Вы находитесь на странице: 1из 23

1.

When determining the efficiency of algorithm, the space factor is measured


by
a. Counting the maximum memory needed by the algorithm
b. Counting the minimum memory needed by the algorithm
c. Counting the average memory needed by the algorithm
d. Counting the maximum disk space needed by the algorithm
2. The complexity of Bubble sort algorithm is
a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)
3. Linked lists are best suited
a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are constantly
changing
c. for both of above situation
d. for none of above situation
4. If the values of a variable in one module is indirectly changed by another
module, this situation is called
a. internal change
b. inter-module change
c. side effect
d. side-module update
5. In linear search algorithm the Worst case occurs when
a. The item is somewhere in the middle of the array
b. The item is not in the array at all
c. The item is the last element in the array
d. The item is the last element in the array or is not there at all
6. For an algorithm the complexity of the average case is
a. Much more complicated to analyze than that of worst case
b. Much more simpler to analyze than that of worst case
c. Sometimes more complicated and some other times simpler than that of
worst case
d. None or above
7. The complexity of merge sort algorithm is
a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)
8. The complexity of linear search algorithm is
a. O(n)
b. O(log n)
c. O(n2)
d. O(n log n)
9. When determining the efficiency of algorithm the time factor is measured
by
a. Counting microseconds
b. Counting the number of key operations
c. Counting the number of statements
d. Counting the kilobytes of algorithm
10. Which of the following data structure is linear data structure?
a. Trees
b. Graphs
c. Arrays
d. None of above
11. The elements of an array are stored successively in memory cells because
a. by this way computer can keep track only the address of the first element and
the addresses of other elements can be calculated
b. the architecture of computer memory does not allow arrays to store other
than serially
c. both of above
d. none of above
12. Which of the following data structure is not linear data structure?
a. Arrays
b. Linked lists
c. Both of above
d. None of above
13. The Average case occur in linear search algorithm
a. When Item is somewhere in the middle of the array
b. When Item is not in the array at all
c. When Item is the last element in the array
d. When Item is the last element in the array or is not there at all
14. Two main measures for the efficiency of an algorithm are
a. Processor and memory
b. Complexity and capacity
c. Time and space
d. Data and space
15. Finding the location of the element with a given value is:
a. Traversal
b. Search
c. Sort
d. None of above
16. Which of the following case does not exist in complexity theory
a. Best case
b. Worst case
c. Average case
d. Null case
17. The operation of processing each element in the list is known as
a. Sorting
b. Merging
c. Inserting
d. Traversal
18. Arrays are best data structures
a. for relatively permanent collections of data
b. for the size of the structure and the data in the structure are constantly
changing
c. for both of above situation
d. for none of above situation
19. Each array declaration need not give, implicitly or explicitly, the
information about
a. the name of array
b. the data type of array
c. the first data from the set to be stored
d. the index set of the array
20. The complexity of Binary search algorithm is
a. O(n)
b. O(log )
c. O(n2)
d. O(n log n)
Correct Answers to Data Structures And Algorithms MCQs
1 – A 2 – B 3 – B 4 – C 5 – D 6 – A 7 – D 8 – A 9 – B 11 – A 12 – D 13 – A 14 – C 15 – B 16 – D 17 –
D 18 – A 19 – C 1. Each data item in a record may be a group item composed of sub-items;
those
items which are indecomposable are called
a. elementary items
b. atoms
c. scalars
d. all of above
2. Which of the following is two way list?
a. grounded header list
b. circular header list
c. linked list with header and trailer nodes
d. none of above
3. Which of the following statement is false?
a. Arrays are dense lists and static data structure
b. data elements in linked list need not be stored in adjacent space in memory
c. pointers store the next data element of a list
d. linked lists are collection of the nodes that contain information part and next
pointer
4. When inorder traversing a tree resulted E A C K F H D B G; the preorder
traversal would return
a. FAEKCDBHG
b. FAEKCDHGB
c. EAFKHDCBG
d. FEAKDCHBG
5. The memory address of the first element of an array is called
a. floor address
b. foundation address
c. first address
d. base address
6. The difference between linear array and a record is
a. An array is suitable for homogeneous data but the data items in a record may
have different data type
b. In a record, there may not be a natural ordering in opposed to linear array.
