Vous êtes sur la page 1sur 58

A-PDF Merger DEMO : Purchase from www.A-PDF.

com to remove the watermark


BSC Academy

IT Questions

y
1. DOS floppy disk does not have ________
1) a boot record 2) a file allocation table 3) a root directory
4) virtual memory 5) None of the above

em
2. The ________ component is used by the data analyst to create queries that access the database.
1) data store 2) query and reporting 3) ETL tools
4) data visualisation 5) None of these
3. The altering of data so that it is not usable unless the changes are undone is ________
1) Ergonomics 2) Biometrics 3) Compression 4) Encryption 5) None of these
4. Which of the following is a general-purpose programming language designed by Sun Microsystems and well suited for
use on the web?
1) Java 2) Java Script 3) CSS 4) VBS Script 5) None of these
5. ________ are used to identify a user who returns to a website.

ad
1) ASPs 2) Scripts 3) Cookies 4) Plug-ins 5) None of These
6. Programs that automatically submit your search request to several search engines simultaneously are called ________
1) Hits 2) Webcrawlers 3) Spiders 4) Metasearch engines 5) None of these
7. If you wanted to locate the hardware address of a local device, which protocol would you use?
1) PING 2) ICMP 3) ARP 4) RARP 5) PONG
8. In Oracle, which is more appropriate to store a small list of values in a single column in each row in your address table?
1) Index 2) Nested table 3) Oracarray 4) Varray 5) Index
Ac
9. OLAP applications are widely used by ________ and it uses ________ scheme.
1) RDBMS, Bus 2) Java, Bus
3) Operating System, Star 4) Data mining techniques, star or multidimensional
5) None of these
10. ODBC is based on ________
1) C++ language 2) RDBMS 3) Structured Query Language
4) .net language 5) C language
11. To discard all pending data changes use the ________ command.
1) LOCK 2) SAVEPOINT 3) ROLLBACK 4) COMMIT 5) None of these
12. Round robin scheduling is essentially the preemptive version of ________
C

1) Shortest job first 2) Shortest remaining 3) Longest time first


4) FIFO 5) None of these
13. The mechanism by which the data and functions are bound together within an object definition is called ________
1) Abstraction 2) Polymorphism 3) Inheritance 4) Encaspsulation 5) None of these
14. The TRAP is one of the interrupts available in INTEL 8085.Which of the following statements is true of TRAP?
BS

1) It is negative edge-triggered. 2) It is positive edge-triggered.


3) It is both edge-triggered and level-triggered. 4) It is level-triggered.
5) None of these
15. The ________ data mining technique derives rules from real-world case examples.
1) Waterfall Model 2) Spiral Model 3) Prototyping Model 4) Incremental Model 5) None of these
16. An oracle server index
1) Is a schema object
2) Is used to speed up the retrieval of rows by using a pointer
3) Is independent of the table it indexes
4) All of these
5) None of these
IT Quesetions / 1
BSC Academy
17. Which of the following is not a context-free grammar component?
1) Terminal symbols 2) Non-terminal symbol 3) Productions
4) List 5) None of these

y
18. Which of the following is a phase(s) of RAD (Rapid Application Development) model?
1) Business modelling 2) Data modelling 3) Application generation
4) All of these 5) None of these
19. ________ allows a DFD (Data Flow Diagram) with transform flow characteristics to be mapped into a predefined

em
template for program structure.
1) Transaction flow 2) Contributor 3) Transform mapping 4) Design evaluation 5) None of these
20. A combinational logic circuit which is used to send data coming from a single source to two or more separate destinations
is called
1) Decoder 2) Encoder 3) Multiplexer 4) Demultiplexer 5) None of these
21. Which of the following is a Universal Gate?
1) AND 2) OR 3) EX OR 4) NAND 5) None of these
22. Twos complement of binary number 010111.1100 is
1) 101001.1100 2) 101000.0100 3) 010111.0011 4) 101000.0011 5) None of these

ad
23. In 8086, the overflow flag is set when
1) The sum is more than 16 bits
2) Signed numbers go out of their range after an arithmetic operation
3) Carry and sign flags are set
4) During subtraction
5) None of these
24. What does microprocessor speed depend on?
Ac
1) Clock 2) Data bus width 3) Address bus width 4) All of these 5) None of these
25. RSA algorithm
1) supports encryption and digital signature 2) supports source authentication
3) encrypts the checksum 4) All the above
5) None of these
26. A special type gateway that can keep external users from accessing resources on the LAN users access the external info
is called
1) Repeater 2) Firewall 3) Encryption 4) Hub 5) None of these
27. What is the name given to the exchange of control signals which is necessary for establishing a connection between a
modem and a computer at one end of a line and another modem and computer at the other end?
C

1) Handshaking 2) Modem Options 3) Protocol 4) All of these 5) None of these


28. In SQL, which command is used to change data in a data table?
1) UPDATE 2) INSERT 3) BROWSE 4) APPEND 5) None of these
29. In SQL, which of the following is not a data definition language command?
1) RENAME 2) REVOKE 3) GRANT 4) UPDATE 5) None of these
BS

30. Which command(s) is (are) used to redefine a column of the table in SQL ?
1) ALTER TABLE 2) DEFINE TABLE 3) MODIFY TABLE 4) All of these 5) None of these
31. In a relational schema, each tuple is divided into fields called
1) Relations 2) Domains 3) Queries 4) All of the these 5) None of these
32. An indexing operation
1) Sorts a file using a single key 2) Sorts a file using two keys 3) Establishes an index for a file
4) Both 1 and 3 5) None of these
33. Data security threats include
1) Hardware failure 2) Privacy invasion 3) Fraudulent manipulation of data
4) All of these 5) None of these
2 / IT Quesetions
BSC Academy
34. The language used in application programs to request data from the DBMS is referred to as the
1) DML 2) DDL 3) Query Language 4) DCL 5) None of these
35. A________ contains the smallest unit of meaningful data, so you might call it the basic building block for a data file.

y
1) File Structures 2) Records 3) Fields 4) Data base 5) None of these
36. A ________ means that one record in a particular record type is related to only one record of another record type.
1) One-to-one relationship 2) One-to-many relationship 3) Many-to-one relationship
4) Many-to-many relationship 5) None of these

em
37. Through linked list one can implement
1) Stack 2) Graph 3) Queue 4) All of these 5) None of these
38. A heap allows a very efficient implementation of a
1) Double-ended queue 2) Priority queue 3) Stack
4) Trees 5) None of these
39. Most database management systems allow you to have more than one key so that you can sort records in different ways.
One of the keys is designated the ________ and must hold a unique value for each record.
1) Unique Key 2) Prime attribute 3) Index key 4) Primary Key 5) Null key

ad
40. ________ is primarily used for mapping host names and email destinations to IP address but can also be used for other
purposes
1) TCP (Transfer Control Protocol) 2) DNS (Domain Name System)
3) SHA (Secure Hash Algorithm) 4) Simple Network Management Protocol (SNMP)
5) None of these
41. Override is a method
1) For an operation that replaces an inherited method for the same operation
2) For a data that replaces an inherited method for the same operation
Ac
3) For an operation that takes arguments from library function
4) All of these
5) None of these
42. Local variables
1) Are created outside a block 2) Are known only to that block
3) Continue to exist when their block ends 4) Are illegal in C++
5) None of these
43. ________ is a virus that inserts itself into a systems memory. Then it takes a number of actions when an
infected file is executed.
1) Web scripting virus 2) Polymorphic Virus 3) Macro virus
C

4) Boot sector virus 5) Resident virus


44. Which of the following TCP/IP protocol is used for remote terminal connection service?
1) Telnet 2) RARP 3) FTP 4) All the above 5) None of these
45. The ________ model remains operative until the software is retired.
1) Waterfall model 2) Incremental model 3) Spiral model 4) Prototyping model 5) Incremental model
BS

46. Data mining evolved as a mechanism to cater to the limitations of ________ systems to deal massive data sets with high
dimensionality, new data type, multiple heterogeneous data resource etc.
1) OLTP 2) OLAP 3) DSS 4) DWH 5) None of these
47. An important application of cryptography used in computerized commercial and financial transactions:
1) Data mining 2) Data warehousing 3) Digital signature 4) Media convergence 5) None of these
48. Rows of a relation are called
1) Relation 2) Tuples 3) Data structure 4) An entity 5) None of these
49. The drawbacks of the binary tree sort are remedied by the
1) Linear sort 2) Quick sort 3) Heap Sort 4) Insertion sort 5) None of these

IT Quesetions / 3
BSC Academy
50. Which layer of OSI determines the interface of the system with the user?
1) Network 2) Application 3) Data link 4) Session 5) None of these
51. Information is

y
1) Data 2) Processed data 3) Manipulated input 4) Computer output 5) All of These
52. Data by itself is not useful unless
1) It is massive 2) It is processed to obtain information
3) It is collected from diverse sources 4) It is properly stated

em
5) None of These
53. For taking decisions data must be
1) Very accurate 2) Massive 3) Processed correctly
4) Collected from diverse sources 5) All of These
54. Strategic information is needed for
1) Day-to-day operations 2) Meeting government requirements 3) Long-range planning
4) Short-range planning 5) Only 2 and 3
55. Strategic information is required by
1) Middle managers 2) Line managers 3) Top managers 4) All workers 5) Only 1 and 2

ad
56. A ROLLBACK command in a transaction
1) Makes sure that all changes to the database are in effect.
2) Undoes all changes to the database resulting from the execution of the transaction
3) Does nothing
4) Undoes the effects of the last UPDATE command
5) Restores the current of the database to its state at the end of the previous day
57. ________ refers to the contracting of a specific business task to a third party service provider.
Ac
1) Insourcing 2) Outsourcing 3) Offshore Outsourcing
4) Cross-Functioning 5) Business Process Outsourcing
58. Operational information is needed for
1) Day-to-day operations 2) Meeting government requirements 3) Long-range planning
4) Short-range planning 5) All of these
59. In motorcar manufacturing the following type of information is strategic:
1) Decision on introducing a new model 2) Scheduling production
3) Assessing competitor car 4) Computing sales tax collected
5) Only 1 and 2
60. A computer-based information system is needed because
C

(A) The size of organisations has become large and data is massive
(B) Timely decisions are to be taken based on available data
(C) Computers are available
(D) It is difficult to get clerks to process data
1) Only A and C 2) Only A and B 3) Only A and D 4) Only C and D 5) Only B and D
BS

61. Volume of strategic information is


1) Condensed 2) Detailed 3) Summarised 4) Irrelevant 5) Only 1 and 2
62. Operational information is
1) Haphazard 2) Well organized 3) Unstructured 4) Partly structured 5) Only 1 and 2
63. The quality of information which does not hide any unpleasant information is known as
1) Complete 2) Trustworthy 3) Relevant 4) None of the above 5) All of the above
64. Every record stored in a Master file has a key field because
1) it is the most important field 2) it acts as a unique identification of record
3) it is the key to the database 4) it is a very concise field
5) None of These

