are used to carry _________ information mostly
a. Voice
b. Video
c. Data
d. All of these
b. Bursty
c. Discontinuous
d. None of these
a. 52bytes
b. 53bytes
c. 54bytes
d. 55bytes
a. Payload(48bytes)
b. Payment
c. Payroll
d. None of these
a. High speed
b. Low-delay multiplexing
c. Switching networks
d. All of these
387.ATM is specifically designed as ________ technology for voice, video, and data
a. Single
b. Double
c. Multiple
d. None of these
a. Different speeds
b. Traffic types
d. All of these
389.ATM cells coming from a user are guaranteed delivery at the other end with a
b. Low delay
c. Both a & b
d. None of these
a. The transport speeds of most ATM applications are most often 155Mbps and
622Mbps
b. ATM is a flexible service made possible by the size of the packets (cells).
c. The small cell size allows a variety of applications to run on ATM networks
including voice, video and data
d. All of these
a. Circuit-switched voice
b. Circuit-switched data
c. Low-speed packet
d. High-speed packet
e. All of these
a. Transmission service
b. Transport service
c. Transfer service
d. None of these
a. CCITT
b. ITU
c. Both a & b
d. None of these
394.Narrow band ISDN is a digital service where the transport speeds are ______ (T1) or less
a. 1.533Mbps
c. 1.555Mbps
d. 1.552Mbps
395.The range of speeds for the broadband ISDN services usually range from ______ to the
Gigabit range
a. 24Mbs
b. 25Mbs
c. 26Mbs
d. 27Mbs
e.
397.BRA affords an ISDN user with simultaneous access to two _____ data channels
a. 32kbps
b. 64kbps
c. 128kbps
d. 256kbps
a. Terminal Adapters(TAs)
b. ISDN Bridges
c. ISDN Routers
d. All of these
a. Quality
b. Economy
c. Availability
d. All of these
a. High rate-of-error
b. Low rate-of-error
c. Both a & b
d. None of these
e.
a. A-channel
b. B-channel
c. C-channel
d. F-channel
a. Voice
b. Data
c. Both a & b
d. None of these
a. 12Kbps
b. 14Kbps
c. 16Kbps
d. 18Kbps
404.The D-channel in BRA is used for sending and receiving signal between
a. User devices
b. ISDN
c. Both a & b
d. None of these
a. 144kbit/s
b. 145kbit/s
d. 147kbit/s
a. I.430
b. I.420
c. I.440
d. I.450
c. Both a & b
d. None of these
a. I.420
b. I.421
c. I.422
d. I.423
409.The CCITT eventually was reformed in to the group which is now called the ________
a. ITU-T
b. UIT-T
c. TIU-T
d. TUI-T
a. RJ-45 type plug and socket uses unshielded twisted pair cable
c. Both a & b
d. None of these
c. Both a & b
d. None of these
e.
a. One , two
b. Two, three
d. Three, two
a. 62kbps
b. 63kbps
c. 64kbps
d. 65kbps
a. 20+D
b. 30+D
c. 40+D
d. 50+D
a. 62kbps
b. 63kbps
c. 64kbps
d. 65kbps
a. Microprocessor
b. RAM
c. ROM
d. None of these
a. CISC
b. RISC
c. All of these
d. None of these
a. System Bus
b. CPU
c. Memory Unit
d. All of these
a. Address Bus
b. Data Bus
c. Control Bus
d. All of these
a. Hand
b. Heart
c. Brain
d. Leg
a. MOS
b. ALU
c. CPU
d. All of these
a. Register unit
b. Arithmetic and logical unit
10. Which is an integral part of any microcomputer system and its primary purpose is to hold
program and data:
a. Memory unit
b. Register unit
c. A and B
d. None of these
a. Four
b. Three
c. Two
d. One
a. Processor memory
b. Main memory
c. Secondary memory
d. All of these
14. Which system communicates with the outside word via the I/O devices interfaced to it:
a. Microprocessor
b. Microcomputer
c. Digital computer
d. All of these
a. CPU
b. ALU
c. RU
d. None of these
a. Digital computer
b. Micro computer
c. A and B
d. None of these
a. Four
b. Five
c. Six
d. Three
18. The___ was very successful in the calculator market at that time:
a. 8004
b. 5006
c. 4004
d. All of these
20. How many microprocessor in the market during the same period:
a. 6
a. Low-cost
b. Slow-cost
c. Low-Output
d. All the above
a. 1974-1976
b. 1974-1978
c. 1974-1972
d. None of these
a. 4-bit
b. 8-bit
c. 16-bit
d. 64-bit
a. CRT
b. TTL
c. Both A and B
d. None of these
a. PMOS
b. NMOS
c. HMOS
d. All the above
a. 1979-1981
b. 1979-1980
c. 1978-1979
d. 1978-1980
a. 8 bit
b. 4 bit
c. 16 bit
d. 64 bit
a. 8084 A
b. 8086 A
c. 8085 A
d. 8088 A
a. 1979-1980
b. 1981-1995
c. 1995-2000
d. 1974-1980
34. The fourth generation of microprocessor came really as a soon boon to the_____:
a. Computing environment
b. Processing environment
c. Hot environment
d. All of these
35. How many bit microprocessor in the era marked beginning of fourth generation:
a. 4 bit
b. 8 bit
c. 16 bit
d. 32 bit
36. They were fabricated using a low power version of the HMOS technology called____:
a. HSMOS
b. HCMOS
c. HSSOM
d. None of these
a. 2 bit-RISC
b. 4 bit-RISC
c. 8 bit-RISC
d. 32 bit-RISC
a. MC 88100
b. MC 81100
c. MC 80100
d. MC 81000
a. 1974-1978
b. 1979-1980
c. 1981-1985
d. 1995-till date
40. The growth of vacuum tube technology has been listed as follow:
a. 1946-1957
b. 1958-1964
c. 1985-1999
d. None of these
a. 1946-1957
b. 1958-1964
c. 1985-1999
d. None of these
a. 1956 on words
b. 1965 on words
c. 1978 on words
d. 1978 on words
a. Till 1971
b. Till 1970
a. 1994-1995
b. 1971-1977
c. 1972-1978
d. None of these
46. Which is most commonly measured in terms of MIPS previously million instruction per
second:
a. Microprocessor
b. Performance of a microprocessor
c. Assembly line
d. None of these
a. VLSI
b. Motorola
c. Intel
d. Zilog
d. None of these
50. Which process information at a much faster rate than it can retrieve it from memory:
a. ALU
b. Processor
c. Microprocessor
d. CPU
51. _____ memory system which is discussed later can improve matters in this respect:
a. Data memory
b. Cache memory
c. Memory
d. None of these
a. Assembly line
b. Pipelining
c. Cache
d. None of these
53. The time taken for all stages of the assembly line to become active is called the:
a. Tp
55. Ti is the time taken for the ith stage and there are n stages in the:
a. Throughput
b. Assembly line
c. Both A and B
d. None of these
56. Who is the determined by the time taken by the stages the requires the most processing time:
a. Clock period
b. Flow through
c. Throughput
d. None of these
a. Clock period
b. Pipelining
c. Throughput
d. Flow through
a. Mc6800
b. 8080
c. IMP-8
d. RPS-8
a. 4-bit
b. 8-bit
c. 16-bit
d. 32-bit
a. 30%
b. 40%
c. 50%
d. 60%
a. F-6
b. F-8
c. Both A and B
d. None of these
a. 3
b. 4
c. 5
d. 6
a. Intel 4004
b. Motorola 68020
c. Intel8008
d. None of these
a. Speed
b. Memory size
66. The evolution of the 4 bit microprocessor ended when Intel released in:
a. 4004
b. 8008
c. 40964
d. 4040
67. How many bit microprocessor still survives in low-end application such as microwave ovens
and small control system:
a. 4 bit
b. 16 bit
c. 32 bit
d. 64 bit
a. 4 bit
b. 16 bit
c. 32 bit
d. 64 bit
a. 1971
b. 1973
c. 1999
d. 1988
a. 8080
b. 4004
c. Both A and B
d. None of these
a. 1971
b. 1973
c. 1999
d. 1988
a. Motorola corporation
b. Fairchild
c. Both A and B
d. None of these
74. Which Microprocessor producer continue successfully to create newer and improved version
of the microprocessor:
a. Intel
b. Motorola
c. Both A and B
d. None of these
75. Motorola has declined how many % share of the microprocessor market to a much smaller
share:
a. 50%
b. 55%
c. 48%
d. 51%
76. Which year Intel corporation introduced an updated version of the 8080- the 8085:
77. In 1977 which corporation introduced an updated version of the 8080- the 8085:
a. Motorola