c. A record form a hierarchical structure but a linear array does not
d. All of above
7. Which of the following name does not relate to stacks?
a. FIFO lists
b. LIFO list
c. Piles
d. Push-down lists
8. Which of the following data structures are indexed structures?
a. linear arrays
b. linked lists
c. both of above
d. none of above
9. The term “push” and “pop” is related to the
a. array
b. lists
c. stacks
d. all of above
10. The memory address of fifth element of an array can be calculated by the
formula
a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words
per memory cell for the array
b. LOC(Array[5])=Base(Array[5])+(5-lower bound), where w is the number of
words per memory cell for the array
c. LOC(Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of
words per memory cell for the array
d. None of above
11. Two dimensional arrays are also called
a. tables arrays
b. matrix arrays
c. both of above
d. none of above
12. When new data are to be inserted into a data structure, but there is no
available space; this situation is usually called
a. underflow
b. overflow
c. housefull
d. saturated
13. The situation when in a linked list START=NULL is
a. underflow
b. overflow
c. housefull
d. saturated
14. A variable P is called pointer if
a. P contains the address of an element in DATA.
b. P points to the address of first element in DATA
c. P can store only memory addresses
d. P contain the DATA and the address of DATA
15. Which of the following data structure can’t store the non-homogeneous data
elements?
a. Arrays
b. Records
c. Pointers
d. None
16. Which of the following data structure store the homogeneous data
elements?
a. Arrays
b. Records
c. Pointers
d. None
17. Which of the following is not a limitation of binary search algorithm?
a. must use a sorted array
b. requirement of sorted array is expensive when a lot of insertion and deletions
are needed
c. there must be a mechanism to access middle element directly
d. binary search algorithm is not efficient when the data elements are more than
1000.
18. Binary search algorithm can not be applied to
a. sorted linked list
b. sorted binary trees
c. sorted linear array
d. pointer array
19. A data structure where elements can be added or removed at either end but
not in the middle
a. Linked lists
b. Stacks
c. Queues
d. Deque
20. Which of the following is not the required condition for binary search
algorithm?
a. The list must be sorted
b. there should be the direct access to the middle element in any sublist
c. There must be mechanism to delete and/or insert elements in list
d. none of above
Correct Answers to Data Structures And Algorithms MCQs
1- d 2- d 3- c 4- b 5- b 6- d 7- a 8- a 9- c 11- c 12- b 13- a 14- a 15- a 16- a 17- d 18- a 19- d

1 Computer Network is
A. Collection of hardware components and computers
B. Interconnected by communication channels
C. Sharing of resources and information
D. All of the Above
2. Protocols are?
A. Agreements on how communication components and DTE's are to
communicate
B. Logical communication channels for transferring data
C. Physical communication channels sued for transferring data
D. None of above
3. Two devices are in network if
A. a process in one device is able to exchange information with a process in
another device
B. a process is running on both devices
C. PIDs of the processes running of different devices are same
D. none of the mentioned
4. what is a Firewall in Computer Network?
A. The physical boundary of Network
B. An operating System of Computer Network
C. A system designed to prevent unauthorized access
D. A web browsing Software
5. The IETF standards documents are called
A. RFC
B. RCF
C. ID
D. None of the mentioned
6. Which data communication method is used to transmit the data over a serial
communication link?