4 / IT Quesetions
BSC Academy
65. The primary storage medium for storing archival data is
1) floppy disk 2) magnetic disk 3) magnetic tape 4) CD- ROM 5) None Of These
66. Edit program is required to

y
1) authenticate data entered by an operator 2) format correctly input data
3) detect errors in input data 4) expedite retrieving input data
5) All of the above
67. Data rejected by edit program are

em
1) corrected and re-entered 2) removed from processing 3) collected for later use
4) ignored during processing 5) Only 1 and 3
68. Online transaction processing is used because
1) it is efficient 2) disk is used for storing files 3) it can handle random queries
4) transactions occur in batches 5) None of the above
69. Off-line data entry is preferable when
(A) data should be entered without error
(B) the volume of data to be entered is large
(C) the volume of data to be entered is small

ad
(D) data is to be processed periodically
1) Only A and B 2) Only B and C 3) Only B and D 4) Only C and D 5) Only A and D
70. Batch processing is used when
(A) response time should be short
(B) data processing is to be carried out at periodic intervals
(C) transactions are in batches
(D) transactions do not occur periodically
1) Only A and B 2) Only A, C and D 3) Only B and C 4) Only A, B and C 5) Only A and D
Ac
71. A management information system is one which
1) is required by all managers of an organisation
2) processes data to yield information of value in tactical management
3) provides operational information
4) allows better management of organisations
5) Only 1 and 2
72. Data mining is used to aid in
1) operational management 2) analysing past decision made by managers
3) detecting patterns in operational data 4) retrieving archival data
5) Only 2 and 3
C

73. Data mining requires


1) large quantities of operational data stored over a period of time
2) lots of tactical data
3) several tape drives to store archival data
4) large mainframe computers
BS

5) All of these
74. Data mining cannot be done if
1) operational data has not been archived 2) earlier management decisions are not available
3) the organization is large 4) all processing had been only batch processing
5) All the above
75. Decision support systems are essential for
1) Day-to-day operations of an organisation 2) Providing statutory information
3) Top-level strategic decision making 4) Ensuring that organisations are profitable
5) Only 3 and 4

IT Quesetions / 5
BSC Academy
76. Which of the following IEEE standards deal(s) with LAN and MAN (metropolitan area network)?
1) 801 2) 803 3) 802 4) 800 5) Only 1 and 2
77. Firewalls protect against

y
1) unauthorised attacks 2) fire attacks 3) virus attacks
4) data-driven attacks 5) Only 1 and 2
78. Which of the following is not related to computer?
1) mouse 2) screen 3) bit 4) pen 5) Only 1 and 2

em
79. During cutting and pasting, the item cut is temporarily stored in
1) Hard drive 2) Clipboard 3) ROM 4) Diskette 5) Only 1 and 2
80. Two binary digits can be added using the logical circuit
1) Half adder 2) Full adder 3) Serial adder 4) Parallel adder 5) None of the Above
81. Full form of BIOS:
1) Better input output services 2) basic inner outer services 3) basic input output services
4) basic input/output system 5) None of The Above
82. The device that connects inputs to outputs:

ad
1) RAM 2) crossbar 3) crossword 4) modem 5) Only 1 and 2
83. Data entered into the computer is called
1) Input 2) Algorithm 3) Flowchart 4) Output 5) All of These
84. The process of connecting to the internet account is called
1) SIGN IN 2) LOG IN 3) LOG OUT 4) SIGN OUT 5) None of the above
85. How many values can be represented by a single byte?
1) 4 2) 16 3) 64 4) 256 5) None of the above
Ac
86. Most data communications involving telegraph lines use
1) simplex lines 2) wideband channel 3) narrowband channel 4) dialled service 5) None of these
87. Which scheme is used for mapping host names and email destinations to IP addresses?
1) DNS 2) TCP/IP 3) TELENET 4) RARP 5) None of These
88. Broad band ISDN consists of
1) Physical layer 2) Asynchronous Transfer Mode (ATM) layer
3) ATM adaptation layer 4) Only 1 and 2
5) All of the above
89. The ________ component is not present in every router.
1) POST 2) DRAM 3) Mini-IOS 4) Bootstrap 5) None of these
C

90. The linker produces a ________ which contains binary codes for all compound modules.
1) Bit file 2) Load file 3) Link file 4) Object Program 5) None of These
91. In C++ we can use the same function name to create functions that perform a variety of different tasks.This is known
as
1) Inheritance 2) Global function 3) Function overloading
BS

4) Only 1 and 2 5) All of the above


92. Which of the following is the easiest software development process model?
1) Prototyping 2) Waterfall model 3) Spiral model
4) Interactive enhancement 5) None of the above
93. C++ was developed by
1) Bjarne Stroustrup 2) Dennis Ritchie 3) Tannenbaum 4) Milan Melkovinec 5) None of These
94. If the disk head is located initially at 32, find the number of disk moves required with FCFS if the disk queue of I/O blocks
requests are 98, 37, 14, 124, 65, 67.
1) 324 2) 321 3) 310 4) 315 5) 320

6 / IT Quesetions
BSC Academy
95. The action of parsing the source program into proper syntactic classes is known as
1) Lexical analysis 2) Syntax Analysis 3) General Syntax Analysis
4) Interpretation Analysis 5) None of the above

y
96. Resolution of externally defined symbols is performed by
1) Loader 2) Linker 3) Compiler 4) Assembler 5) None of These
97. Which language is best used for real time system?
1) Java 2) C 3) Assembly 4) C++ 5) None of these

em
98. In the UNIX systems the user can change the access rights of the file to different users by using
1) Tail 2) PID 3) Chmod 4) Head 5) None of These
99. Which of the following Unix commands is used to create empty files?
1) Vi 2) Cat 3) Touch 4) Pico 5) None of these
100. Both Go-Back-N and Selective-Repeat Protocols use a
1) sliding frame 2) sliding window 3) sliding data 4) sliding packet 5) None of these
101. Which of the memories has the shortest access time?
1) Cache Memory 2) RAM 3) Magnetic Bubble Memory

ad
4) Magnetic Core Memory 5) All the above have equal access time.
102. The IEEE 802.6 standard describes a ________ standard called Distributed Queue Dual Bus (DQDB).
1) WAN 2) MAN 3) LAN 4) Internet 5) None of the above
103. The list with no nodes on it is called
1) Null List 2) Empty List 3) Blank List 4) Both 1 and 2 5) None of the above
104. ________ uses thin coaxial cable.
1) 10Base2 2) 10Base5 3) 10Base-T 4) 10Base-F 5) None of these
Ac
105. The input of Lex is
1) Statement 2) Numeric Data 3) Set of regular expressions
4) ASCII Code 5) None of these
106. Which of the following is not a logical database structure?
1) Relational 2) Network 3) Chain 4) Tree 5) None Of These
107. CIDR (Classless Inter Domain Routing) is most often used in
1) class C Networks 2) class A Networks 3) class B Networks 4) Only 1 and 2 5) None of the above
108. Which of the following operators in C does not associate from the right?
1) , 2) = 3) + 4) ++ 5) None of the above
109. Which language has recently become the de facto standard for interfacing application programs with relational database
C

system?
1) SQL 2) Oracle 3) 4 GL 4) Database 5) None of the above
110. Sockets are used in
1) Data link Layer 2) Physical Layer 3) Transport Layer 4) Network Layer 5) None of the above
111. Lexical Analyzer transforms an input stream into
BS

1) Regular expression 2) Binary 3) Symbols 4) Sequence of tokens 5) None of these


112. In which manner should we traverse a binary search tree so that elements are visited in ascending order?
1) Preorder 2) Inorder 3) Postorder 4) Graph 5) None of These
113. 253.45.67.9 is a class ________ address.
1) D 2) A 3) E 4) C 5) None of These
114. Semantic errors can be detected
1) At compile time only 2) Both at compile time and at run time
3) At run time only 4) All of the above
5) None of these

IT Quesetions / 7
BSC Academy
115. Which of the following communication modes supports two-way traffic but in only one direction at a time?
1) Duplex 2) Simplex 3) Three- Quarters Duplex
4) Half-Duplex 5) All of the above

y
116. In a PC-to-telephone hookup for long-distance communication, modem is connected between the telephone line and
1) Synchronous Port 2) PC 3) Cross-Over Cable
4) Asynchronous Port 5) None of These
117. In compilers, syntax analysis is done by

em
1) Scanner 2) Parser 3) Code generator 4) Lexical analyser 5) None of these
118. RAD (Rapid Application Development) is not appropriate when
1) Technical risks are high 2) Findings are already done 3) Testing is not needed
4) Only 1 and 2 5) None of These
119. In queues, the items are deleted at one end called
1) Front 2) Top 3) Base 4) Rear 5) None of These
120. If a memory page containing a heavily used variable that was initialised very early and is in constant use is removed, then
the page replacement algorithm used is
1) FIFO 2) LFU 3) LRU 4) All of These 5) None of These

ad
121. When you connect to an online information service you are asked to provide some kind of identification such as your
name, an account number and a password. What is the name given to this brief dialogue between you and information
system?
1) Security Procedure 2) Log-on Procedure 3) Safeguard Procedure
4) Identification Procedure 5) None of These
122. Which of these determines authorised sign in an EDI (Electronic Data Interchange) transaction?
1) Masking 2) Spoofing 3) Digital Signature
Ac
4) Privacy Key Cryptosystems 5) None of these
123. C is a ________- generation language.
1) 3rd 2) 4th 3) 5th 4) 2nd 5) None of These
124. Which of the following usually creates bad sector on hard disk?
1) Trojan 2) Worm 3) Stealth Virus 4) All of these 5) None of these
125. When an organisation gives contract for development of software, it has to give data to the service provider. In such
cases, the ownership of data should be
1) Shared by both parties 2) Transferred to the service provider
3) With the client organisation that outsources service 4) Not transferred
5) None of These
C

126. ________ cant be used for source of data automation.


1) OCR 2) UPC 3) POS Terminal 4) Keyboard 5) None of these
127. Switched mode power supply
1) Converts DC to AC
2) Converts raw input power to controlled voltage and current
BS

3) Enhances output of a circuit


4) Switches to and fro between high and low power fluctuations
5) None of these
128. Which of the following is false about OS?
1) Acts as command processor 2) Acts as compiler 3) Acts as manager
4) All are true 5) None of these
129. Which of the following is incorrect?
1) LAN is faster than MAN. 2) Servers are powerful PCs.
3) Clients can store information. 4) Peer-to-peer networks have high security.
5) None of these

8 / IT Quesetions
BSC Academy
130. Which segment identifies the kind of business documents in an EDI transmission?
1) ISA 2) GS 3) ST 4) SE 5) All of these
131. Disk Scanners are

y
1) Anti-virus protection systems 2) 8086s supplementary IC 3) Aftereffects of virus
4) All of these 5) None of the above
132. Array is a set of ________ objects.
1) Different types of 2) Unique 3) Unwanted 4) Same type of 5) None of These

em
133. The operating system is also
1) Control System 2) Special System 3) Administrator Division
4) Boot Sector 5) None of These
134. Which of the following identification techniques provides the best means of user authentication?
1) What the user knows 2) What the user is
3) What the user has 4) What is user has and what the user knows
5) None of These
135. The earliest approach that was used for software development was
1) Incremental development model 2) Waterfall model 3) Spiral development model

ad
4) Rapid prototyping model 5) None of These
136. To make a program safe we should take care of
1) Strong authentication and access controls 2) Doing risk analysis
3) Error-checking controls 4) All of these
5) None of these
137. If the network of the company is to be protected from remote access that may damage companys reputation due to
misuse of information, then security policy should include
Ac
1) Only the employer 2) All the employees 3) Contractors
4) All the above 5) None of these
138. TCP/IP protocol stack is
1) A family of protocols that connect to PCs 2) Part of Internet
3) A combination of TCP and IP protocols 4) Only 1 and 2
5) All of these
139. What is a non-dedicated server?
1) A workstation that can double up as a server 2) A computer reserved for a special task
3) A computer reserved for special task 4) Only 1 and 2
5) None of the above
C