b. Intel
c. Rockwell
d. National
a. 4 bit
b. 8 bit
c. 32 bit
d. 64 bit
a. 8088
b. 8086
c. 8085
d. All of these
a. 1965
b. 1978
c. 1981
d. 1999
a. IBM
b. CRT
c. PMN
d. SPS
85. Who was introduce the 80286 microprocessor updated on 8086,in 1983:
a. Intel
b. Motorola
c. Fairchild
d. None of these
a. Z-8
b. 8080
c. 8000
d. None of these
a. IMP-4
b. IMP-8
a. RPS-4
b. RPS-6
c. RPS-8
d. All of these
a. Z-2
b. Z-4
c. Z-6
d. Z-8
a. On Processor
b. On Mother Board
c. On Memory
d. All of these
a. On Processor
b. On Mother Board
c. On Memory
d. All of these
a. 4 GB
b. 128 GB
c. 256 GB
d. 512 GB
a. Pentium II
b. Pentium Pro
c. Pentium MMX
d. Pentium Xeon
a. 1.0 GHz
b. 1.1 GHz
c. 1.2 GHz
d. 1.3 GHz
a. Apple
b. IBM
c. Motorola
d. All of these
a. DEC
b. IBM
c. Motorola
d. Intel
a. Debian
b. BSD Unix
c. Gentoo & Red Hat Linux
d. Windows
a. 2
b. 3
c. 4
d. 6
a. RISC
b. CISC
c. PISC
d. A and B
a. CPU
b. ALU
c. MU
d. None of these
a. Translation
b. Rotation
c. Scaling
d. All of these
a. Shear
b. Reflection
c. Both a & b
d. None of these
3. The transformation in which an object is moved in a minimum distance path from one position to another is
called
a. Translation
b. Scaling
c. Rotation
d. Reflection
e.
4. The transformation in which an object is moved from one position to another in circular path around a
specified pivot point is called
a. Translation
b. Scaling
c. Rotation
d. Reflection
5. The transformation in which the dimension of an object are changed relative to a specified fixed point is
called
a. Translation
b. Scaling
c. Rotation
d. Reflection
6. The selection and separation of a part of text or image for further operation are called
b. Shear
c. Reflection
d. Clipping
a. Selection
b. Separation
c. Clipping
d. None of these
a. Point
b. Segment
c. Parameter
d. None of these
a. One segment
b. Two segment
c. Several segments
d. None of these
a. Size, visibility
b. Start position
c. Image transformation
d. All of these
a. Change
b. Control
c. Print
d. None of these
e.
a. Segmentation table
b. Segment name
c. Operation
d. None of these
e.
a. Segment name
b. Segment size
c. Array
d. None of these
a. 1
b. 0
c. 2
d. 3
b. Deletion of segments
d. None of these
a. Easier
b. Difficult
c. Higher
d. None
a. Image transformation
b. Morphing
c. Clipping
18.Which attributes of image transformation change the size of an image corresponding to the x-axis and y-
axis
a. SCALE-X
b. SCALE-Y
c. Both a & b
d. None of these
19.Which attributes of image transformation change the position of image corresponding to the x-axis and y-
axis
a. TRANSLATE-X
b. TRANSLATE-Y
c. Both a & b
d. None of these
e.
a. TRANSLATE-X
b. TRANSLATE-Y
c. Both a & b
d. None of these
a. ROTATE-X
b. ROTATE-Y
c. Both a & b
d. None of these
22.The graphics method in which one object is transformed into another object are called
a. Clipping
b. Morphing
c. Reflection
d. Shear
c. Both a & b
d. None of these
e.
a. Square
b. Polygon
c. Rectangle
d. None
a. Edges
b. Vertices
c. Line
d. None of these
a. Edges
b. Vertices
c. Line
d. None of these
a. One
b. Two
c. Three
d. Four
a. Convex polygon
b. Concave polygon
c. Both a & b
d. None of these
a. Convex polygon
b. Concave polygon
c. Both a & b
d. None of these
30.If a line joining any two of its interior points lies not completely inside are called
a. Convex polygon
b. Concave polygon
c. Both a & b
d. None of these
e.
a. Convex polygon
b. Concave polygon
c. Both a & b
d. None
32. If the visit to the vertices of the polygon in the given order produces an anticlockwise loop are called
a. Negatively oriented
b. Positively oriented
c. Both a & b
d. None of these
e.