A. Simplex
B. Half-duplex
C. Full duplex
D. All of above
7. Each IP packet must contain
A. Only Source address
B. Only Destination address
C. Source and Destination address
D. Source or Destination address
8. What is the minimum header size of an IP packet?
A. 16 bytes
B. 10 bytes
C. 20 bytes
D. 32 bytes
9. Routing tables of a router keeps track of
A. MAC Address Assignments
B. Port Assignments to network devices
C. Distribute IP address to network devices
D. Routes to use for forwarding data to its destination
10. Which of the following is not the External Security Threats?
A. Front-door Threats
B. Back-door Threats
C. Underground Threats
D. Denial of Service (DoS)
11. What is the IP Address range of APIPA?
A. 169.254.0.1 to 169.254.0.254
B. 169.254.0.1 to 169.254.0.255
C. 169.254.0.1 to 169.254.255.254
D. 169.254.0.1 to 169.254.255.255
12. Which of the following is not the possible ways of data exchange?
A. Simplex
B. Multiplex
C. Half-duplex
D. Full-duplex
13. The management of data flow between computers or devices or between
nodes in a network is called
A. Flow control
B. Data Control
C. Data Management
D. Flow Management
14. What does the port number in a TCP connection specify?
A. It specifies the communication process on the two end systems
B. It specifies the quality of the data & connection
C. It specify the size of data
D. All of the above
15. What is the purpose of the PSH flag in the TCP header?
A. Typically used to indicate end of message
B. Typically used to indicate beginning of message
C. Typically used to push the message
D. Typically used to indicate stop the message
16. Which of the following protocol is/are defined in Transport layer?
A. FTP
B. TCP
C. UDP
D. B & C
17. The meaning of Straight-through Cable is
A. Four wire pairs connect to the same pin on each end
B. The cable Which Directly connects Computer to Computer
C. Four wire pairs not twisted with each other
D. The cable which is not twisted
18. What is the size of MAC Address?
A. 16-bits
B. 32-bits
C. 48-bits
D. 64-bits
19. Repeater operates in which layer of the OSI model?
A. Physical layer
B. Data link layer
C. Network layer
D. Transport layer
20. Which of the following layer of OSI model also called end-to-end layer?
A. Presentation layer
B. Network layer
C. Session layer
D. Transport layer
21. Router operates in which layer of OSI Reference Model?
A. Layer 1 (Physical Layer)
B. Layer 3 (Network Layer)
C. Layer 4 (Transport Layer)
D. Layer 7 (Application Layer)
22. ADSL is the abbreviation of
A. Asymmetric Dual Subscriber Line
B. Asymmetric Digital System Line
C. Asymmetric Dual System Line
D. Asymmetric Digital Subscriber Line
23. How many layers does OSI Reference Model has?
A. 4
B. 5
C. 6
D. 7
24 Bridge works in which layer of the OSI model?
A. Appliation layer
B. Transport layer
C. Network layer
D. Datalink layer
25. Why IP Protocol is considered as unreliable?
A. A packet may be lost
B. Packets may arrive out of order
C. Duplicate packets may be generated
D. All of the above
26. What is the benefit of the Networking?
A. File Sharing
B. Easier access to Resources
C. Easier Backups
D. All of the Above
27. Which of the following is not the Networking Devices?
A. Gateways
B. Linux
C. Routers
D. Firewalls
28. What is the maximum header size of an IP packet?
A. 32 bytes
B. 64 bytes
C. 30 bytes
D. 60 bytes
29. Which of the following is correct in VLSM?
A. Can have subnets of different sizes
B. Subnets must be in same size
C. No required of subnet
D. All of above
30. DHCP Server provides _____ to the client.
A. Protocol
B. IP Address
C. MAC Address
D. Network Address
31. What is the address size of IPv6 ?
A. 32 bit
B. 64 bit
C. 128 bit
D. 256 bit
32. What is the size of Network bits & Host bits of Class A of IP address?
A. Network bits 7, Host bits 24
B. Network bits 8, Host bits 24
C. Network bits 7, Host bits 23
D. Network bits 8, Host bits 23