140. The process of organising the memory into two banks to allow 8- and 16-bit data operation is called?
1) Indexed mapping 2) Bank switching 3) Two-way memory interleaving
4) Memory segmentation 5) None of these
141. Which of the following is a layer of object-oriented design pyramid?
1) Message Layer 2) Subsystem layer 3) Class and Object Layer
BS

4) All of the above 5) None of the above


142. The OSPF was created to overcome the drawbacks that ________ faced.
1) VLSM 2) IGRP 3) EIRP 4) RIP 5) None of These
143. FDDI is
1) Star Network 2) Mesh Network 3) Ring Network
4) Bus-Based Network 5) All of the above
144. Fragment Free Switches check ________ bytes of data.
1) 64 2) 24 3) 16 4) 4 5) 9

IT Quesetions / 9
BSC Academy
145. The main advantages of CMOS as compared to TTL:
1) Lower power consumption with low fan-out 2) Lower power consumption and better noise margins
3) Higher speed operation with low power consumption 4) Higher power consumption with high fan-out
5) None of these

y
146. RISC processor has
1) All operations done within the register and CPU 2) Relatively few instructions and addressing modes
3) Single-cycle instruction execution 4) Only 1 and 2

em
5) All of these
147. A loading scheme in which loading and linking of external references are postponed until execution time:
1) Dynamic loading 2) Direct linking loader 3) Relocating loader
4) Dynamic linking 5) None of These
148. Backtracking problem is seen in
1) LR Parser 2) Predictive Parser 3) Recursive Descent Parser
4) None of these 5) All of the above
149. Which of the following filename extension suggests that the file is a backup copy of another file?
1) BAK 2) TXT 3) BAS 4) COM 5) None of These

ad
150. Connected graphs without circuits is called a
1) Hamiltonian graph 2) Euler graph 3) Path
4) Tree 5) All of these are types of graph
151. What replacement policy is used by Windows NT?
1) LRU 2) NFU 3) FIFO 4) Clock replacement 5) None of the above
152. The graph K (3, 4), a complete bipartite graph, has
1) 4 edges 2) 8 edges 3) 10 edges 4) 12 edges 5) 3 edges
Ac
153. The database schema is written in
1) DML 2) HLL 3) DDL 4) DCL 5) None of these
154. What is the average waiting time (in minutes) in FCFS of a given process p1, p2, p3, p4 if the execution time are 5, 10, 8,
3 minutes and turnaround time are 5, 15, 23, 26 minutes?
1) 10 2) 10.75 3) 12.75 4) 12 5) 13
155. In an architecture of a database system external level is the
1) logical level 2) physical level 3) conceptual level 4) view level 5) None of these
156. In a circular linked list
1) Components are all linked together in some sequential manner
2) There is no beginning and no end
C

3) Components are arranged hierarchically


4) Forward and backward transversal within the list is permitted
5) None of these
157. The statement in SQL which allows to change the definition of a table is
1) Alter 2) Create 3) Update 4) Select 5) None of these
BS

158. A technique for direct searching is


1) binary search 2) hashing 3) tree search 4) linear Search 5) None of these
159. Maximum number of nodes in B-tree at depth h and order t (root of depth 0) is given by
1) t(h + 1) 2) 2t(h 1) 3) t(h 1) 4) 2t(h + 1) 5) None of these
160. Which of the following can be a sequence of nodes examined in a binary search tree while searching for key 98?
1) 100, 50, 75, 60, 98 2) 100, 120, 90, 95, 98 3) 200, 70, 100, 95, 98
4) 75, 150, 90, 80, 98 5) None of these
161. What protocol is used between e-mail servers?
1) SMTP 2) FTP 3) SNMP 4) TCP 5) None of these

10 / IT Quesetions
BSC Academy
162. The way a card game player arranges his cards as he picks them up one by one, is an example of
1) Selection Sort 2) Bubble Sort 3) Insertion sort 4) Merge sort 5) None of these
163. Which phase is not available in software life cycle?

y
1) Design 2) Testing 3) Coding 4) Abstraction 5) Maintenance
164. Which type of error detection uses binary division?
1) Parity check 2) Longitudinal Redundancy checking (LRC)
3) Checksum Checking 4) Cyclic Redundancy Checking (CRC)

em
5) None of these
165. Basis path testing is
1) Both black and white box testing method 2) White box testing method
3) Unique testing method 4) Black box testing method
5) None of these
166. If you want to tell the database management system that a specific attribute contained numbers only, what will you need
to set?
1) Data type 2) Data category 3) Data dictionary 4) Data definition 5) Data Integrity
167. When you link one database table to another database table, what are you creating?

ad
1) Connectivity 2) Primary Link 3) Relationships 4) Referential integrity 5) Foreign key
168. The process known as ________ is used by large retailers to study trends.
1) POS 2) Data selection 3) Data mining 4) Data conversion 5) None of these
169. Accessing records from a file directly without searching from the beginning of the file is called
1) Time sharing 2) Random 3) Direct access 4) Access time 5) None of these
170. Bankers algorithm for resource allocation deals with
1) deadlock preventation 2) deadlock avoidance 3) deadlock recovery
Ac
4) mutual exclusion 5) None of these
171. Which of the following performs modulation and demodulation?
1) Modem 2) Satellite 3) Coaxial Cable 4) Optical fiber 5) Router
172. In TCP/IP protocol, checksum field contains ________-bit value which is used for ________.
1) 32, deadlock avoidance 2) 48, error detection 3) 16, error detection
4) 16, deadlock avoidance 5) None of these
173. Granting an outside organisation access to Internet web pages is often implemented using a(n)
1) Extranet 2) Intranet 3) Internet 4) Hacker 5) None of these
174. What is the advantage of packet switching over message switching?
C

1) The first packet of multipacket message can be forwarded before the second one has fully arrived.
2) reduces delay and improves throughput
3) advance setup not required
4) All the above
5) None of these
175. The third-generation computers were based on
BS

1) transistors 2) valves 3) ICs 4) vacuum tubes 5) None of these


176. Generalisation is a ________ process.
1) top-down 2) bottom-up 3) Both 1 and 2 4) vertical 5) None of these
177. Spooling is most beneficial in a multiprogramming environment where
1) most jobs are I/O-bound
2) most jobs are CPU-bound
3) jobs are evenly divided as I/O-bound and CPU-bound
4) there is limited primary memory and there is a need for secondary memory
5) None of these

IT Quesetions / 11
BSC Academy
178. A flip-flop can store
1) Two bits of data 2) One bit of data 3) Three bits of data
4) Any number of bits of data 5) All the above

y
179. ________ command lists directory content of files and directories.
1) cat 2) cp 3) ls 4) mkdir 5) None of these
180. Which of the following is true about the data warehouse environment architecture?
1) It contains a data warehouse methodology, analysis design, construction and administration.

em
2) It increases processing power and sophistication of analytical tools and techniques that have resulted in the
development of data warehouses.
3) It provides storage, functionality, and responsiveness to queries beyond the capabilities of transaction-oriented
databases.
4) All the above
5) None of these
181. Altering of data so that it is not usable unless the changes are undone is called
1) Encryption 2) Compression 3) Biometrics 4) Ergonomics 5) None of these
182. A ________ main purpose is to prohibit unauthorised access to your computer via the Internet.

ad
1) popup blockers 2) firewalls 3) spyware blockers
4) spam assassins 5) None of these
183. When one computer provides services to another computer, the environment is a(n) ________ infrastructure.
1) client/server 2) dependent 3) independent 4) reliant 5) None of these
184. Object oriented programming relies on three basic concepts. These are
1) data abstraction, inheritance and array 2) data abstraction, inheritance and polymorphism
3) encapsulation, inheritance and polymorphism 4) inheritance, I/O, class
Ac
5) None of these
185. A ________ can check the MAC addresses contained in the frame.
1) bridge 2) repeater 3) passive hub 4) router 5) All the above
186. Each station on an Ethernet network has a unique ________ address imprinted on its network interface card (NIC).
1) 5-byte 2) 32-bit 3) 64-bit 4) 48-bit 5) None of these
187. Decryption and encryption of data are the responsibilities of the ________ layer.
1) Physical 2) Data link 3) Presentation 4) Session 5) Application
188. The communication mode that supports data in both the directions at the same time is called
1) Half duplex 2) Simplex 3) Full duplex 4) Multiplex 5) None of these
189. The functions AVG, COUNT, MAX and MIN are
C

1) supported only by SQL 2) supported only by QBE 3) supported by both SQL and QBE
4) supported by ORACLE 5) supported by none
190. Multivalued dependency among attributes is checked at which level?
1) 2NF 2) 3NF 3) 4NF 4) 5NF 5) None of these
191. A full binary tree with n leaves contains
BS

1) 2n nodes 2) log2n nodes 3) 2n 1 nodes 4) n nodes 5) None of these


192. The postfix form of an expression (A+B)*(C*D-E)*F/G is
1) AB+CD*E-FG/** 2) AB+CD*E-F**G/ 3) AB+CD*E-*F*G/
4) AB+CDE*-*F*G/ 5) None of these
193. Slotted ALOHA
1) Divides time into discrete intervals 2) Requires global time synchronisation
3) Is used for data transfer 4) All the above
5) None of these

12 / IT Quesetions
BSC Academy
194. What type of technology allows you to use your finger, eye, or voice print to secure your information resources?
1) RFID 2) Caves 3) Biometrics 4) Haptics 5) None of these
195. A ________ can be used as a connecting device between two internetworks that use different models.

y
1) repeater 2) router 3) bridge 4) gateway 5) hub
196. IP address has been classified into five classes A, B, C, D and E. What is address range of class B?
1) 0.0.0.0 to 126.255.255.255 2) 128.1.0.1 to 191.255.255.255 3) 244.0.0.0 to 239.255.255.255
4) 192.0.1.1 to 223.255.255.255 5) None of these

em
197. Relation in the relational database model is defined as the set of ________ that have the same attributes.
1) objects 2) relations 3) tuples 4) attributes 5) None of these
198. Ifalphaisasetofattributesandbetaisasubsetofalpha,thenalphaholdsbeta.InArmstrongsAxioms,thisisknown
as
1) augmentation rule 2) reflexivity rule 3) transitivity rule 4) passivity rule 5) None of these
199. In an E-R diagram, total participation is represented by
1) circle 2) single line 3) double lines 4) concentric circles 5) None of these
200. If a key attribute of a relation is referred in another relation, it is called

ad
1) domain key 2) referential key 3) relation key 4) foreign key 5) None of these

Answers
1. 4 2. 2 3. 4 4. 1 5. 3 106. 3 107. 1 108. 1 109. 1
6. 4 110. 5; Session Layer
7. 3; Address Resolution Protocol 111. 4 112. 2 113. 3 114. 1 115. 4
Ac
8. 4 9. 4 10. 3 116. 4 117. 2 118. 1 119. 1 120. 1
11. 3 12. 4 13. 4 14. 3 15. 2 121. 2 122. 3 123. 1 124. 5 125. 3
16. 3 17. 4 18. 4 19. 3 20. 4 126. 4 127. 2 128. 2 129. 4 130. 2
21. 4 22. 2 23. 2 24. 2 25. 4 131. 1 132. 4 133. 3 134. 2 135. 2
26. 2 27. 1 28. 1 29. 4 30. 1 136. 1 137. 4 138. 1 139. 1 140. 3
31. 2 32. 3 33. 2 34. 1 35. 3 141. 4
36. 1 37. 4 38. 2 39. 4 40. 2 142. 4; Routing Information protocol
41. 1 42. 2 43. 5 44. 1 45. 3 143. 3 144. 1 145. 2
46. 1 47. 3 48. 2 49. 3 50. 2 146. 5 147. 4 148. 3 149. 1 150. 4
51. 2 52. 2 53. 3 54. 3 55. 3 151. 3 152. 4 153. 1 154. 4 155. 2
C