33.If the visit to the vertices of the polygon in the given order produces an clockwise loop are called
a. Negatively oriented
b. Positively oriented
c. Both a & b
d. None of these
34.Which things are mainly needed to make a polygon and to enter the polygon into display file
a. No of sides of polygon
b. Vertices points
d. None of these
c. Both a & b
d. None
36.Which approaches are used for determine whether a particular point is inside or outside of a polygon
a. Even-odd method
c. Both a & b
d. None of these
e.
37.The transformation that produces a parallel mirror image of an object are called
a. Reflection
b. Shear
c. Rotation
d. Scaling
a. Reflection
b. Shear
c. Rotation
d. Scaling
39.The process of mapping a world window in world coordinate system to viewport are called
a. Transformation viewing
b. View Port
c. Clipping window
40.In which transformation the shape of an object can be modified in x-direction ,y-direction as well as in both
the direction depending upon the value assigned to shearing variables
b. Shearing
c. Rotation
d. Scaling
41.The process of extracting a portion of a database or a picture inside or outside a specified region are called
a. Translation
b. Shear
c. Reflection
d. Clipping
42.The rectangle portion of the interface window that defines where the image will actually appear are called
a. Transformation viewing
b. View port
c. Clipping window
b. Clipping window
d. None of these
44.The rectangle space in which the world definition of region is displayed are called
d. None of these
d. None of these
e.
b. Reflection
c. Clipping
d. Clipping window
a. curve clipping
b. point clipping
c. polygon clipping
d. All of these
48.A composite transformation matrix can be made by determining the ________of matrix of the individual
transformation
a. Addition
b. Subtraction
c. Product
d. None of these
49.Each successive transformation matrix _________ the product of the preceding transformation
a. pre-multiples
b. post-multiples
c. both a & b
d. none of these
a. Composition of matrix
b. Concatenation of matrix
d. None of these
51.The alteration of the original shape of an object, image, sound, waveform or other form of information are
called
a. Reflection
b. Distortion
d. None of these
a. Additive
b. Subtractive
c. Multiplicative
d. None of these
a. Additive
b. Subtractive
c. Multiplicative
d. None of these
e.
b. Multiplicative
c. None of these
d. None of these
12. Raster graphics are composed of
a. Pixels
b. Paths
c. Palette
d. None of these
13. Raster images are more commonly called
a. Pix map
1. ______is a flexible strip that is used to produce smooth curve using a set of point
a. Sp line
b. Scan-line method
c. Depth-sorting method
d. None of these
2. The types of sp line curve are
a. Open sp line
b. Closed sp line
c. Both a & b
d. None of these
a. Simple to compute
c. Both a & b
d. None of these
b. X=a0,y=b0,z=c0
c. F(t)=0,g(t)=0,h(t)=0
d. None of these
a. 1 and 2
b. 1 and 10
c. 0 and 1
d. 0and 3
6. The surfaces that is blocked or hidden from view in a 3D scene are known as
a. Hidden surface
b. Frame buffer
c. Quad tree
d. None of these
7. The problem of hidden surface are
c. Both a & b
d. None of these
c. Both a & b
d. None of these
a. 1
b. 2
c. 3
d. 4
b. image-space method
c. Both a & b
d. None of these
11.The method which is based on the principle of comparing objects and parts of objects to each other to find
which are visible and which are hidden are called
a. Object-space method
b. image-space method
c. Both a & b
d. None of these
12.The method which is based on the principle of checking the visibility point at each pixel position on the
projection plane are called
a. Object-space method
b. image-space method
c. Both a & b
d. None of these
d. All of these
a. Depth comparison
c. subdivision method
d. back-face removal
a. 1995
b. 1974
c. 1945
a. Simplest algorithm
b. Complex algorithm
c. Largest algorithm
d. None of these
17.Which is a tree type of data structure in which every internal node has at most four children
c. Quad tree
d. None of these
a. Wylie
b. Evans
c. Cat mull
d. Both a & b
19.The array are used with scan line coherence algorithm are
c. Both a & b
d. None of these
a. Top to bottom
b. Bottom to top
c. Both a & b
d. None of these
a. 1972 by Newell
b. 1972 by Evans
b. Priority algorithm
c. Both a & b
d. None of these
a. Polygon
b. Frame buffer
c. Depth buffer
d. None of these
