Vous êtes sur la page 1sur 15

MCQs For Computer Operator Question 1: Which data communication method is used to transmit the data over a serial

communication link? a. simplex b. half-duplex c. full-duplex d. b and c e. None of above Question 2: What is the minimum number of wires needed to send data over a serial communication link layer? a. 1 b. 2 c. 4 d. 6 e. none of above Question 3: Which of the following types of channels moves data relatively slowly? a. wide band channel b. voice band challen c. narrow band channel Question 4: Most data communications involving telegraph lines use: a. simplex lines b. wideband channel c. narrowband channel d. dialed service Question 5: A communications device that combines transmissions from several I/O devices into one line is a a. concentrator b. modifier c. multiplexer d. full-duplex line Question 6: How much power (roughly) a light emitting diode can couple into an optical fiber?

a. 100 microwatts b. 440 microwatts c. 100 picowatts d. 10 miliwatts Question 7: The synchronous modems are more costly than the asynchronous modems because a. they produce large volume of data b. they contain clock recovery circuits c. they transmit the data with stop and start bits d. they operate with a larger bandwidth e. none of above Question 8: Which of the following statement is correct? a. terminal section of a synchronous modem contains the scrambler b. receiver section of a synchronous modem contains the scrambler c. transmission section of a synchronous modem contains the scrambler d. control section of a synchronous modem contains the scrambler e. none of the above Question 9: In a synchronous modem, the digital-to-analog converter transmits signal to the a. equilizer b. modulator c. demodulator d. terminal e. none of aobve Question 10: Which of the following communications lines is best suited to interactive processing applications? a. narrow band channel b. simplex lines c. full duplex lines d. mixed band channels

Which of the following layer is not in OSI model ? a. physical layer b. internet layer c. network layer

d. transport layer Which of the following is a type of fragmentation ? a. b. c. d. Transparent Non transparent Both A and B None of these Collection of interconnected networks sometimes called ? a. b. c. d. Internet Wireless network Mobile Network None of these Which of the following is wrong example of network layer ? a. b. c. d. e. X.25 Level 2-ISO Source Routing and Domain Naming Usenet Internet Protocol(IP) - ARPANET X-25 Packet Level Prrotocol (PLP) - ISO None of these Mobile computers and personal digital assistant (PDAs) are the examples of ? Radio broadcasting Wireless network Geosynchronous LAN ATM (Asynchronous Transfer Mode) is fundamentally a....... technology? Circuit switching Packet switching Narrow band None of these

a. b. c. d. a. b. c. d.

One security method is encryption. But encryption does nothing to keep digital pests and hackers out. To accomplish this goal, we need ? a. b. c. d. Router Bridges Hubs Firewalls HTTP refers to ? a. b. c. d. Hyper Text Transfer Protocol Hyper Text Transmission Protocol Hyper Text Tie Protocol None of these Sending a file from your personal computer's primary memory or disk to another computer is called ? a. b. c. d. e. a. b. c. d. a. b. c. d. uploading hang on logging on downloading None of these A DNS translates a domain name into what ? Binary Hex IP URL During software development which factor is most crucial ? People Process Product Project

Milestones are used to ? a. b. c. d. a. b. c. d. Know the cost of the project Know the status of the project Know the user expectations None of the above PMTLR is acronym for ? Page Map Table Limit Register Page Memory Table With Limit Register Both A and B None of these Paging is ? a. b. c. d. a. b. c. d. a. b. c. d. Virtual memory Memory management scheme Allocation of memory Deadlock prevention scheme .INI extention refers to which kind of file ? Image file System file Hypertext related file Image color matching profile file In serial communication, an extra clock is needed ? to synchronize the devices for programmed baud rate control to make efficient use of RS-232 None of above e. Every command in Linux is a
text file stored variable executable program None

Kernel is not involved

A. B. C. D.

When a read operation is done When a pressed key is echoed on to the screen In resource allocation None of the above

Which one of the following options is not a shell in UNIX system?

A. B. C. D.

Bourne Shell C Shell Net Shell Korn Shell

The Unix command used to find out the number of characters in a file is

A. B. C. D.

nc wc chcnt c

At any given time Parallel Virtual Machine (PVM) has ________ send buffer and ________ receive buffer.

A. one-one

B. one-two
C. two-two D. two-one
One of the distinguished features of super-computer over other category of computer is

A. parallel processing B. highest accuracy level

C. more speed
D. more capacity

The trend to outsource IT functions to other countries is termed

A. Foreign outsourcing

B. Offshore outsourcing
C. External outsourcing D. Outer outsourcing

Which of the following is false concerning Enterprise Resource Planning (ERP) ?

A. It attempts to automate and integrate the majority of business processes. B. It shares common data and practices across the enterprise

C. It is inexpensive to implement.
D. It provides and access information in a real-time environment.
What component of .NET includes services used to support web services?