56. 2 57. 5 58. 1 59. 1 60. 2 156. 2 157. 3 158. 2 159. 3 160. 5
61. 1 62. 2 63. 2 64. 2 65. 3 161. 1 162. 3 163. 4 164. 4 165. 2
66. 3 67. 1 68. 3 69. 3 70. 3 166. 1 167. 1 168. 3 169. 3 170. 4
71. 2 72. 3 73. 1 74. 1 75. 3 171. 1 172. 3 173. 1 174. 2 175. 3
76. 3 77. 1 78. 4 79. 2 80. 1 176. 2 177. 3 178. 2 179. 3 180. 4
81. 4 82. 2 83. 1 84. 2 85. 4 181. 1 182. 2 183. 1 184. 3 185. 1
BS

86. 3 87. 1 88. 5 89. 2 90. 3 186. 4 187. 3 188. 3 189. 3 190. 2
91. 3 92. 2 93. 1 94. 2 95. 1 191. 3 192. 4 193. 4 194. 3 195. 4
96. 2 97. 1 98. 3 99. 3 100. 2 196. 2 197. 3 198. 2 199. 3 200. 4
101. 1 102. 2 103. 4 104. 1 105. 3

IT Quesetions / 13
OBJECTIVE TYPE QUESTIONS

Computer Architecture

PART I

OBJECTIVE TYPE QUESTIONS

Choose correct or the best alternative in the following:

Q.1 In a virtual memory system, the addresses used by the programmer belongs to
(A) memory space. (B) physical addresses.
(C) address space. (D) main memory address.
Ans: C
An address used by programmers in a system supporting virtual memory concept is
called virtual address and the set of such addresses are called address space.
Q.2 The method for updating the main memory as soon as a word is removed from the
Cache is called
(A) Write-through (B) write-back
(C) protected write (D) cache-write
Ans: B
In this method only cache location is updated during write operation.
Q.3 A control character is sent at the beginning as well as at the end of each block in the
synchronous-transmission in order to
(A) Synchronize the clock of transmitter and receiver.
(B) Supply information needed to separate the incoming bits into individual
character.
(C) Detect the error in transmission and received system.
(D) Both (A) and (C).
Ans B
As the data are sent continuously as a block of data at the rate dictated by the clock
frequency, so the receiver should be supplied with the same function about the same
bit length in order to interrupt the information.
Q.4 In a non-vectored interrupt, the address of interrupt service routine is
(A) Obtained from interrupt address table.
(B) Supplied by the interrupting I/O device.
(C) Obtained through Vector address generator device.
(D) Assigned to a fixed memory location.
Ans: D
The source device that interrupted the processor supply the vector address which
helps processor to find out the actual memory location where ISR is stored for the
device.
Q.5 Divide overflow is generated when
(A) Sign of the dividend is different from that of divisor.
(B) Sign of the dividend is same as that of divisor.
(C) The first part of the dividend is smaller than the divisor.
Ans: B
If the first part of the dividend is greater than the deviser, then the result should be
of greater length, then that can be hold in a register of the system. The registers are
of fixed length in
any processor.
Q.6 Which method is used for resolving data dependency conflict by the compiler
itself?
(A) Delayed load. (B) operand forwarding.
(C) Pre fetch target instruction. (D) loop buffer.
Ans: A
In case of delayed load technique the complier detects the data conflict and reorder
the instruction as necessary to delay the loading of the conflicting data by inserting
no operation instructions.
Q.7 Stack overflow causes
(A) Hardware interrupt.
(B) External interrupt.
(C) Internal interrupt.
(D) Software interrupt.
Ans: C
Stack overflow occurs while execution of a program due to logical faults. So it is a
program dependent, hence interrupt activated.
Q.8 Arithmetic shift left operation
(A) Produces the same result as obtained with logical shift left operation.
(B) Causes the sign bit to remain always unchanged.
(C) Needs additional hardware to preserve the sign bit.
(D) Is not applicable for signed 2's complement representation.
Ans: A
If the register hold minus five in twos compliment form than in arithmetic shift left
the contents of the register shall be
It is found that the register contents multiplied by two after logical shift left
operation. Hence arithmetic shift left operation is same as logical shift operation.

Q.9 Zero address instruction format is used for


(A) RISC architecture.
(B) CISC architecture.
(C) Von-Neuman architecture.
(D) Stack-organized architecture.
Ans: D
In stack organized architecture push and pop instruction is needs a address field to
specify the location of data for pushing into the stack and destination location
during pop operation but for logic and arithmetic operation the instruction does not
need any address field as it operates on the top two data available in the stack.
Q.10 Address symbol table is generated by the
(A) memory management software.
(B) assembler.
(C) match logic of associative memory.
(D) generated by operating system
Ans: B
During the first pass of assembler address symbol table is generated which contains
the label used by the programmer and its actual address with reference to the stored
program.
Q.11 The ASCII code for letter A is
(A) 1100011 (B) 1000001
(C) 1111111 (D) 0010011
Ans. (B)
Q.12 The simplified expression of (A+B) + C is
(A) (A + B)C (B) A(B + C)
(C) (C+A + B) (D) None of these
Ans. (A)
Q.13 The negative numbers in the binary system can be represented by
(A) Sign magnitude (B) I's complement
(C) 2's complement (D) All of the above
Ans. (C)
Q.14 ABCD - seven segment decoder / driver in connected to an LED display.
Which segments are illuminated for the input code DCBA = 0001.
(A)b, c (B) c, b
(C)a, b, c (D) a, b, c, d
Ans. (A)
Q.15 How many flip-flops are required to produce a divide-by-32 device?
(A)4 (B) 6
(C)5 (D) 7
Ans. (C)
Q.16 The content of a 4-bit register is initially 1101. The register is shifted 2 times to
the right with the serial input being 1011101.
What is the content of the register after each shift?
(A)1110, 0111 (B) 0001, 1000
(C)1101, 1011 (D) 1001, 1001
Ans. (A)
Q.17 How many different addresses are required by the memory that contain 16K
words?
(A)16,380 (B) 16,382
(C)16,384 (D) 16,386
Ans. (C)
Q.18 What is the bit storage capacity of a ROM with a 512' 4-organization?
(A) 2049 (B) 2048
(C) 2047 (D) 2046
Ans. (B)
Q.19 DMA interface unit eliminates the need to use CPU registers to transfer data
from
(A) MAR to MBR (B) MBR to MAR
(C) I/O units to memory (D) Memory to I/O units
Ans. (D)
Q.20 How many 128 x 8 RAM chips are needed to provide a memory capacity of
2048 bytes?
(A) 8 (B) 16
(C) 24 (D) 32
Ans. (B)
Q.21 Which of the following is a self complementing code?
(A) 8421 code (B) 5211
(C) Gray code (D) Binary code
Ans. (A)
Q.22 Which gate can be used as anti-coincidence detector?
(A) X-NOR (B) NAND
(C) X-OR (D) NOR
Ans. (C)
Q.23 Which of the following technology can give high speed RAM?
(A) TTL (B) CMOS
(C) ECL (D) NMOS
Ans. (C)
Q.24 In 8085 microprocessor how many I/O devices can be interfaced in I/O mapped
I/O technique?
(A) Either 256 input devices or 256 output devices.
(B) 256 I/O devices.
(C) 256 input devices & 256 output devices.
(D) 512 input-output devices.
Ans. (C)
Q.25 After reset, CPU begins execution of instruction from memory address
(A) 0101H (B) 8000H
(C) 0000H (D) FFFFH
Ans. (C)
Q.26 Which is true for a typical RISC architecture?
(A) Micro programmed control unit.
(B) Instruction takes multiple clock cycles.
(C) Have few registers in CPU.
(D) Emphasis on optimizing instruction pipelines.
Ans. (A)
Q.27 When an instruction is read from the memory, it is called
(A) Memory Read cycle (B) Fetch cycle
(C) Instruction cycle (D) Memory write cycle
Ans. (B)
Q.28 Which activity does not take place during execution cycle?
(A) ALU performs the arithmetic & logical operation.
(B) Effective address is calculated.
(C) Next instruction is fetched.
(D) Branch address is calculated & Branching conditions are
checked.
Ans. (D)
Q.29 A circuit in which connections to both AND and OR arrays can be
programmed is called
(A) RAM (B) ROM
(C) PAL (D) PLA
Ans. (A)
Q.30 If a register containing data (11001100)2 is subjected to arithmetic shift left
operation, then the content of the register after 'ashl' shall be
(A) (11001100)2 (B) (1101100)2
(C) (10011001)2 (D) (10011000)2
Ans. (D)
Q.31 Which logic is known as universal logic?
(A) PAL logic. (B) NAND logic.
(C) MUX logic. (D) Decoder logic.
Ans. (B)
Q.32 The time for which the D-input of a D-FF must not change after the clock is
applied is known as
(A) Hold time. (B) Set-up time.
(C) Transition time. (D) Delay-time.
Ans. (A)
Q.33 How many memory chips of (128 x 8) are needed to provide a memory
capacity of 4096 x 16?
(A)64 (B) A B
(C)32 (D) None
Ans. (A)
Q.34 In addition of two signed numbers, represented in 2' s complement form
generates an overflow if
(A) A. B = 0 (B) A = 0
(C) A B = 1 (D) A + B = 1
Ans. (C)
Where A is the carry in to the sign bit position and B is the carry out of the
Sign bit position.
Q.35 Addition of (1111)2 to a 4 bit binary number 'a' results:-
(A) Incrementing A (B) Addition of (F)H
(C) No change (D) Decrementing A
Ans. (C)
Q.36 In a microprocessor system, suppose. TRAP, HOLD, RESET Pin
got activated at the same time, while the processor was executing some
instructions, then it will first respond to
(A) TRAP (B) HOLD
(C) RESET (D) None
Ans. (D)
Q.37 Pseudo instructions are
(A) Machine instructions (B) Logical instructions
(C) Micro instructions (D) instructions to assembler.
Ans. (A)
Q.38 An attempt to access a location not owned by a Program is called
(A) Bus conflict (B) Address fault
(C) Page fault (D) Operating system fault
Ans. (B)
Q. 39 Dynamic RAM consumes ________ Power and ________ then the Static RAM.
(A) more, faster (B) more, slower
(C) less, slower (D) less, faster
Ans. (C)
Q.40 The flag register content after execution of following program by 8085
microprocessor shall be
Program
SUB A
MVI B, (01)H
DCR B
HLT
(A) (54)H (B) (44)H
(C) (45)H (D) (55)H
Ans. (A)
Q.41 Which flag of the 8085's flag register is not accessible to programmer
directly?
(A)Zero flag
(B)Carry flag
(C)Auxiliary carry flag
(D)Parity flag
Ans. (C)
Q.42 Cache memory works on the principle of
(A) Locality of data.
(B) Locality of reference
(C) Locality of memory
(D) Locality of reference & memory
Ans. (B)
Q.43 Which of the following is a Pseudo instruction?
(A) SPHL (B) LXI
(C) NOP (D) END
Ans. (D)
Q.44 A demultiplexer can be used as
(A)Encoder (B)Decoder
(C)Multiplexer (D)None of the above
Ans. (B)
Q.45 Excess-3 equivalent representation of (1234)H is
(A) (1237)Ex-3 (B) (4567)Ex-3
(C) (7993)Ex-3 (D) (4663)Ex-3
Ans. (B)
Q.46 Which of the memory holds the information when the Power Supply is switched
off?
(A) Static RAM (B) Dynamic RAM
(C) EEROM (D) None of the above
Ans. (C)
Q.47 Minimum no. of NAND gate required to implement a Ex-OR function is
(A)2 (B)3
(C)4 (D)5
Ans. (C)
Q.48 Which of the following interrupt is maskable?
(A)INTR (B)RST 7.5
(C)TRAP (D)Both (A) and (B)
Ans. (B)
Q.49 Which of the following expression is not equivalent to x?
(A) x NAND x (B) x NOR x
(C) x NAND 1 (D) x NOR 1
Ans. (D)
Q.50 Word 20 contains 40
Word 30 contains 50
Word 40 contains 60
Word 50 contains 70
Which of the following instructions does not, load 60 into the Accumulator
(A) Load immediate 60
(B) Load direct 30
(C) Load indirect 20
(D) both (A) & (C)
Ans. (B)
Q.51 An interrupt for which hardware automatically transfers the program to a specific
memory location is known as
(A) Software interrupt
(B) Hardware interrupt
(C) Maskableinterrupt
(D) Vector interrupt
Ans. (B)
Q.52 Synchronous means _______
(A) At irregular intervals
(B) At same time
(C) At variable time
(D) None of these
Ans. (B)
Q.53 'n' Flip flops will divide the clock frequency by a factor of
(A)n2 (B) n
(C)2n (D) log (n)
Ans. (B)
Q.54 In DMA the data transfer is controlled by
(A)Microprocessor (B) RAM
(C)Memory (D) I/O devices
Ans. (D)
Q.55 The number of instructions needed to add a numbers an store the result in memory
using only one address instruction is
(A)n (B) n - 1
(C)n +1 (D) Independent of n
Ans. (D)
Q.56 Negative numbers cannot be represented in
(A)Signed magnitude form
(B)I's complement form
(C)2's complement form
(D)8-4-2-1 code
Ans. (C)
Q.57 Which of the following architecture is/are not suitable for realizing SIMD
(A)Vector Processor (B) Array Processor
(C)Von Neumann (D) All of the above
Ans. (C)
Q.58 In Boolean expression A+BC equals
(A)(A+B)(A+C) (B) (A'+B)(A'+C)
(C)(A+B)(A'+C) (D) (A+B)C
Ans. (A)
Q.59 A JK flip-flop can be implemented using D flip-flop connected such that
(A)D=JQ+KQ (B) D=JQ+KQ
(C)D=JQ+KQ (D) D=JQ+KQ
Ans. (A)
Q.60 An effective solution to the power consumption problem lies in using _______
transistors to implement ICs.
(A) NMOS (B) TTL shottky
(C) PMOS (D) both NMOS & PMOS
Ans. (D)
Q.61 Memory interleaving technique is used to address the memory modules in order to
have
(A) higher average utilization
(B) faster access to a block of data
(C) reduced complexity in mapping hardware
(D) both (A) & (B)
Ans. (C)
Q.62 In a multiprogramming system, which of the following is used
(A) Data parallelism (B) Paging concept
(C) L1 cache (D) None of the above
Ans. (B)
Q.63 Cycle stealing technique is used in
(A) Interrupt based data transfer
(B) Polled mode data transfer
(C) DMA based data transfer
(D) None of these
Ans. (C)
Q.64 Manipulation of individual bits of a word is often referred to as
(A) Bit twidding (B) Bit swapping
(C) Micro-operation (D) None of these
Ans. (A)
Q.65 Which of the following is not a characteristic of a RISC architecture.
(A) Large instruction set (B) One instruction per cycle
(C) Simple addressing modes (D) Register-to-register operation
Ans. (A)
Q.66 When CPU is not fully loaded, which of the following method of data transfer is
preferred
(A) DMA (B) Interrupt
(C) Polling (D) None of these
Ans. (D)
Q.67 Associative memory is some times called as
(A) Virtual memory (B) Cache memory
(C) Main memory (D) Content addressable memory
Ans. (D)
Q.68 BCD equivalent of Two's complement is
(A) nine's complement (B) ten's complement
(C) one's complement+1 (D) none of these
Ans. (C)
Q.69 PAL circuit consists of
(A) Fixed OR & programmable AND logic
(B) Programmable OR & Fixed AND Logic
(C) Fixed OR & fixed AND logic
(D) Programmable OR & programmable AND logic
Ans. (A)
Q.70 8085 microprocessor carryout the subtraction by
(A) BCD subtraction method
(B) Hexadecimal subtraction method
(C) 2s complement method
(D) Floating Point subtraction method
Ans. (C)
Q.71 CPU checks for an interrupt signal during
(A) Starting of last Machine cycle
(B) Last T-State of instruction cycle
(C) First T-State of interrupt cycle
(D) Fetch cycle
Ans. (B)
Q.72 During DMA acknowledgement cycle, CPU relinquishes

