Monday 5 January 2015

COMPARISION-PUZZLE

Read the following information carefully and answer the questions
given below it:
(A)A is shorter than B but taller than C.
(B)D is shorter than C.
(C)E is taller than D.
(D)B is taller than E.

Question :
1.Who among them is the tallest?
(a) A (b) B (c) C (d) D (e) E

2. Who among them is shortest ?
(a) A (b) D (c) E (d) B (e) C

3. Who among them is shortest but one?
(a) A (b) D (c) c (d) B (e) E

4. How many people is taller then B only?
(a) 1 (b) 2 (c) 3 (d) 4 (e) 0

5. How many people is shoter then A only?
(a) 1 (b) 0 (c) 3 (d) 4 (e) 2



Question :

In an examination, P got more marks than Q but not as many as R.
R got more marks than T and S. T got
less marks than Q but his marks are not the lowest among all.

6. Who among them got highest marks ?
 (a) P (b) S (c) T (d) R (e) Q

7. Who among them got lowest marks ?
 (a) T (b) S (c) P (d) R (e) Q

8. Who among them got second highest marks ?
 (a) Q (b) T (c) S (d) R (e) P

9. Who among them got second lowest marks ?
 (a) Q (b) T (c) S (d) R (e) P
10. How many student got more marks then Q ?
 (a) 1 (b) 0 (c) 3 (d) 4 (e) 2

11. How many student got less marks then T ?
 (a) 1 (b) 0 (c) 3 (d) 4 (e) 2


Answer:  1. (b) 2. (b) 3. (c) 4. (e) 5. (e)
         6. (d) 7. (b) 8. (e) 9. (b) 10. (e) 11. (a)

Tuesday 30 December 2014

Computer Knowledge 10


1. Modem refers to:
(a) Modulator
(b) Modulation
(c) Demodulator
(d) Modulator and Demodulator
Answer: d

2. The principle means of identifying entities within an entity set is:
(a) Primary Key
(b) Record
(c) Attribute
(d) Tuple
Answer: d

3. Data in a database can be added, deleted, changed, sorted or searched all using a _________.
A. DBMS
B. SQL
C. C++
D. Java
ANSWER: A

4. DBMS stands for:
A. Database associated
B. Database administrator
C. Database application
D. Database management system
ANSWER: D

5. A database is a complex ______:
A. Data structure
B. Memory
C. Both
D. None
ANSWER: A

6. A diamond-shaped box in an Entity-Relationship diagram refers to:
(a) Entity
(b) Relationship
(c) Attribute
Answer: b

7. A data structure in which elements are added and removed from only one end, is known as:
(a) Array
(b) Stack
(c) Queue
(d) None of the above
Answer: b

8. Array is:
(a) linear data structure
(b) non-linear structure
(c) none of the above
Answer: a

9. Arrays are passed as arguments to a function by
(a) value
(b) reference
(c) both a and b
(d) none of the above
Answer: c

10. Which of the following is not an output device:
(a) Printer
(b) Scanner
(c) Flat Screen
(d) Touch Screen
Answer: b

11. Which number system is usually followed in a typical 32-bit computer?
(a) 2
(b) 10
(c) 16
(d) 32
Answer: a

12. What is the address given to a network called?
(a) System Address
(b) SYSID
(c) Process ID
(d) IP Address
Answer: d

13. What is the name of the software that allows us to browse through web pages?
(a) Browser
(b) Mail Client
(c) FTP Client
(d) Messenger
Answer: a

14. All system settings in WINDOWS are stored in:
(a) CONTROL.INI
(b) MAIN.INI
(c) SYSTEM.INI
(d) SETTING.INI
Answer: c                                                                    BSNL TTA Question Paper

Computer Knowledge 9

1. The declaration void fun(int) indicates the fun is a function which:
(a) has no arguments
(b) returns nothing
(c) both a and b
(d) none of the above
Answer: b

2. Which technique is used to reduce the size of a file:
(a) Compression
(b) Decompression
(c) Encryption
(d) Decryption
Answer: a

3. Choose the answer which best describes the term Primary Key:
(a) The Primary Key is a field that contains data that can be duplicated.
(b) The Primary Key is a field that contains data that is unique.
(c) The Primary Key is a field that is never associated with any field in other tables.
(d) The Primary Key field is a concept used only in Microsoft Access.
Answer: b