A. Platform

B. Framework
C. Visual Studio D. System
Which infrastructure includes application servers, data servers, and clients?

A. Client/server B. Thin Client C. 2-tier infrastructure

D. 3-tier infrastructure
A technique used to gain personal information for the purpose of identity theft, often by e-mail, is called?

A. Phishing

B. Carding C. Brand spoofing

D. All of the above


What provides knowledge workers with access to workgroup information such as e-mails, reports, meeting minutes, and memos?

A. Intranet-processing enterprise information portal

B. Collaborative-processing enterprise information portal


C. Decision-processing enterprise information portal D. None of the above
Unsolicited e-mail is called what?

A. Junk mail

B. Spam
C. Extra mail D. None of the above
Telnet is a

A. Network of telephones B. Television network

C. Remote login
D. None of these
What hides your identity from the Web sites you visit?

A. Web log B. Click stream

C. An anonymous Web browsing service


D. None of the above

Which of the following is a platform free language

A. B. C. D.

Fortran Assembly C Java

Which of the following is not an scripting language ?

A. HTML B. XML

C. Postscript
D. Javascript
______ is sometimes said to be object oriented, because the only way to manipulate kernel objects is by invoking methods on their handles.

A. Windows NT
B. Windows XP C. Windows VISTA D. Windows 95/98
What is the meaning of Hibernate in Windows XP/Windows 7 ?

A. Restart the computers in safe mode B. Restart the computers in normal mode. C. Shutdown the computer terminating all the running applications.

D. Shutdown the computer without closing the running applications.

We cannot delete the ---------- icon but we can made it invisible

A. Recycle
B. My Computer C. Internet explorer D. None of the above
A microporgram is sequencer perform the operation

A. Read B. write C. Execute

D. Read and execute


The control unit of computer

A. Performs ALU operations on the data B. Controls the operation of the output devices C. Is a device for manually operating the computer

D. Direct the other unit of computers


Which of the following is a set of general purpose internal registers?

A. B. C. D.

Stack Scratch pad Address register Status register

What is meant by a dedicated computer?

A. Which is used by one person only

B. Which is assigned to one and only one task


C. Which does one kind of software D. Which is meant for application software only

A complete microcomputer system consists of

A. Microprocessor B. Memory C. Peripheral equipment

D. All of the above


Where does a computer add and compare data ?

A. Hard disk B. Floppy disk

C. CPU chip
D. Memory chip
The minimum time delay between the initiations of two independent of two independent memory operations is called

A. Access time

B. Cycle time
C. Transfer time D. Latency time
When necessary, the results are transferred from the CPU to main memory by

A. I/O devices

B. CPU
C. Shift registers D. None of these
The bus which is used to transfer data from main memory to peripheral device is

A. Data bus B. Input bus

C. DMA bus

D. Output bus
The method for updating the main memory as soon as a word is removed from the Cache is called

A. Write-through

B. Write-back
C. Protected write D. Cache-write

Which is not a impact Printer Dot Matrix Laser Printer Line Printer Daisy wheel

Which is a sequential access drive a. b. c. d. Floppy Disk Magnetic Tape Compact Disk None of Above

1. EBCDIC stands for a. Extended Binary Coded Decimal Interchange Code b. Extended Bit Code Decimal Interchange Code c. Extended Bit Case Decimal Interchange Code d. Extended Binary Case Decimal Interchange Code

2. BCD is a. Binary Coded Decimal

b. Bit Coded Decimal c. Binary Coded Digit d. Bit Coded Digit

3. ASCII stands for a. American Stable Code for International Interchange b. American Standard Case for Institutional Interchange c. American Standard Code for Information Interchange d. American Standard Code for Interchange Information

4. Which of the following is first generation of computer a. EDSAC b. IBM-1401 c. CDC-1604 d. ICL-2900

5. Chief component of first generation computer was a. Transistors b. Vacuum Tubes and Valves c. Integrated Circuits d. None of above

6. FORTRAN is a. File Translation b. Format Translation

c. Formula Translation d. Floppy Translation

7. EEPROM stand for a. Electrically Erasable Programmable Read Only Memory b. Easily Erasable Programmable Read Only Memory c. Electronic Erasable Programmable Read Only Memory d. None of the above

8. Second Generation computers were developed during a. 1949 to 1955 b. 1956 to 1965 c. 1965 to 1970 d. 1970 to 1990 Correct Answer: 1956 to 1965 Explanation: Second generation computers used transistors as their main electronic component. Transistor was invented by Bell Lab Scientists John Burdeen, Walter Brattain and William Shockley in 1947 and won the Nobel Prize in 1956 but it was not used in computers till 1956. The second generation continued until the implementation of IC chips invented by Jack Kilby in Texas Instruments in 1958.

9. The computer size was very large in a. First Generation b. Second Generation c. Third Generation

d. Fourth Generation

10. Microprocessors as switching devices are for which generation computers a. First Generation b. Second Generation c. Third Generation d. Fourth Generation

Vous aimerez peut-être aussi