(A) Address bus only (B) Address bus & control bus
(C) Control bus & data bus (D) Data bus & address bus
Ans. (D)
Q.73 If the clock input applied to a cascaded Mod-6 & Mod-4 counter is 48KHz. Than
the output of the cascaded arrangement shall be of
(A) 4.8 KHz (B) 12 KHz
(C) 2 KHz (D) 8 KHz
Ans.(C)
Q.74 If the stack pointer is initialised with (4FEB)H, then after execution of Push
operation in 8085 microprocessor, the Stack Pointer shall be
(A) 4FEA (B) 4FEC
(C) 4FE9 (D) 4FED
Ans. (D)
Q.75 A more efficient way to organise a Page Table is by means of an associative
memory having
(A) Number of words equal to number of pages
(B) Number of words more than the number of pages
(C) Number of words less than the number of pages
(D) Any of the above
Ans. (A)
Q.76 If there are four ROM ICs of 8K and two RAM ICs of 4K words, than the address
range of Ist RAM is (Assume initial addresses correspond to ROMs)
(A) (8000)H to (9FFF)H (B) (6000)H to (7FFF)H
(C) (8000)H to (8FFF)H (D) (9000)H to (9FFF)H
Ans. (C)
Q.77 ABC is equal to A B C for
(A) A=0, B=1, C=0 (B) A=1, B=0, C=1
(C) A=1, B=1, C=1 (D) All of the above
Ans. (D)
Q.78 Gray code equivalent of (1000)2 is
(A) (1111)G (B) (1100)G
(C) (1000)G (D) None of these
Ans. (A)

79. How are data and instructions stored in the Von Neumann architecture?
A. In separate memories B. Dual ported memory
C. Unified read-write memory D. None of the above
Ans: C

80. Which of the following depicts an embedded system?


A. Multi-core processor unit.
B. Application specific Core
C. Hardware Software Combination to perform specific application
D. All of the above
Ans: C

81. The performance of a processor can be measured using


A. Clock period
B. Cycles per Instruction
C. Throughput
D. All of the above
Ans: D

82. The Memory Address register stores the address of the word stored in which part of the
architecture?
A. I/O B. Program Counter
C. Memory Buffer Register D. None of the above
Ans: C

83. What are the parts of an instruction cycle?


A. Fetch and Execute Cycle B. Fetch, decode and execute cycles
C. Decode and Store cycle D. Fetch, decode, execute and store.
Ans: A

84. Which of the following is not a state of the instruction cycle?


A. Operand address calculation
B. Data write back
C. Instruction fetch
D. None of the above.
Ans: B

85. Which of the following approach is used to handle multiple interrupts?


A. Parallel interrupt processing
B. Disable interrupts and priority assignment
C. Interrupt wait
D. None of the above.
Ans: B

86. What are the interconnection wires not in the bus structure?
A. Data lines B. Instruction lines
C. Address lines D. Control lines
Ans: B

87. In which type of timing does the clock act as a reference?


A. Interrupt timing B. Asynchronous timing
C. Synchronous timing D. Sequential timing
Ans: C

88. Which of the following is a bus arbitration scheme?


A. Round-robin B. Priority
C. First come first serve D. All of the above
Ans: D

89. Performance of the memory is decided by which of the following parameters


A. Transfer rate B. Latency
C. Cycle time D. All of the above
Ans: D
90. When is a cache block is written into the main memory
A. Valid bit is not set B. Every cycle
C. Dirty bit is set D. None of the above
Ans: C

91. An important attribute of RAM memories is


A. Random access & non-volatile B. Volatile
C. Sequential access D. None of the above
Ans: B

92. How often/how is data written into the ROM


A. Anytime/when required B. Before use by microprogramming
C. During manufacturing D. All of the above
Ans: C

93. Redundancy is a built-in feature here


A. Magnetic disks B. RAID
C. Serial I/O tapes D. Optical disks
Ans:B

94. RAID level 0 is primarily used in applications where


A. Cost is a priority B. Reliability is a priority
C. Area is a priority D. All of the above
Ans: A

95. Bit density is more in which device


A. Compact disk B. Magnetic tape
C. DVD D. Magnetic disk
Ans:C

96. Which of the following is a example for a communication I/O?


A. Monitor B. Mouse
C. Modem D. USB
Ans:C

97. This technique for data transfer does not involve the processor
A. Direct Memory access B. Programmed I/O
C. Memory-mapped I/O D. All the above
Ans:A

98. What part of the OS stores utilities or frequently accessed functions?


A. Memory B. Registers
C. Kernel D. None of the above
Ans: C

99. The memory greater than the existing RAM is


A. Main B. Associative
C. Cache D. Virtual
Ans: C

100. Name the type of interconnection structure in which all nodes are connected one central node.
A. Linear B. Mesh
C. Star D. Ring
COMPUTER ORGANIZATION AND ARCHITECTURE
BCA
Multiple choice questions