4. Which one of the following is not a Normal Forms (Normalization) rule with regards to the
Relational Model?
(a) All fields within a table must relate to or directly describe the Primary Key.
(b) Repeating Groups must be eliminated from tables.
(c) Fields that can contain non-numeric data are to be removed and placed within their own tables with
an associated Primary Key.
(d) Redundant data is to be eliminated by placing the offending fields in another table.
Answer: c

5. What is the Protocol used for the Internet?
(a) IPX/SPX
(b) NetBIOS/NetBEUI
(c) CDMA/CA
(d) TCP/IP
Answer: d

6. What is a file server?
(a) A computer that performs a service for other computers
(b) A computer that controls the printers on the network
(c) A computer that stores files that are created by network users
Answer: c

7. A company whishes to connect two sites in different parts of the country together. It is decided
to use the telephone system. What device should be connected to the fileservers on each site?
(a) Router
(b) Modem
(c) Switch
(d) Hub
Answer: b

8. The Operating System is responsible for:
(a) Controlling peripheral devices such as monitor, printers, disk drives
(b) Provide an interface that allows users to choose programs to run and to manipulate files
(c) Manage users' files on disk
(d) All of the above
Answer: d

9. It is better to buffer a table when
(a) When a table is read infrequently
(b) When a table is linked to check tables
(c) When a table is read frequently and the data seldom changes
(d) When a single record is to be picked up
Answer: c

10.  While working with Ms-Dos which command transfers a specific file from one disk to another?
a. Copy
b. Diskcopy
c. Time
d. Rename
Answer: a

11.If you don’t know the current time, which command will you use to display
a. Copy
b. Ver
c. Time
d. Format
Answer: c

12. Which type of commands in DOS needs additional files for their execution?
(a) Batch Commands
(b) Internal Commands
(c) External Commands
Answer: c

13. Array subscripts in C always start at:
(a):1
(b) 0
(c) 1
(d) Value provided by user
Answer: b

14. DMA stands for:
(a) Direct Memory Allocation
(b) Distinct Memory Allocation
(c) Direct Memory Access
(d) Distinct Memory Access
Answer: d

15. Which of the following have the fastest access time?
(a) Magnetic Tapes
(b) Magnetic Disks
(c) Semiconductor Memories
(d) Compact Disks
Answer: c

16. C language is available for which of the following Operating Systems?
(a) DOS
(b) Windows
(c) Unix
(d) All of the above
Answer: d

17. The earliest calculating devices are
A. Abacus                                     
B. Clock
C. Difference Engine                 
D. None of these
Answer: a                                                                BSNL TTA QUESTION PAPER 2007

Computer Knowledge 8

1. An RDBMS is a:                                                                      BSNL TTA EXAM Question 
(a) Remote DBMS
(b) Relative DBMS
(c) Reliable DBMS
(d) Relational DBMS
Answer: d

2. A UPS:
(a) increases the storage capacity of a computer system
(b) increases the processor speed
(c) provides backup power in the event of a power cut\
(d) none of the above
Answer: c

3. Cache memory enhances:
(a) memory capacity
(b) memory access time
(c) secondary storage capacity
(d) secondary storage access time
Answer: b

4. The minimum number of bits required to store the hexadecimal number FF is:
(a) 2
(b) 4
(c) 8
(d) 16
Answer: d

5. Which part of the computer perform arithmetic calculations?
(a) Control unit
(b) Registers
(c) ALU
(d) CPU
Answer: c

6. Which bus carries information between processors and peripherals?
(a) Data bus
(b) Control bus
(c) Address bus
(d) Information bus
Answer: a

7. CARRY, in a half-adder, can be obtained using:
(a) OR gate
(b) AND gate
(c) EX-OR gate
(d) EX-AND gate
Answer: b

8. The overall logical structure of a database can be expressed graphically by:
(a) Data Flow Diagram
(b) Flow Chart
(c) Directed Graph
(d) Entity-Relationship Diagram
Answer: d

9. Out of the following which is not valid network topology:
(a) Bus
(b) Star
(c) Circle
(d) Tree
Answer: c

10. If c is a variable initialized to 1, how many times the following loop be executed:
while(c>0 && c<60)
{
c++;
}
(a) 59
(b) 60
(c) 61
(d) none of the above
Ansewr: a