33. What is the full form of RAID ?
A. Redundant Array of Independent Disks
B. Redundant Array of Important Disks
C. Random Access of Independent Disks
D. Random Access of Important Disks
34. What do you mean by broadcasting in Networking?
A. It means addressing a packet to all machine
B. It means addressing a packet to some machine
C. It means addressing a packet to a particular machine
D. It means addressing a packet to except a particular machine
35. What is the size of Source and Destination IP address in IP header?
A. 4 bits
B. 8 bits
C. 16 bits
D. 32 bits
36. What is the typical range of Ephemeral ports?
A. 1 to 80
B. 1 to 1024
C. 80 to 8080
D. 1024 to 65535
37. A set of rules that govern all aspects of information communication is called
A. Server
B. Internet
C. Protocol
D. OSI Model
38. Controlling access to a network by analyzing the incoming and outgoing
packets is called
A. IP Filtering
B. Data Filtering
C. Packet Filtering
D. Firewall Filtering
39. DHCP is the abbreviation of
A. Dynamic Host Control Protocol
B. Dynamic Host Configuration Protocol
C. Dynamic Hyper Control Protocol
D. Dynamic Hyper Configuration Protocol
40. What is the use of Bridge in Network?
A. to connect LANs
B. to separate LANs
C. to control Network Speed
D. All of the above
41. Network congestion occurs
A. in case of traffic overloading
B. when a system terminates
C. when connection between two nodes terminates
D. none of the mentioned
42. What is the meaning of Bandwidth in Network?
A. Transmission capacity of a communication channels
B. Connected Computers in the Network
C. Class of IP used in Network
D. None of Above
43 Which of the following is correct regarding Class B Address of IP address
A. Network bit – 14, Host bit – 16
B. Network bit – 16, Host bit – 14
C. Network bit – 18, Host bit – 16
D. Network bit – 12, Host bit – 14
44. ............provides a connection-oriented reliable service for sending messages
A. TCP
B. IP
C. UDP
D. All of the above
45. What does Router do in a network?
A. Forwards a packet to all outgoing links
B. Forwards a packet to the next free outgoing link
C. Determines on which outing link a packet is to be forwarded
D. Forwards a packet to all outgoing links except the originated link
46. What is the use of Ping command?
A. To test a device on the network is reachable
B. To test a hard disk fault
C. To test a bug in a Application
D. To test a Pinter Quality
47. What is the size of Host bits in Class B of IP address?
A. 04
B. 08
C. 16
D. 32
48. Which of the following is correct in CIDR?
A. Class A includes Class B network
B. There are only two networks
C. There are high & low class network
D. There is no concept of class A, B, C networks
49. The processes on each machine that communicate at a given layer are called
A. UDP process
B. Intranet process
C. Server technology
D. Peer-peer process
50. Which of the following layer is not network support layer?
A. Transport Layer
B. Network Layers
C. Data link Layer
D. Physical Layer
Correct Answers of Computer Networks MCQ Questions
1-D 2-A 3-A 4-C 5-A 6-C 7-C 8-C 9-D 10-C
11-C 12-B 13-A 14-A 15-A 16-D 17-A 18-C 19-A 20-D
21-B 22-D 23-D 24-D 25-D 26-D 27-B 28-D 29-A 30-B
31-C 32-A 33-A 34-A 35-D 36-D 37-C 38-C 39-B 40-A
41-A 42-A 43-A 44-A 45-C 46-A 47-C 48-D 49-D 50-A

1. The stuff would likely break if you threw it out of a fifth-story window is
a. Software
b. Firmware
c. Hardware
d. All of above
2. Which of the following is not a hardware?
a. Network Switch
b. Cisco Router
c. Firewall
d. Virtual Router
3. A computer without software is
a. like a book of blank pages
b. most power to perform tasks quicker
c. complete human being
d. all of above
4. Which of the following hardware you usually can’t find inside a CPU Casing?
a. Power Supply box
b. Video card
c. Video display unit
d. Graphics processor
5. Which of the following is not a peripheral hardware device in a computer
system?