1. In Reverse Polish notation, expression A*B+C*D is written as


(A) AB*CD*+ (B) A*BCD*+ (C) AB*CD+* (D) A*B*CD+
Ans: A
2. SIMD represents an organization that ______________.
(A) refers to a computer system capable of processing several programs at the same
time.
(B) represents organization of single computer containing a control unit, processor
unit and a memory unit.
(C) includes many processing units under the supervision of a common control unit
(D) none of the above.
Ans: C
3. Floating point representation is used to store
(A) Boolean values (B) whole numbers (C) real integers (D) integers
Ans: C
4. Suppose that a bus has 16 data lines and requires 4 cycles of 250 nsecs each to
transfer data. The bandwidth of this bus would be 2 Megabytes/sec. If the cycle time
of the bus was reduced to 125 nsecs and the number of cycles required for transfer
stayed the same what would the bandwidth of the bus?
(A) 1 Megabyte/sec (B) 4 Megabytes/sec
(C) 8 Megabytes/sec (D) 2 Megabytes/sec
Ans: D
5. Assembly language
(A) uses alphabetic codes in place of binary numbers used in machine language
(B) is the easiest language to write programs
(C) need not be translated into machine language
(D) None of these
Ans: A
6. In computers, subtraction is generally carried out by
(A) 9s complement (B) 10s complement
(C) 1s complement (D) 2s complement
Ans: D
7. The amount of time required to read a block of data from a disk into memory is
composed of seek time, rotational latency, and transfer time. Rotational latency
refers to
(A) the time its takes for the platter to make a full rotation
(B) the time it takes for the read-write head to move into position over the
appropriate track
(C) the time it takes for the platter to rotate the correct sector under the head
(D) none of the above
Ans: A
8. What characteristic of RAM memory makes it not suitable for permanent storage?
(A) too slow (B) unreliable (C) it is volatile (D) too bulky
Ans: C
9. Computers use addressing mode techniques for _____________________.
(A) giving programming versatility to the user by providing facilities as pointers to
memory counters for loop control
(B) to reduce no. of bits in the field of instruction
(C) specifying rules for modifying or interpreting address field of the instruction
(D) All the above
Ans: D
10. The circuit used to store one bit of data is known as
(A) Register (B) Encoder (C) Decoder (D) Flip Flop
Ans: D
11. (2FAOC) 16 is equivalent to
(A) (195 084) 10 (B) (001011111010 0000 1100) 2
(C) Both (A) and (B) (D) None of these
Ans: B
12. The average time required to reach a storage location in memory and obtain its
contents is called the
(A) seek time (B) turnaround time (C) access time (D) transfer time
Ans: C
13. Which of the following is not a weighted code?
(A) Decimal Number system (B) Excess 3-cod
(C) Binary number System (D) None of these
Ans: B
14. The idea of cache memory is based
(A) on the property of locality of reference (B) on the heuristic 90-10 rule
(C) on the fact that references generally tend to cluster (D) all of the above
Ans: A
15. Which of the following is lowest in memory hierarchy?
(A) Cache memory
(B) Secondary memory
(C) Registers
(D) RAM
(E) None of these
Ans (B) Secondary memory