a. Video
b. Animation
c. Super sampling
d. None of these
a. Not sequence
b. Defined sequence
c. Both a & b
d. None of these
26. When sound is included in the animation, it become
a. Audio
b. Video
c. Both a & b
d. None of these
27. Many online animation tools are used to create animation in the form of
a. JPEG image
b. PDF image
c. GIF image
a. Macromedia flash
b. GIF works
c. Both a & b
d. None of these
29.To produce the motion in the image by placing the elements of the image on different location ,which
software are used
a. Macromedia flash
b. GIF works
c. Both a & b
d. None of these
c. Ray tracing
d. None of these
31.Which type of quad tree can be defined as an adaptation of a binary tree represented two dimensional point
data
32.Which type of quad tree is specifically used to store lines rather than points
33.Which quad tree defines a partition of space in two dimension by dividing the region into four equal
quadrants, sub quadrants and so on
a. Hand
b. Computer assistance
c. Both a & b
d. None of these
a. One part
b. Two parts
c. Three parts
d. Four parts
a. Traditional animation
b. Computer animation
c. Both a & b
d. None of these
a. 2D computer animation
b. 3D computer animation
c. Both a & b
d. None of these
38.The depth sorting method reforms surfaces sorting in________ order of depth
a. Increasing
b. Decreasing
c. Both a & b
d. None of these
b. Stair-casing
c. Both a & b
d. None of these
b. 3D picture or object
c. Both a & b
d. None of these
b. 3D picture or object
c. Both a & b
d. None of these
42.How many data elements for each region in quad-tree data structure
a. 2
b. 4
c. 6
d. 8
43.How many data elements for each region in octree data structure
a. 2
b. 4
c. 6
d. 8
a. Fractals
b. Quad-tree
c. Rendering
d. None of these
b. Gosling in 1962
c. Mandelbrot in 1974
d. Mandelbrot in 1979
d. All of these
47.A process with the help of which images or picture can be produced in a more realistic way is called
a. Fractals
b. Quad-tree
c. Rendering
d. None of these
48.For which purpose ,one needs to apply natural light effects to visible surface
a. Fractals
b. Quad-tree
c. Rendering
d. None of these
a. Transparency
b. Visible-surface detection
d. All of these
50. Ray-tracing is an extension of
a. Ray calling
b. Ray casting
c. Ray sampling
d. None of these
51.A fast and simple method for rendering an object with polygon surface is
b. Flat shading
c. Both a & b
d. None of these
a. Mouse
b. Graphic tablet
c. Joystick
c. Both a & b
d. None of these
c. Both a & b
d. None of these
4. The interactive computer graphics involves________ way communication b/w computer and the user
a. One
b. Two
c. Three
d. four
c. Both a & b
d. None of these
6. User can make any change on image with the use of
a. Non-interactive graphics
b. Interactive graphics
c. Both a & b
d. None of these
a. Political
8. CAD means
d. None of these
9. DTP means
d. None of these
b. In a shorter time
c. In a larger time
d. Both a & b
a. One
b. Two
c. Three
d. four
b. A television monitor
d. All of these
c. Both a & b
14.The image is passed repeatedly to the monitor _____in order to maintain a steady picture on the screen
a. 25 times a second
b. 30 times a second
d. None of these
15.To store black and white images ,black pixels are represented by________ in the frame buffer and white
pixels by_______
c. Both a & b
d. None of these
a. 64bytes
b. 32bytes
c. 128bytes
d. 96bytes
a. TV monitor
b. Video signal
c. Electronics signal
d. None of these
b. Segment
c. Point
d. None of these
19.Which graphics application provides a proper dialogue box to help the user
a. MS excel
b. MS Paint
d. None of these
a. Window
b. View port
c. Display
d. None of these
d. All of these
22.The movement of different attributes of image would make the image dynamic and such a dynamic effect is
termed as ________
a. Picture
b. Animation
c. Painting
d. None of these
b. Keyboard
d. None of these
24.Which method are used to get and set the position of a pixel, object or text in active area of a desktop
a. Drugging method
c. Sketching method
a. X max ,y max
c. Xmax/3,ymax/3
d. None of these
26.The operation that is used for repositioned the object are called
b. Gravity field
c. Dragging
d. None of these
27.Which method are used to construct and position the straight lines, arcs and circles, etcs
b. Gravity field
c. Dragging
d. None of these
b. Gravity field
c. Dragging
d. None of these