a. Keyboard
b. Optical Drive
c. HDD
d. Printer
6. Identify the network hardware of a home network
a. Access Point
b. NIC Card
c. Analog Modem
d. FireWire
7. Which of the following is not a network hardware?
a. Network Switch
b. Bridge
c. Print Server
d. Network Interface Card
8. A unit of a computer system that brings data and instructions into the
computer
a. Input Devices
b. Encoders
c. Processing Unit Devices
d. All of above
9. Identify the odd one
a. Tracker ball
b. Microphone
c. Speaker
d. Sensors
10. Graphic Tablet is an
a. Input Unit Device
b. Output Unit Device
c. Video Processing Device
d. None of above
11. The process of capturing or collecting raw data, at the beginning of
computer based information system, in to a form that is usable by the computer
for processing.
a. Input
b. Gather
c. Acquire
d. Process
12. In any information system if the data is processed right away it is called
a. Batch processing
b. Online processing
c. Offline processing
d. Automatic processing
13. The two kinds of input devices – direct input and indirect input devices are
classified based on
a. Whether the data conversion is involved or not
b. Whether the data is acquired from a device directly connected to CPU or
through network
c. Whether the data is directly input or retrieved from disk
d. Whether the data is input with or without human intervention
14. In which input method the data is already in machine readable form?
a. Direct input method
b. Indirect input method
c. Stored input method
d. Network input method
15. In which input method the data should be converted into machine readable
form so that a computer can process it?
a. Direct input method
b. Indirect input method
c. Network input method
d. Stored input method
16. A computer key board is a sophisticated electromechanical component
designed to create specialized electronic codes when a key is pressed. What is
that electronic codes called?
a. Scan code
b. Unicode
c. ASCII
d. EBCDIC
17. Keyboard is an example of
a. Direct input method
b. Indirect input method
c. Network input method
d. Stored input method
18. In a keyboard, the arrow keys, Home, End, PageUp, PageDown keys are
known as
a. Standard keys
b. Function keys
c. Navigation keys
d. Special purpose keys
19. In a computer keyboard the Alt, Ctrl, Shift, Del & Insert keys are known as
a. Standard keys
b. Function keys
c. Navigation keys
d. Special purpose keys
20. Devorak, Colemark, JCUKEN are some keyboard layouts for which scripts?
a. Latin Scripts
b. English Scripts
c. Complex Scripts
d. None of above
Correct Answers
1-c 2-d 3-a 4-c 5-c 6-a 7-d 8-a 9-c 11-a 12-b 13-a 14-a 15-b 16-a 17-b 18-c 19-d
21. Which is the most common computer keyboard layout?
a. QWERTY
b. JCUKEN
c. Devorak
d. Colemark
22. QWERTY keyboard layout was originally designed
a. To improve the typing speed
b. To make typing more efficient
c. To make typing harder and inefficient
d. To improve the typing accuracy
23. Which of the following describes the types of keyboards?
a. QWERTY, Devorak, Colemark, JCUKEN
b. XT, AT, Enhanced, Windows
c. Both of above
d. None of above
24. Which of the following keyboard have 83 keys?
a. XT keyboards
b. AT keyboards
c. Enhanced keyboards
d. Windows keyboards
25. Which of the following type of keyboard introduced the
SysRq (System Request) key?
a. XT keyboards
b. AT keyboards
c. Enhanced keyboards
d. Windows keyboards
26. Which type of computer keyboard contain 101 to 106 keys?
a. XT keyboards
b. AT keyboards
c. Enhanced keyboards
d. Windows keyboards
27. Which key was added in Windows keyboard?
a. SysRq
b. CapsLock
c. Menu key
d. None of above
28. The most common input device to control the movement of
the cursor on the screen?
a. Arrow keys
b. Mouse
c. Joysticks
d. Plotter
29. Which of the following type of mouse contain a ball on
its underside and sensors to detect direction of ball movement?
a. Mechanical mouse
b. Opto-mechanical mouse
c. Optical mouse
d. None of above
30. What is the difference between mechanical mouse and opto-mechanical
mouse?