16. The addressing mode used in an instruction of the form ADD X Y, is


(A) Absolute (B) indirect (C) index (D) none of these
Ans: C
17. If memory access takes 20 ns with cache and 110 ns with out it, then the ratio (
cache uses a 10 ns memory) is
(A) 93% (B) 90% (C) 88% (D) 87%
Ans: B
18. In a memory-mapped I/O system, which of the following will not be there?
(A) LDA (B) IN (C) ADD (D) OUT
Ans: A
19. In a vectored interrupt.
(A) the branch address is assigned to a fixed location in memory.
(B) the interrupting source supplies the branch information to the processor through
an interrupt vector.
(C) the branch address is obtained from a register in the processor
(D) none of the above
Ans: B
20. Von Neumann architecture is
(A) SISD (B) SIMD (C) MIMD (D) MISD
Ans: A
21. The circuit used to store one bit of data is known as
(A) Encoder (B) OR gate (C) Flip Flop (D) Decoder
Ans: C
22. Cache memory acts between
(A) CPU and RAM (B) RAM and ROM (C) CPU and Hard Disk (D) None of these
Ans: A
23. Write Through technique is used in which memory for updating the data
(A) Virtual memory (B) Main memory
(C) Auxiliary memory (D) Cache memory
Ans: D
24. Generally Dynamic RAM is used as main memory in a computer system as it
(A) Consumes less power (B) has higher speed
(C) has lower cell density (D) needs refreshing circuitary
Ans: B
25. In signed-magnitude binary division, if the dividend is (11100) 2 and divisor is
(10011) 2 then the result is
(A) (00100) 2 (B) (10100) 2 (C) (11001) 2 (D) (01100) 2
Ans: B
26. Virtual memory consists of
(A) Static RAM (B) Dynamic RAM
(C) Magnetic memory (D) None of these
Ans: A
27. In a program using subroutine call instruction, it is necessary
(A) initialise program counter (B) Clear the accumulator
(C) Reset the microprocessor (D) Clear the instruction register
Ans: D
28. A Stack-organised Computer uses instruction of
(A) Indirect addressing (B) Two-addressing (C) Zero addressing (D) Index addressing
Ans: C
29. If the main memory is of 8K bytes and the cache memory is of 2K words. It uses
associative mapping. Then each word of cache memory shall be
(A) 11 bits (B) 21 bits (C) 16 bits (D) 20 bits
Ans: C
30 A-Flip Flop can be converted into T-Flip Flop by using additional logic circuit
(A) n TQD = (B) T D = (C) D = T . Q n (D) n TQD =
Ans: D
31. Logic X-OR operation of (4ACO) H & (B53F) H results
(A) AACB (B) 0000 (C) FFFF (D) ABCD
Ans: C
32. When CPU is executing a Program that is part of the Operating System, it is said to
be in (A) Interrupt mode (B) System mode (C) Half mode (D) Simplex mode
Ans: B
33. An n-bit microprocessor has
(A) n-bit program counter (B) n-bit address register
(C) n-bit ALU (D) n-bit instruction register
Ans: D
34. Cache memory works on the principle of
(A) Locality of data (B) Locality of memory
(C) Locality of reference (D) Locality of reference & memory
Ans: C
35. The main memory in a Personal Computer (PC) is made of
(A) cache memory. (B) static RAM
(C) Dynamic Ram (D) both (A) and (B) .
Ans: D
36. In computers, subtraction is carried out generally by
(A) 1's complement method (B) 2's complement method
(C) signed magnitude method (D) BCD subtraction method
Ans: B
37. PSW is saved in stack when there is a
(A) interrupt recognised (B) execution of RST instruction
(C) Execution of CALL instruction (D) All of these
Ans: A
38. The multiplicand register & multiplier register of a hardware circuit implementing
booth's algorithm have (11101) & (1100). The result shall be
(A) (812) 10 (B) (-12) 10 (C) (12) 10 (D) (-812) 10
Ans: A
39. The circuit converting binary data in to decimal is
(A) Encoder (B) Multiplexer (C) Decoder (D) Code converter
Ans: D
40. A three input NOR gate gives logic high output only when
(A) one input is high (B) one input is low
(C) two input are low (D) all input are high
Ans: D
41. n bits in operation code imply that there are ___________ possible distinct
operators (A) 2n (B) 2n (C) n/2 (D) n2
Ans: B
42. _________ register keeps tracks of the instructions stored in program stored in
memory.
(A) AR (Address Register) (B) XR (Index Register)
(C) PC (Program Counter) (D) AC (Accumulator)
Ans: C
43. Memory unit accessed by content is called
(A) Read only memory (B) Programmable Memory
(C) Virtual Memory (D) Associative Memory
Ans: D
44. Aging registers are
(A) Counters which indicate how long ago their associated pages have been
referenced.
(B) Registers which keep track of when the program was last accessed.
(C) Counters to keep track of last accessed instruction.
(D) Counters to keep track of the latest data structures referred.
Ans: A
45 The instruction ORG O is a
(A) Machine Instruction. (B) Pseudo instruction.
(C) High level instruction. (D) Memory instruction.
Ans: B
46 Translation from symbolic program into Binary is done in
(A) Two passes. (B) Directly (C) Three passes. (D) Four passes.
Ans: A
47 A floating point number that has a O in the MSB of mantissa is said to have
(A) Overflow (B) Underflow (C) Important number (D) Undefined
Ans: B
48 The BSA instruction is
(A) Branch and store accumulator (B) Branch and save return address
(C) Branch and shift address (D) Branch and show accumulator
Ans: B
49 State whether True or False.
(i) Arithmetic operations with fixed point numbers take longer time for execution as
compared to with floating point numbers.
Ans: True.
(ii) An arithmetic shift left multiplies a signed binary number by 2.
Ans: False.
50 Logic gates with a set of input and outputs is arrangement of
(A) Combinational circuit (B) Logic circuit (C) Design circuits (D) Register
Ans: A
51. MIMD stands for
(A) Multiple instruction multiple data (B) Multiple instruction memory data
(C) Memory instruction multiple data (D) Multiple information memory data
Ans: A
52 A k-bit field can specify any one of
(A) 3k registers (B) 2k registers
(C) K2 registers (D) K3 registers
Ans: B
53 The time interval between adjacent bits is called the
(A) Word-time (B) Bit-time (C) Turn around time (D) Slice time
Ans: B
54 A group of bits that tell the computer to perform a specific operation is known as
(A) Instruction code (B) Micro-operation (C) Accumulator (D) Register
Ans: A
55 The load instruction is mostly used to designate a transfer from memory to a
processor register known as
(A) Accumulator (B) Instruction Register
(C) Program counter (D) Memory address Register
Ans: A
56 The communication between the components in a microcomputer takes place via
the address and
(A) I/O bus (B) Data bus (C) Address bus (D) Control lines
Ans: B
57 An instruction pipeline can be implemented by means of
(A) LIFO buffer (B) FIFO buffer (C) Stack (D) None of the above
Ans: B
58 Data input command is just the opposite of a
(A) Test command (B) Control command (C) Data output (D) Data channel
Ans: C
59 A microprogram sequencer
(A) generates the address of next micro instruction to be executed.
(B) generates the control signals to execute a microinstruction.
(C) sequentially averages all microinstructions in the control memory.
(D) enables the efficient handling of a micro program subroutine.
Ans: A
60 . A binary digit is called a
(A) Bit (B) Byte (C) Number (D) Character
Ans: A
61 A flip-flop is a binary cell capable of storing information of
(A) One bit (B) Byte (C) Zero bit (D) Eight bit
Ans: A
62 The operation executed on data stored in registers is called
(A) Macro-operation (B) Micro-operation
(C) Bit-operation (D) Byte-operation
Ans: B
63 MRI indicates
(A) Memory Reference Information. (B) Memory Reference Instruction.
(C) Memory Registers Instruction. (D) Memory Register information
Ans: B
64 Self-contained sequence of instructions that performs a given computational task is
called
(A) Function (B) Procedure (C) Subroutine (D) Routine
Ans: A
65 Microinstructions are stored in control memory groups, with each group specifying a
(A) Routine (B) Subroutine (C) Vector (D) Address
Ans: A
66 An interface that provides a method for transferring binary information between
internal storage and external devices is called
(A) I/O interface (B) Input interface (C) Output interface (D) I/O bus
Ans: A
67 Status bit is also called
(A) Binary bit (B) Flag bit (C) Signed bit (D) Unsigned bit
Ans: B
68 An address in main memory is called
(A) Physical address (B) Logical address (C) Memory address (D) Word address
Ans: A
69 If the value V(x) of the target operand is contained in the address field itself, the
addressing mode is
(A) immediate. (B) direct. (C) indirect. (D) implied.
Ans: B
70 can be represented in a signed magnitude format and in a 1s complement format as
(A) 111011 & 100100 (B) 100100 & 111011
(C) 011011 & 100100 (D) 100100 & 011011
Ans: A
71 The instructions which copy information from one location to another either in the
processors internal register set or in the external main memory are called
(A) Data transfer instructions. (B) Program control instructions.
(C) Input-output instructions. (D) Logical instructions.
Ans: A
72 A device/circuit that goes through a predefined sequence of states upon the
application of input pulses is called
(A) register (B) flip-flop (C) transistor. (D) counter.
Ans: D
73. The performance of cache memory is frequently measured in terms of a quantity
called
(A) Miss ratio. (B) Hit ratio. (C) Latency ratio. (D) Read ratio.
Ans: C
74. The information available in a state table may be represented graphically in a
(A) simple diagram. (B) state diagram. (C) complex diagram. (D) data flow diagram.
Ans: B
75 Content of the program counter is added to the address part of the instruction in
order to obtain the effective address is called.
(A) relative address mode. (B) index addressing mode.
(C) register mode. (D) implied mode.
Ans: A
76 An interface that provides I/O transfer of data directly to and form the memory unit
and peripheral is termed as
(A) DDA. (B) Serial interface. (C) BR. (D) DMA.
Ans: D
77 The 2s compliment form (Use 6 bit word) of the number 1010 is
(A) 111100. (B) 110110. (C) 110111. (D) 1011.
Ans: B
78 A register capable of shifting its binary information either to the right or the left is
called a
(A) parallel register. (B) serial register. (C) shift register. (D) storage register.
Ans: C
79 What is the content of Stack Pointer (SP)?
(A) Address of the current instruction (B) Address of the next instruction
(C) Address of the top element of the stack (D) Size of the stack.
Ans: C
80 Which of the following interrupt is non maskable
(A) INTR. (B) RST 7.5. (C) RST 6.5. (D) TRAP.
Ans: D
81 Which of the following is a main memory
(A) Secondary memory. (B) Auxiliary memory.
(C) Cache memory. (D) Virtual memory.
Ans: C
82 Which of the following are not a machine instructions
(A) MOV. (B) ORG. (C) END. (D) (B) & (C) .
Ans: D
83 In Assembly language programming, minimum number of operands required for an
instruction is/are
(A) Zero. (B) One. (C) Two. (D) Both (B) & (C) .
Ans: A
84 The maximum addressing capacity of a micro processor which uses 16 bit database &
32 bit address base is
(A) 64 K. (B) 4 GB. (C) both (A) & (B) . (D) None of these.
Ans: B
85 The memory unit that communicates directly with the CPU is called the
(A) main memory (B) Secondary memory
(C) shared memory (D) auxiliary memory.
Ans: A
86 The average time required to reach a storage location in memory and obtain its
contents is called
(A) Latency time. (B) Access time.
(C) Turnaround time. (D) Response time.
Ans: B
State True or False
87 A byte is a group of 16 bits.
Ans: False
88 A nibble is a group of 16 bits.
Ans: False
89 When a word is to be written in an associative memory, address has got to be
given.
Ans: False
90 When two equal numbers are subtracted, the result would be ______and
not_________.
Ans: +ZERO, -ZERO.
91 A ___________development system and an ______are essential tools for writing
large assembly language programs.
Ans: Microprocessor, assembler
92 In an operation performed by the ALU, carry bit is set to 1 if the end carry C 8 is
________. It is cleared to 0 (zero) if the carry is ______ _______.
Ans: One, zero
93 A successive A/D converter is
(A) a high-speed converter. (B) a low speed converter.
(C) a medium speed converter. (D) none of these.
Ans: C
94 When necessary, the results are transferred from the CPU to main memory by
(A) I/O devices. (B) CPU. (C) shift registers. (D) none of these.
Ans: C
96 A combinational logic circuit which sends data coming from a single source to two
or more separate destinations is
(A) Decoder. (B) Encoder. (C) Multiplexer. (D) Demultiplexer.
Ans: D
97 In which addressing mode the operand is given explicitly in the instruction
(A) Absolute. (B) Immediate . (C) Indirect. (D) Direct.
Ans: B
98 A stack organized computer has
(A) Three-address Instruction. (B) Two-address Instruction.
(C) One-address Instruction. (D) Zero-address Instruction.
Ans: D
99 A Program Counter contains a number 825 and address part of the instruction
contains the number 24. The effective address in the relative address mode, when
an instruction is read from the memory is
(A) 849. (B) 850. (C) 801. (D) 802.
Ans: B
102 A page fault
(A) Occurs when there is an error in a specific page.
(B) Occurs when a program accesses a page of main memory.
(C) Occurs when a program accesses a page not currently in main memory.
(D) Occurs when a program accesses a page belonging to another program.
Ans: C
103. The load instruction is mostly used to designate a transfer from memory to a
processor register known as____.
A. Accumulator B. Instruction Register
C. Program counter D. Memory address Register
Ans: A
104. A group of bits that tell the computer to perform a specific operation is
known as____.
A. Instruction code B. Micro-operation
C. Accumulator D. Register
Ans: A
105. The time interval between adjacent bits is called the_____.
A. Word-time B. Bit-time
C. Turn around time D. Slice time
Ans: B
106. A k-bit field can specify any one of_____.
A. 3k registers B. 2k registers
C. K2 registers D. K3 registers
Ans: B
107. MIMD stands for _____.
A. Multiple instruction multiple data
B. Multiple instruction memory data
C. Memory instruction multiple data
D. Multiple information memory data
Ans: A
108. Logic gates with a set of input and outputs is arrangement of______.
A. Computational circuit
B. Logic circuit
C. Design circuits
D. Register
Ans: A
109. The average time required to reach a storage location in memory and obtain
its contents is called_____.
A. Latency time. B. Access time.
C. Turnaround time. D. Response time.
Ans: B
110. The BSA instruction is______.
A. Branch and store accumulator B. Branch and save return address
C. Branch and shift address D. Branch and show accumulator
Ans: B
111. A floating point number that has a O in the MSB of mantissa is said to
have_____.
A. Overflow B. Underflow
C. Important number D. Undefined
Ans: B
112. Translation from symbolic program into Binary is done in_____.
A. Two passes. B. Directly
C. Three passes. D. Four passes.
Ans: A
113. The instruction ORG O is a______.
A. Machine Instruction. B. Pseudo instruction.
C. High level instruction. D. Memory instruction.
Ans: B
114. Aging registers are _______.
A. Counters which indicate how long ago their associated pages have been
referenced.
B. Registers which keep track of when the program was last accessed.
C. Counters to keep track of last accessed instruction.
D. Counters to keep track of the latest data structures referred.
Ans: A
115. Memory unit accessed by content is called______.
A. Read only memory B. Programmable Memory
C. Virtual Memory D. Associative Memory
Ans: D
116. _________ register keeps tracks of the instructions stored in program stored
in memory.
A. AR (Address Register) B. XR (Index Register)
C. PC (Program Counter) D. AC (Accumulator)
Ans: C
117. n bits in operation code imply that there are ___________ possible distinct
operators.
A. 2n B. 2n
C. n/2 D. n2
Ans: B
118. A three input NOR gate gives logic high output only when_____.
A. one input is high B. one input is low
C. two input are low D. all input are high
Ans: D
119. The circuit converting binary data in to decimal is_____.
A. Encoder B. Multiplexer
C. Decoder D.Code converter
Ans: D
120. The multiplicand register & multiplier register of a hardware circuit
implementing booth's algorithm have (11101) & (1100). The result shall be ______.
A. (812)10 B. (-12)10
C. (12)10 D. (-812)10
Ans: A
121. PSW is saved in stack when there is a _____.
A. interrupt recognized B. execution of RST instruction
C. Execution of CALL instruction D. All of these
Ans: A
122. In computers, subtraction is carried out generally by____.
A. 1's complement method B. 2's complement method
C. signed magnitude method D. BCD subtraction method
Ans: B
123. The main memory in a Personal Computer (PC) is made of_____.
A. cache memory. B. static RAM
C. Dynamic Ram D. bothA.and (B).
Ans: D
124. Cache memory works on the principle of_____.
A. Locality of data B. Locality of memory
C. Locality of reference D. Locality of reference & memory
Ans: C
125. An n-bit microprocessor has_____.
A. n-bit program counter B. n-bit address register
C. n-bit ALU D. n-bit instruction register
Ans: D
126. When CPU is executing a Program that is part of the Operating System, it is
said to be in _____.
A. Interrupt mode B. System mode
C. Half mode D. Simplex mode
Ans: B
127. Logic X-OR operation of (4ACO)H& (B53F)H results _____.
A. AACB B. 0000
C. FFFF D. ABCD
Ans: C
128. If the main memory is of 8K bytes and the cache memory is of 2K words. It
uses associative mapping. Then each word of cache memory shall be_____.
A. 11 bits B. 21 bits
C. 16 bits D. 20 bits
Ans: C
129. A Stack-organised Computer uses instruction of _____.
A. Indirect addressing B. Two-addressing
C. Zero addressing D. Index addressing
Ans: C
130. In a program using subroutine call instruction, it is necessary______.
A. initialize program counter B. Clear the accumulator
C. Reset the microprocessor D. Clear the instruction register
Ans: D
131. Virtual memory consists of _______.
A. Static RAM B. Dynamic RAM
C. Magnetic memory D. None of these
Ans: A
132. In signed-magnitude binary division, if the dividend is (11100)2 and divisor is
(10011)2 then the result is ______.
A. (00100)2 B. (10100)2
C. (11001)2 D. (01100)2
Ans: B
133. Generally Dynamic RAM is used as main memory in a computer system as
it______.
A. Consumes less power B. has higher speed
C. has lower cell density D. needs refreshing circuitry
Ans: B
134. Write Through technique is used in which memory for updating the data
_____.
A. Virtual memory B. Main memory
C. Auxiliary memory D. Cache memory
Ans: D
135. Cache memory acts between_______.
A. CPU and RAM B. RAM and ROM
C. CPU and Hard Disk D. None of these
Ans: A
136. The circuit used to store one bit of data is known as ______.
A. Encoder B. OR gate
C. Flip Flop D. Decoder
Ans: C
137. Von Neumann architecture is ______.
A. SISD B. SIMD
C. MIMD D. MISD
Ans: A
138. In a vectored interrupt.
A. the branch address is assigned to a fixed location in memory.
B. the interrupting source supplies the branch information to the processor through
an interrupt vector.
C. the branch address is obtained from a register in the processor
D. none of the above
Ans: B
139. . In a memory-mapped I/O system, which of the following will not be there?
A. LDA B. IN
C. ADD D. OUT
Ans: A
140. If memory access takes 20 ns with cache and 110 ns without it, then the ratio
(cache uses a 10 ns memory) is _____.
A. 93% B. 90%
C. 88% D. 87%
Ans: B
141. The addressing mode used in an instruction of the form ADD X Y, is _____.
A. Absolute B. indirect
C. index D. none of these
Ans: C
142. _________ register keeps track of the instructions stored in program stored
in memory.
A. AR (Address Register) B. XR (Index Register)
C. PC (Program Counter) D. AC (Accumulator)
Ans: C
143. The idea of cache memory is based ______.
A. on the property of locality of reference
B. on the heuristic 90-10 rule
C. on the fact that references generally tend to cluster
D. all of the above
Ans: A
144. Which of the following is not a weighted code?
A. Decimal Number system B. Excess 3-cod
C. Binary number System D. None of these
Ans: B
145. The average time required to reach a storage location in memory and obtain
its contents is called the _____.
A. seek time B. turnaround time
C. access time D. transfer time
Ans: C
146. (2FAOC)16 is equivalent to _____.
A. (195 084)10 B. (001011111010 0000 1100)2
C. Both A.and (B) D. None of these
Ans: B
147. The circuit used to store one bit of data is known as_______.
A. Register B. Encoder
C. Decoder D. Flip Flop
Ans: D
148. . Computers use addressing mode techniques for ____________.
A. giving programming versatility to the user by providing facilities as pointers to
memory counters for loop control
B. to reduce no. of bits in the field of instruction
C. specifying rules for modifying or interpreting address field of the instruction
D. All the above
Ans: D
149. What characteristic of RAM memory makes it not suitable for permanent
storage?
A. too slow B. unreliable
C. it is volatile D. too bulky
Ans: C
150. The amount of time required to read a block of data from a disk into memory
is composed of seek time, rotational latency, and transfer time. Rotational latency
refers to ______.
A. the time its takes for the platter to make a full rotation
B. the time it takes for the read-write head to move into position over the
appropriate track
C. the time it takes for the platter to rotate the correct sector under the head
D. none of the above
Ans: A
151. In computers, subtraction is generally carried out by ______.
A. 9s complement B. 10s complement
C. 1s complement D. 2s complement
Ans: D
152. Assembly language ________.
a. uses alphabetic codes in place of binary numbers used in machine language
b. is the easiest language to write programs
c. need not be translated into machine language
d. None of these
Ans: A
153. Suppose that a bus has 16 data lines and requires 4 cycles of 250 nsecs each
to transfer data. The bandwidth of this bus would be 2 Megabytes/sec. If the cycle
time of the bus was reduced to 125 nsecs and the number of cycles required for
transfer stayed the same what would the bandwidth of the bus?
A. 1 Megabyte/sec B. 4 Megabytes/sec
C. 8 Megabytes/sec D. 2 Megabytes/sec
Ans: D
154. Floating point representation is used to store ______.
A. Boolean values B. whole numbers
C. real integers D. integers
Ans: C
155. SIMD represents an organization that ______________.
a. refers to a computer system capable of processing several programs at the same
time.
b. represents organization of single computer containing a control unit, processor
unit and a memory unit.
c. includes many processing units under the supervision of a common control unit
d. none of the above.
Ans: C
156. In Reverse Polish notation, expression A*B+C*D is written as
A. AB*CD*+ B. A*BCD*+
C. AB*CD+* D. A*B*CD+
Ans: A
157. Processors of all computers, whether micro, mini or mainframe must have
a. ALU b. Primary Storage
c. Control unit d. All of above
Ans b
158. What is the control unit's function in the CPU?
a. To transfer data to primary storage
b. to store program instruction
c. to perform logic operations
d. to decode program instruction
Ans e
159. What is meant by a dedicated computer?
a. which is used by one person only
b. which is assigned to one and only one task
c. which does one kind of software
d. which is meant for application software only
Ans f
160. The most common addressing techiniques employed by a CPU is
a. immediate b. direct
c. indirect d. register e. all of the above
Ans d
161. Pipeline implement
a. fetch instruction b. decode instruction
c. fetch operand d. calculate operand
e. execute instruction f. all of abve
Ans d
162. Which of the following code is used in present day computing was developed
by IBM corporation?
a. ASCII b. Hollerith Code
c. Baudot code d. EBCDIC code
Ans d
163. When a subroutine is called, the address of the instruction following the CALL
instructions stored in/on the
a. stack pointer b. accumulator
c. program counter d. stack
Ans d

