header1.html

Tuesday, 19 March 2013

Computer Awareness Quiz-4


Computer Awareness Quiz-4
1.The very first process created by the kernal that runs till the kernal process is halts is
init
getty
both (a) and (b)
none of these


2.In the process table entry for the kernel process, the process id value is
1
0
255
2


3.Piggy backing is a technique for
Flow control
Acknowledgement
Sequence
retransmition


4.Which function is the entry point for a DLL in MS Windows 3.1
Main
Libmain
Dllmain
Winmain


5.Which program construct must return a value?
Package
Anonymous block
Function
Stored Procedure


6.What was the first name given to Java Programming Language.
Oak - Java
Small Talk
Oak
None


7.Programs that automatically submit your search request to several search engines simultaneously are called—
Webcrawlers
Metasearch engines
Spiders
Hits


8.Graphical diagrams used to represent different multiple perspectives of a system include—
use-case,class and state diagrams
state, interaction, derivative diagrams
interaction, relationship, and class diagrams
deployment, relationship, and use-case diagrams


9.Verification of a login name and password is known as:
configuration
accessibility
authentication
logging in


10.____________ are lists of commands that appear on the screen.
GUIs
Icons
Menus
Windows

Computer Awareness Quiz-3


Computer Awareness Quiz-3
1. While searching a website, you have been unable to find information that was on the site several months ago. What might you do to attempt to locate that information?
Visit Google's cached page to view the older copy
Visit a partner site of the organization to see if it is there
Forget about it, as there is no way to find this information
Use the wayback machine


2. Conditional results after execution of an instruction in a micro processor is stored in
register
accumulator
flag register part of PSW
flag register


3. Word allignment is
alligning the address to the next word boundary of the machine.
alligning to even boundary.
alligning to word boundary
none of the above.


4. Which kind of lock includes a keypad that can be used to control access into areas?
Cipher
Warded
Tumbler
Typelock


5. Windows 95 supports
Multiuser
n tasks
Both
None


6. ……………are used to identify a user who returns to a Website.
Cookies
Plug-ins
Scripts
ASPs


7. The………….data mining technique derives rules from real-world case examples.
Rule discover
Signal processing
Neural networks
Case-based reasoning


8.For 1 MB memory, the number of address lines required,
11
16
22
24


9.In OST, terminal emulation is done in
sessions layer
presentation layer
application layer
transport layer


10.Which of the following involves context switch
priviliged instruction
floating point exception
mutual exclusion
system call

Thursday, 7 March 2013

Computer Awareness Quiz-2


Computer Awareness Quiz-2
1. DPI stands for
Due Protocol Inspection
Dit per it
Dots Per Inch
Do Per Instruction


2. MBR stands for
Many Bell Rings
Master Book Record
Master Boot Record
Many Boot Run


3. Word length of a Personal Computer is
4 bits
16 bits
8 bits
64 bits


4. Which of the following is executable in Windows operating system
exe
bat
com
All of the above


5. All computers must have
a virus checking program
a word processing software
an operating system
a word processing software


6. Primary memory stores
Data alone
Programs alone
Results alone
All of these


7. What does the term "Bug" means in Computer systems
Chips that flashes data
result of system
A flaw in the system
Virus in the system


8. Booting is the process that signifies which of the following ?
Loading the Operating system into main memory
Shutdown the computer
Diagnosis the problem with the computer
Loads the anti-virus


9. WordStar is a software product ,that helps
Document Processing
Maintain inventory items
Send mails
Browse Internet


10. DOS is an Operating system originally designed to be operated by using which of the following device ?
Mouse
Xbox
JoyStick
Keyboard

Computer Awareness Quiz-1


Computer Awareness Quiz-1
1. The Input device that is closely related to a touch screen is the
Keyboard
Light pen
Scanned
Joystick


2. The following is computer software -------
Impact printer
Console
Payroll package
OCR


3. The alternative name for application software is -----------
End user software
Specific software
Utility software
Practical software


4. The processing of input to output is directed by ---------------
Hardware
Software
Printer
None of these


5. The time required to complete a single, continuous execution of a object program is called ----------
Access time
Random time
Response time
Runtime


6. For checking spelling one uses ------------
Directory
Index disk
Dictionary Disk
None of the above


7. RTF stands for
real time file
real text format
rich time file
rich test format


8. Which one of the following is not a part of accesories group in Windows 98?
control panel
character map
communication
system tools


9. EBCDIC is ------------
6 bit coding system
7 bit coding system
8 bit coding system
9 bit coding system


10. Which of these is a documented hoax virus?
McDonalds screensaver
Alien.worm
Merry Xmas
Adolph