a. Mechanical mouse is connected with wire but opto-mechanical
mouse are wireless
b. Mechanical mouse has a ball on its underside but
opto-mechanical don’t have
c. Mechanical mouse has only 2 buttons while opto-mechanical
mouse have 3 buttons.
d. All of the above
31. Cordless mouse or wireless mouse connects to the computer
through
a. Infrared light
b. Radio wave
c. Both of above
d. None of above
32. What is the device that captures images from photographic
prints for computer editing and display?
a. Scanner
b. Printer
c. Camera
d. All of above
33. Which of the following is not a type of scanner?
a. Hand held scanner
b. Feed-in scanner
c. Flatbed scanner
d. None of above
34. Which of the following is a scanning technology?
a. OCR
b. OMR
c. BCR
d. All of above
35. The scanning technology that allows to read the check
boxes affixed in predefined space is
a. OCR
b. OMR
c. BCR
d. None of above
36. The scanning technology that makes it possible to
recognize handwritten data when there is usually space among characters is
a. OMR
b. ICR
c. MICR
d. OCR
37. We use following scanner to recognize the printed and
typed texts
a. OMR
b. OCR
c. MICR
d. None of above
38. The scanner used to verify the signatures written by
magnetic ink in banks is
a. OMR
b. OCR
c. MICR
d. None of above
39. A unit that receives information from CPU and converts
into suitable human readable form is
a. Input Unit
b. Output Unit
c. Processing Unit
d. Language Translator
40. A computer monitor is also called a
a. VDT
b. VDU
c. CRT
d. None of above
Correct Answers
21-a 22-c 23-b 24-a 25-b 26-c 27-c 28-b 29-a 31-c 32-a 33-d 34-d 35-b 36-b 37-b 38-c 39-b
41. Text and images are displayed on monitor by individual
dots called
a. Cursor
b. Pixels
c. CRT
d. LED
42. Specialized vacuum tube in which images are produced when
an electron beam strikes a phosphorescent surface is
a. CRT
b. LED
c. LCD
d. All of above
43. The full form of EGA is
a. Enhanced Graphics Adapter
b. Extended Graphics Adapter
c. Enhanced Graphics Array
d. Extended Graphics Array
44. Which of the following technology can’t be used to build
flat panel display monitors?
a. LCDs
b. Gas Plasma Display
c. CRT
d. LED
45. Which of the following printer can print a single
character at a time?
a. Serial printer
b. Line printer
c. Page printer
d. Impact printer
46. Which of the following printer is suitable to print
multiple carbon copies at once?
a. Impact Printer
b. Laser Printer
c. Inkjet Printer
d. All of above
47. Identify the printer that uses a kind of hub having set
of spokes at the margin of the hub. When the required character is aligned to
the print hammer, the character is then struck into the ribbon to produce
character on paper.
a. Inkjet printer
b. Dot matrix printer
c. Line printer
d. Daisy wheel printer
48. The printing technology in which one or more color of ink
is sprayed at high speed onto the paper is
a. Laser Printer
b. Ink Jet Printer
c. Dot Matrix Printer
d. Chain Printer
49. Which company introduced the first desktop laser printer
called LaserJet?
a. Compaq
b. Hewlett-Packard
c. Epson
d. Cannon
50. A special-purpose output device that draws images with
ink pens is
a. Inkjet Printers
b. Laser Printers
c. Plotter
d. Light Pen
51. Which of the following is not a type of plotter
a. Drum plotter
b. Flatbed plotter
c. Hand-held plotter
d. None of above
52. What is there in system unit that holds a microprocessor
chip, memory chips and expansion slots?
a. Slots
b. Ports
c. Mother Board
d. Daughter Board
53. Motherboard contains circuitry that connects
microprocessor with memory and other parts. What’s the circuitry called?