164. A microprogram written as string of 0's and 1's is a


a. symbolic microinstruction b. binary microinstruction
c. symbolic microprogram d. binary microprogram
Ans d
165. Interrupts which are initiated by an instruction are
a. internal b. external c. hardware d. software
Ans b
166. Memory access in RISC architecture is limited to instructions
a. CALL and RET b. PUSH and POP
c. STA and LDA d. MOV and JMP
Ans c

167. A collection of lines that connects several devices is called ..............


A) bus B) peripheral connection wires
C) Both a and b D) internal wires
Ans A
168. A complete microcomputer system consist of ...........
A) microprocessor B) memory
C) peripheral equipment D) all of the above
Ans D
169. PC Program Counter is also called ...................
A) instruction pointer B) memory pointer
C) data counter D) file pointer
Ans A
170. In a single byte how many bits will be there?
A) 8 B) 16 C) 4 D) 32
Ans A
171. CPU does not perform the operation ..................
A) data transfer B) logic operation
C) arithmetic operation D) all of the above
Ans A
172. The access time of memory is ............... the time required for performing
any single CPU operation.
A) Longer thanB) Shorter than
C) Negligible than D) Same as
Ans A
173. Memory address refers to the successive memory words and the machine is
called as ............
A) word addressable B) byte addressable
C) bit addressable D) Tera byte addressable
Ans A
174. A microprogram written as string of 0's and 1's is a .............
A) Symbolic microinstruction B) binary microinstruction
C) symbolic microinstruction D) binary microprogram
Ans D
175. A pipeline is like ....................
A) an automobile assembly line B) house pipeline
C) both a and b D) a gas line
Ans A
176. Data hazards occur when ......
A) Greater performance loss
B) Pipeline changes the order of read/write access to operands
C) Some functional unit is not fully pipelined
D) Machine size is limited
Ans B
177. Where does a computer add and compare data?
A. Hard disk B. Floppy disk
C. CPU chip D:Memory chip
Ans C
178. Which of the following registers is used to keep track of address of the
memory location where the next instruction is located?
A. Memory Address Register
B. Memory Data Register
C. Instruction Register
D. Program Register
Ans D
179. A complete microcomputer system consists of
A) microprocessor
B) memory
C) peripheral equipment
D) all of above
Ans D
180. CPU does not perform the operation
A. data transfer
B. logic operation
C. arithmetic operation
D. all of above
Ans B
181. Pipelining strategy is called implement
A. instruction execution
B. instruction prefetch
C. instruction decoding
D. instruction manipulation
Ans C
182. A stack is
A. an 8-bit register in the microprocessor
B. a 16-bit register in the microprocessor
C. a set of memory locations in R/WM reserved for storing information temporarily
during the execution of computer
D. a 16-bit memory address stored in the program counter
Ans A
183. A stack pointer is
A. a 16-bit register in the microprocessor that indicate the beginning of the stack
memory.
B. a register that decodes and executes 16-bit arithmetic expression.
C. The first memory location where a subroutine address is stored.
D. a register in which flag bits are stored
Ans A
184. The branch logic that provides decision making capabilities in the control
unit is known as
A. controlled transfer
B. conditional transfer
C. unconditional transfer
D. none of above
Ans C
185. Interrupts which are initiated by an instruction are
A. internal
B. external
C. hardware
D. software
Ans D
186. A time sharing system imply
A. more than one processor in the system
B. more than one program in memory
C. more than one memory in the system
D. None of above
Ans B
187.Virtual memory is
(1) an extremely large main memory
(2) an extremely large secondary memory
(3) an illusion of an extremely large memory
(4) a type of memory used in super computers

(5) None of these

Answers:
3

188.Fragmentation is -
(1) dividing the secondary memory into equal sized f ragments
(2) dividing the main memory into equal size f ragments
(3) f ragments of memory words used in a page
(4) f ragments of memory words unused in a page
(5) None of these

Answers:: 2
189.Which memory unit has lowest access time?
(1) Cache (2) Registers
(3) Magnetic Disk (4) Main Memory
(5) Pen drive

Answer :2

190.Cache memory-
(1) has greater capacity than RAM
(2) is f aster to access than CPU Registers
(3) is permanent storage
(4) f aster to access than RAM
(5) None of these
Answer 4
191.When more than one processes are running concurrently on a system-
(1) batched system
(2) real-time system
(3) multi programming system
(4) multiprocessing system
(5) None of these
Answers:
3

192.Which of the following memories must be refreshed many times per second?
a. Static RAM b. Dynamic RAM c. EPROM
d. ROM e. None of these
ans Static RAM
193.RAM stands for
a. Random origin money b. Random only memory
c. Read only memory d. Random access memory
e. None of these
ans Random access memory

194.CPU fetches the instruction from memory according to the value of


a) program counter
b) status register
c) instruction register
d) program status word

Answer:a.
195.A memory buffer used to accommodate a speed differential is called
a) stack pointer
b) cache
c) accumulator
d) disk buffer

Answer:b.
196.Which one of the following is the address generated by CPU?
a) physical address
b) absolute address
c) logical address
d) none of the mentioned
Answer:c.
197.Run time mapping from virtual to physical address is done by
a) memory management unit
b) CPU
c) PCI
d) none of the mentioned
Answer:a.
198.Memory management technique in which system stores and retrieves
data from secondary storage for use in main memory is called
a) fragmentation
b) paging
c) mapping
d) none of the mentioned
Answer:b

199.The address of a page table in memory is pointed by


a) stack pointer
b) page table base register
c) page register
d) program counter

200.Program always deals with


a) logical address
b) absolute address
c) physical address
d) relative address

Answer:a
1. Which processor structure is pipelined?
a) all x80 processors b) all x85 processors c) all x86 processors

2. In 8086 microprocessor one of the following statements is not true.


a) Coprocessor is interfaced in MAX mode
b) Coprocessor is interfaced in MIN mode
c) I/O can be interfaced in MAX / MIN mode
d) Supports pipelining

3. The ________ ensures that only one IC is active at a time to avoid a bus conflict caused by
two ICs writing different data to the same bus.

A. control bus
B. control instructions
C. address decoder
D. CPU

4. In an 8085 microprocessor, the instruction CMP B has been executed while the contents of
accumulator is less than that of register B. As a result carry flag and zero flag will be
respectively
(A) set, reset (B) reset, set (C) reset, reset (D) set, set

5. To put the 8085 microprocessor in the wait state

(i) lower the-HOLD input


(ii) lower the READY input
(iii) raise the HOLD input
(iv) raise the READY input

6. Registers, which are partially visible to users and used to hold conditional, are known as
a. PC
b. Memory address registers
c. General purpose register
d. Flags

7. The microprocessor 8085 has _____ basic instructions and _____ opcodes.
a) 80, 246 b) 70, 346 c) 80, 346 d) 70, 246

MS.R.RAJAKUMARI AP/IT, PMU,VALLAM


8. What does microprocessor speed depends on

a) Clock b) Data bus width c) Address bus width d)Size of register

9. The status that cannot be operated by direct instructions is


a) Cy b) Z c) P d) AC

10. The number of software interrupts in 8085 is ____


a) 5 b) 8 c) 9 d) 10
11. Adress line for RST 3 is
a) 0020H b) 0028H c) 0018H d) 0038H

12. The necessary steps carried out to perform the operation of accessing either memory or I/O
Device, constitute a ___________________
a) fetch operation b) execute operation c) machine cycle d) instruction
cycle

13. The contents of accumulator before CMA instruction is A5H. Its content after instruction
execution is
a) A5H b) 5AH c) AAH d) 55H

14. In an 8085 based system, the maximum number of input output devices can be connected
using I/0 mapped I/O method is
a) 64 b) 512 c) 256 d) 65536

a.) Pentium
15. Intel Itanium processors are designed for
a. Servers and personal computers
b. Servers only
c. Personal computers only
d. Calculators

16. The TRAP is one of the interrupts available its INTEL 8085. Which one of the following
statements is true of TRAP?
(a) It is level triggered
(b) It is negative edge triggered
(c) It is positive edge triggered
(d) It is both positive edge triggered and level triggered

MS.R.RAJAKUMARI AP/IT, PMU,VALLAM


MS.R.RAJAKUMARI AP/IT, PMU,VALLAM
MS.R.RAJAKUMARI AP/IT, PMU,VALLAM
MS.R.RAJAKUMARI AP/IT, PMU,VALLAM
MS.R.RAJAKUMARI AP/IT, PMU,VALLAM
MS.R.RAJAKUMARI AP/IT, PMU,VALLAM
MS.R.RAJAKUMARI AP/IT, PMU,VALLAM

Vous aimerez peut-être aussi