a. Scale
b. Scalar
c. Vector
d. None of these
30. The division displayed on screen into row and columns is known as
b. Gravity field
c. Dragging
d. Grid
a. Monitor
d. None of these
a. Printing a map
c. Both a & b
d. None of these
a. Wet
b. Dry
c. Both a & b
d. None of these
a. Cartage
b. Toner
c. Both a & b
d. None of these
a. Small droplets
b. large droplets
c. Both a & b
d. None of these
a. Fast
d. None of these
a. Low cost
b. Performance
c. Both a & b
d. None of these
d. None of these
40. The LCD projector is the output device that is connected to the
a. Monitor
b. LCD
c. CPU
d. None of these
41.The size of the projected contents in LCD projector depends on the distance between
d. None of these
42.An LCD projector displays the contents in ________ manner than a simple monitor
a. Less flexible
b. More flexible
c. Inflexible
d. None of these
43. How many types of LCD projector
a. 1
c. 3
d. 4
d. None of these
a. Floor
b. Roof
c. Corner
d. None of these
46.The roof mounted projector can connect two or more computers or laptops in______
a. Serial
b. Parallel
c. Both a & b
d. None of these
47. The roof mounted projector are also enabled to take
a. Computer data
b. Printing data
c. Both a & b
d. None of these
48.The roof mounted projector takes computer data via a cable through
a. Serial port
b. Parallel port
c. Both a & b
d. None of these
49. The roof mounted projector are Bluetooth
a. Enabled
c. Both a & b
d. None of these
a. Flat
b. Curved
c. Both a & b
d. None of these
a. Input device
b. Output device
c. Both a & b
d. Neither input nor output
a. Computation
c. Both a & b
d. None of these
a. LCD monitor
b. LED monitor
c. Both a & b
d. None of these
a. Light pen
b. Monitor
c. Projector
d. None of these
55.The voice recognition system takes the command from the user in the form of
a. Writing
c. Both a& b
d. None of these
a. Machine code
b. Byte code
c. Electrical signal
d. None of these
57. A joystick is a
c. Both a & b
d. None of these
a. Pen
b. Stick
c. Microphone
d. None of these
a. Typing
b. Video games
c. Voice
d. None of these
60.The joystick often has _____ fire buttons to trigger some kind of action
a. One
b. More
c. Both a & b
d. None of these
61.In which year ,mostly modern joystick use a USB interface for connection to the personal computer
a. 2005
c. 2006
d. 2008
c. Both a & b
d. None of these
b. User can select objects on the display screen by pointing to object with the pen
c. Both a & b
d. None of these
64. A wireless mouse works on
d. None of these
a. One
b. Two
c. Three
d. None of these
d. None of these
c. Both a & b
d. None of these
b. 2
c. 3
d. 4
a. Standard
c. Thumb sized
d. numeric
e. all of these
70.Which are used to achieve the predetermined orientations and alignments of the objects
a. Constraints
b. Grid
c. Gravity field
d. None of these
a. Horizontal alignment
b. Vertical alignment
c. Both a & b
d. None of these
1. A technique by which the vertical and /or horizontal scan frequency of video signal can be changed for
different purpose and applications is called
a. Scan conversion
b. Polygon filling
2. The method which perform the scan conversion by using large number of delay cells are called
a. Analogue method
b. Digital method
c. Complex method
d. None of these
a. Normal method
b. Buffered method
d. None of these
a. Normal method
b. Buffered method
d. None of these
a. Same speed
b. Different speed
c. Both a & b
d. None of these
d. None of these
b. Point
c. Graphics
a. One point
b. Two points
c. Three points
d. Four points
a. Polygon filling
b. Polygon flow
c. Aliasing
d. None of these
a. Two
b. One
c. Three
d. Four
11. The algorithm used for filling the interior of a polygon is called
d. None of these
c. Both a & b
d. None of these
13.If the pixel is already filled with desired color then leaves it otherwise fills it. this is called
d. None of these
a. Midpoint
b. Point
c. Line
d. None of these
a. Aliasing
b. Anti aliasing
c. Both a & b
d. None of these
b. Anti aliasing
c. Sampling
d. None of these
18.Two basic technique for anti aliasing in ray tracing algorithm are
d. None of these
a. Staircase
b. Unequal brightness
c. Super sampling
d. All of these
a. Animation
b. Simple object
c. Complex object
d. All of these
b. Higher
c. Medium
d. None of these
a. Lower
b. Higher
c. Medium
d. None of these
b. Simple object
d. All of these
a. color
b. persistence
c. both a & b
d. none of these