11. What is the final value of sum?
main ()
{
int sum=1;
for(;sum<=9;)
printf(%d\n, ++sum);
}
(a) 9
(b) 10
(c) 11
(d) none of the above
Answer: b

12. RAM stands for
(a) Read Access Memory
(b) Read After Memory
(c) Random Access Memory
(d) Random After Memory
Answer: c

13. Maximum size of IP address is:
(a) 12 bits
(b) 24 bits
(c) 32 bits
(d) 48 bits
Answer: c

14. Assembly language to machine language translation is:
(a) One-to-One
(b) One-to-Many
(c) Many-to-One
(d) Many-to-Many
Answer: b

15. What is the binary equivalent of a decimal number 68:
(a) 1000100
(b) 1100100
(c) 1000010
(d) 1000001
Answer: a

16. A floppy disk is consisting of 40 tracks, each track contains 100 sectors, and the capacity of a
sector is 512 bytes, what is the approx. size of that disk?
(a) 1 MB
(b) 2 MB
(c) 4 MB
(d) 8 MB
Answer: b

17. BIOS stands for
(a) Binary Input Output Set
(b) Binary Input Output System
(c) Basic Input Output Set
(d) Basic Input Output System

Answer: d

18. The minimum number of bits required to store the hexadecimal number FF is:
(a) 2
(b) 4
(c) 8
(d) 16

Answer: c

19. A gigabyte represents:
(a) 1 billion bytes
(b) 1000 kilobytes
(c) 230 bytes
(d) 10 megabytes

Answer: a

20. The memory that requires refreshing of data is:
(a) SROM
(b) DROM
(c) SRAM
(d) DRAM

Answer: d

Sunday 28 December 2014

Computer Knowledge 6

1. The method of internet access that requires a phone line, but offers faster access speeds than
dial-up is ...... connection.
1) Fiber-optic service
2) Satellite Access
3) Digital Subscriber line
4) Cable Access
5) None of these
Answer: 3

2. Which of the following cannot be a part of an email address?
1) Underscore
2) At sign
3) Period
4) Space
5) None of these
Answer: 4

3. Java is an example of a(n):
1) Machine Language
2) Assembly Language
3) High-level Language
4) Fourth-Generation Language
5) None of these
Answer: 3

4. VOIP is the acronym for:
1) Voice Oriented Internet Protocol
2) Virtual Object Internet Protocol
3) Voice Over Internet Protocol
4) Virtual Object Intranet Protocol
5) None of these
Answer: 3

5. 'Graymail' usually refers to:
1) Unwanted emails
2) Forwarded mails
3) emails in trash
4) Star / Priority emails
5) Junk mails
Answer: 1

6. Which of the following is not an output device?
1) Speaker
2) Microphone
3) Printer
4) CRT
5) VDU
Answer: 2

7. OMR stands for:
1) Optical Mark Reader
2) Optical Mark Recovery
3) Optical Memory Reader
4) Original Mark Reader
5) None of these
Answer: 1

8. Outlook Express is a(n) .....
1) Word Processor
2) Spread Sheet
3) email client
4) Presentation
5) None of these
Answer: 3

9. Large Collection of files is known as:
1) Attributes
2) Database
3) Files
4) Records
5) None of these
Answer: 2

10. The computers which are relatively rare because of their cost and size are:
1) Mini Computers
2) Micro Computers
3) Super Computers
4) Laptops
5) Mainframe Computers
Answer: 3

Computer Knowledge 7

1. A(n) .... program is one that is ready to run and does not need to be altered in any way.
1) Interpreter
2) High-level
3) Compiler
4) COBOL
5) Executable
Answer: 5 

2. Which of the following is true about URL?
1) It is a computer program
2) It is a type of Programming object
3) It is the address of a document or page on the World Wide Web
4) It is an acronym for Unlimited Resources for Listening
5) It is a piece of hardware
Answer: 3

3. Universal Product Code (UPC) is a .....
1) Scanner
2) Hardware Equipment
3) Antivirus
4) Graphics Adapter
5) Barcode system
Answer: 5

4. Facsimile Transmission Machine is popularly known as:
1) ATM
2) Scanner
3) Fax Machine
4) Format Machine
5) None of these
Answer: 3

5. What is the significance of a faded/ dimmed command in a pull-down menu?
1) Screen becomes faded/ dimmed if the command is selected
2) The command is not accessible currently
3) A dialog box appears if the command is selected.
4) A help window appears if the command is selected.
5) None of these
Answer: 2