a. Bus
b. Traffic
c. Data Path
d. None of above
54. Which of the following is not there in motherboard?
a. System Clock
b. Buses
c. Ports
d. VDT
55. The expansion slots or sockets accept additional
expansion cards often known as
a. Motherboard
b. Daughterboard
c. Chips
d. None of above
56. Motorola and Intel are well-known companies to produce
a. Motherboards
b. Daughterborads
c. Microprocessors
d. None of above
57. Intel Pentium chip uses
a. CISC design
b. RISC design
c. Both of above
d. None of above
58. RAM & ROM are classified based on
a. Data storage is temporary or permanent
b. Data access is random or sequential
c. Data retrieval is quicker or slower
d. Data removal is automatic or manual
59. Which of the following memory is most volatile?
a. SRAM
b. DRAM
c. CMOS RAM
d. EEPROM
60. Memory chips are mounted on a circuit board usually known
as
a. Memory Expansion Card
b. Memory Slot
c. Memory Bank
d. Memory Module
Correct Answers
41-b 42-a 43-a 44-c 45-a 46-a 47-d 48-b 49-b 51-c 52-c 53-a 54-d 55-b 56-c 57-a 58-a 59-b
61. A kind of memory chip that stores data and instructions
permanently is
a. ROM
b. SRAM
c. EEPROM
d. RAM
62. Which of the following ROM is most convenient to rewrite?
a. EPROM
b. EEPROM
c. EAPROM
d. DRAM
63. Which of the following port is used to connect DB-25 pin
Modems or Scanners?
a. Serial Ports
b. Parallel Port
c. PS/2 Port
d. USB Port
64. A disk is divided into several concentric circles called
a. Track
b. Sector
c. Cylinder
d. Cluster
65. The time taken to move an access arm to a certain track
on a disk is
a. Seek Time
b. Head Switching Time
c. Search Time
d. Data Transfer time
66. The rotational delay time or latency time is also known
as
a. Seek Time
b. Head Switching Time
c. Search Time
d. Data Transfer time
67. Which of the following is not a magnetic storage medium?
a. Floppy Disk
b. Hard Disk
c. Digital Versatile Disks
d. Cassettes and Cartridges
68. Which of the following term do not refer to an expansion
card?
a. Controller Cards
b. Adapters
c. Daughterboard
d. Motherboard
69. Which of the following port is better suitable to support
high speed graphics and other video input?
a. VGA Port
b. SVGA Port
c. AGP Port
d. PS/2 Port
70. Which device in microprocessor stores the data to be
processed?
a. ROM
b. RAM
c. Registers
d. ALU
71. Which of the following is not an optical storage medium?
a. CDs
b. DVDs
c. Blu Ray
d. Memory Sticks
72. A standard CD ROM can hold data up to
a. 1.44 MB
b. 650 MB
c. 2 GB
d. 1 TB
73. IBM introduced the first 8” floppy disk in 1971 which
could store
a. 100 KB
b. 164 KB
c. 512 KB
d. 1.44 MB
74. The storage capacity of a floppy disk is measured in
a. KB
b. MB
c. GB
d. TB
75. The storage capacity of a hard disk is measured in
a. KB
b. MB
c. GB
d. TB
76. What is the suitable output device for CAE, CAD and CAM?
a. Dot Matrix Printers
b. Laser Printers
c. Plotters
d. Projectors
77. Which of the following printer produces most noise?
a. Dot Matrix Printer
b. Inkjet Printer
c. Laser Printer
d. None of above
78. To record and produce sound in a computer system you need
a. Microphone
b. Speakers
c. Sound card
d. All of above
79. A cluster of red, green and blue diodes is driven
together to form a full-color pixel in a
a. LCD Monitor
b. LED Monitor
c. CRT Monitor
d. Monochrome Monitor
80. The temporary output of a computer system is called
a. Hardcopy output
b. Softcopy output
c. Computer Printout
d. None of above
Correct Answers
61-a 62-c 63-a 64-a 65-a 66-c 67-c 68-c 69-c 71-d 72-b 73-a 74-b 75-c 76-c 77-a 78-d 79-b

Вам также может понравиться