Computer Awareness Quiz-4 |
1.The very first process created by the kernal that runs till the kernal process is halts is init getty both (a) and (b) none of these 2.In the process table entry for the kernel process, the process id value is 1 0 255 2 3.Piggy backing is a technique for Flow control Acknowledgement Sequence retransmition 4.Which function is the entry point for a DLL in MS Windows 3.1 Main Libmain Dllmain Winmain 5.Which program construct must return a value? Package Anonymous block Function Stored Procedure 6.What was the first name given to Java Programming Language. Oak - Java Small Talk Oak None 7.Programs that automatically submit your search request to several search engines simultaneously are called— Webcrawlers Metasearch engines Spiders Hits 8.Graphical diagrams used to represent different multiple perspectives of a system include— use-case,class and state diagrams state, interaction, derivative diagrams interaction, relationship, and class diagrams deployment, relationship, and use-case diagrams 9.Verification of a login name and password is known as: configuration accessibility authentication logging in 10.____________ are lists of commands that appear on the screen. GUIs Icons Menus Windows |
Online Quizzes,MCQs and Articles on .NET Technologies,SQL Server and Computer Awareness Section...
Tuesday, 19 March 2013
Computer Awareness Quiz-4
Computer Awareness Quiz-3
Computer Awareness Quiz-3 |
1. While searching a website, you have been unable to find information that was on the
site several months ago. What might you do to attempt to locate that information?
Visit Google's cached page to view the older copy Visit a partner site of the organization to see if it is there Forget about it, as there is no way to find this information Use the wayback machine 2. Conditional results after execution of an instruction in a micro processor is stored in register accumulator flag register part of PSW flag register 3. Word allignment is alligning the address to the next word boundary of the machine. alligning to even boundary. alligning to word boundary none of the above. 4. Which kind of lock includes a keypad that can be used to control access into areas? Cipher Warded Tumbler Typelock 5. Windows 95 supports Multiuser n tasks Both None 6. ……………are used to identify a user who returns to a Website. Cookies Plug-ins Scripts ASPs 7. The………….data mining technique derives rules from real-world case examples. Rule discover Signal processing Neural networks Case-based reasoning 8.For 1 MB memory, the number of address lines required, 11 16 22 24 9.In OST, terminal emulation is done in sessions layer presentation layer application layer transport layer 10.Which of the following involves context switch priviliged instruction floating point exception mutual exclusion system call |
Thursday, 7 March 2013
Computer Awareness Quiz-2
Computer Awareness Quiz-2 |
1. DPI stands for Due Protocol Inspection Dit per it Dots Per Inch Do Per Instruction 2. MBR stands for Many Bell Rings Master Book Record Master Boot Record Many Boot Run 3. Word length of a Personal Computer is 4 bits 16 bits 8 bits 64 bits 4. Which of the following is executable in Windows operating system exe bat com All of the above 5. All computers must have a virus checking program a word processing software an operating system a word processing software 6. Primary memory stores Data alone Programs alone Results alone All of these 7. What does the term "Bug" means in Computer systems Chips that flashes data result of system A flaw in the system Virus in the system 8. Booting is the process that signifies which of the following ? Loading the Operating system into main memory Shutdown the computer Diagnosis the problem with the computer Loads the anti-virus 9. WordStar is a software product ,that helps Document Processing Maintain inventory items Send mails Browse Internet 10. DOS is an Operating system originally designed to be operated by using which of the following device ? Mouse Xbox JoyStick Keyboard |
Computer Awareness Quiz-1
Computer Awareness Quiz-1 |
1. The Input device that is closely related to a touch screen is the Keyboard Light pen Scanned Joystick 2. The following is computer software ------- Impact printer Console Payroll package OCR 3. The alternative name for application software is ----------- End user software Specific software Utility software Practical software 4. The processing of input to output is directed by --------------- Hardware Software Printer None of these 5. The time required to complete a single, continuous execution of a object program is called ---------- Access time Random time Response time Runtime 6. For checking spelling one uses ------------ Directory Index disk Dictionary Disk None of the above 7. RTF stands for real time file real text format rich time file rich test format 8. Which one of the following is not a part of accesories group in Windows 98? control panel character map communication system tools 9. EBCDIC is ------------ 6 bit coding system 7 bit coding system 8 bit coding system 9 bit coding system 10. Which of these is a documented hoax virus? McDonalds screensaver Alien.worm Merry Xmas Adolph |
Subscribe to:
Posts (Atom)