6. Which of the following allows the user to access e-mail from anywhere?
1) Forum
2) Webmail Interface
3) Message board
4) Weblog
5) None of these
Answer: 2

7. Amistake in an algorithm that causes incorrect results is called a .......
1) Logical error
2) Syntax error
3) Machine Error
4) Compiler error
5) None of these
Answer: 1

8. Who are the founders of Google?
1) Larry Page
2) Steve Jobs
3) Sergey Brin
4) Eric Schmidt
5) Only 1 and 3
Answer: 5

9. ........ is a technique that is used to send more than one call over a single line?
1) Digitizing
2) Duplexing
3) Infrared Transmission
4) Streaming
5) Multiplexing
Answer: 5

10. A computer program is:
1) A set of instructions that enable the computer to perform a task
2) Main memory
3) Pseudocode
4) Algorithm
5) None of these
Answer: 1

11. Which of the following is a valid video format?
1) avi
2) mpeg
3) mp4
4) All the above
5) None of these
Answer: 4
12. Which component is used inside the computer to protect the CPU from heat?
1) Control Unit
2) ALU
3) Mother board
4) SMPS
5) Fan
Answer: 5

13. ...... is a device that forwards data packets between computer networks, creating an overlay
internetwork.
1) Multiplexer
2) Duplexer
3) Router
4) WWW
5) None of these
Answer: 3

14. An organization that provides access to the internet is called:
1) Internet Service Provider
2) Internet Access Provider
3) Internet Access Providing System (IAPS)
4) 1 and 3
5) None of these
Answer: 1

15. Which of the following is a product of Google?
1) Youtube
2) Picasa
3) Google+
4) Orkut
5) All the above
Answer: 5

Computer Knowledge 5

1. Ubuntu is an example of which kind of Source Model?
1) Open Source
2) Vertical Market Software
3) Horizontal Market Software
4) Shareware
5) None of these
Answer: 1

2. ..... is a computer program that fills the screen with moving images or patterns when the
computer is not in use.
1) Wallpaper
2) Computer Screen
3) Screen Saver
4) Both 1 and 3
5) None of these
Answer: 3

3. Which of the following is a valid unit of measurement of Bandwidth?
1) Data Per second
2) Information Per second
3) Bits Per second
4) All the above
5) None of these
Answer: 3

4. Which of the following is true about Intranet?
1) It is a Private Network
2) It is a Public Network
3) It is a Network which can access illegally.
4) Only 1 and 3
5) None of the above
Answer: 1

5. The process of loading an Operating System into main memory is called:
1) Formatting
2) Posting
3) Booting
4) Partitioning
5) None of the above
Answer: 3

6. Line by line translation of a program is done by:
1) Interpreter
2) Translator
3) Compiler
4) All the above
5) None of these
Answer: 1

7. SQL is a:
1) Programming Language
2) Communication Language
3) Low-level language
4) Query Language
5) None of the above
Answer: 4 

8. Network of Networks is known as :
1) Intranet
2) Internet
3) Extranet
4) VPN
5) MAN
Answer: 2

9. Which of the following is true about Java?
1) It is an OOP language
2) It is Platform Independent
3) It provides more security
4) It was Designed by Sun Microsystems.
5) All the above
Answer: 5

10. The process of replacing a software with a newer version is called:
1) Upgrading
2) Installing
3) Updating
4) Downloading
5) Replacing
Answer: 1

11. PNG stands for:
1) Potable Name Generator
2) Portable Network Generator
3) Printed Name Graphics
4) Portable Network Graphics
5) None of these
Answer: 4

12. Volatility is a property of:
1) Computer Networks
2) Software
3) Disk
4) RAM
5) ROM
Answer: 4

13. When the computer is working on the given instructions, it is called:
1) Output
2) Storage
3) Processing
4) Input
5) None of these
Answer: 3

14. The set of parallel electrical conducting lines through which different components on the mother
board of a PC unit are linked together are called:
1) Conductors
2) Buses
3) Slide Master
4) Consecutives
5) None of these
Answer: 2

15. Which of the following is/ are features of primary storage?
1) Volatile Memory
2) Smaller storage capacity
3) Higher cost per bit storage
4) Faster access time
5) All the above
Answer: 5