Tuesday 30 December 2014

Computer Knowledge 9

1. The declaration void fun(int) indicates the fun is a function which:
(a) has no arguments
(b) returns nothing
(c) both a and b
(d) none of the above
Answer: b

2. Which technique is used to reduce the size of a file:
(a) Compression
(b) Decompression
(c) Encryption
(d) Decryption
Answer: a

3. Choose the answer which best describes the term Primary Key:
(a) The Primary Key is a field that contains data that can be duplicated.
(b) The Primary Key is a field that contains data that is unique.
(c) The Primary Key is a field that is never associated with any field in other tables.
(d) The Primary Key field is a concept used only in Microsoft Access.
Answer: b

4. Which one of the following is not a Normal Forms (Normalization) rule with regards to the
Relational Model?
(a) All fields within a table must relate to or directly describe the Primary Key.
(b) Repeating Groups must be eliminated from tables.
(c) Fields that can contain non-numeric data are to be removed and placed within their own tables with
an associated Primary Key.
(d) Redundant data is to be eliminated by placing the offending fields in another table.
Answer: c

5. What is the Protocol used for the Internet?
(a) IPX/SPX
(b) NetBIOS/NetBEUI
(c) CDMA/CA
(d) TCP/IP
Answer: d

6. What is a file server?
(a) A computer that performs a service for other computers
(b) A computer that controls the printers on the network
(c) A computer that stores files that are created by network users
Answer: c

7. A company whishes to connect two sites in different parts of the country together. It is decided
to use the telephone system. What device should be connected to the fileservers on each site?
(a) Router
(b) Modem
(c) Switch
(d) Hub
Answer: b

8. The Operating System is responsible for:
(a) Controlling peripheral devices such as monitor, printers, disk drives
(b) Provide an interface that allows users to choose programs to run and to manipulate files
(c) Manage users' files on disk
(d) All of the above
Answer: d

9. It is better to buffer a table when
(a) When a table is read infrequently
(b) When a table is linked to check tables
(c) When a table is read frequently and the data seldom changes
(d) When a single record is to be picked up
Answer: c

10.  While working with Ms-Dos which command transfers a specific file from one disk to another?
a. Copy
b. Diskcopy
c. Time
d. Rename
Answer: a

11.If you don’t know the current time, which command will you use to display
a. Copy
b. Ver
c. Time
d. Format
Answer: c

12. Which type of commands in DOS needs additional files for their execution?
(a) Batch Commands
(b) Internal Commands
(c) External Commands
Answer: c

13. Array subscripts in C always start at:
(a):1
(b) 0
(c) 1
(d) Value provided by user
Answer: b

14. DMA stands for:
(a) Direct Memory Allocation
(b) Distinct Memory Allocation
(c) Direct Memory Access
(d) Distinct Memory Access
Answer: d

15. Which of the following have the fastest access time?
(a) Magnetic Tapes
(b) Magnetic Disks
(c) Semiconductor Memories
(d) Compact Disks
Answer: c

16. C language is available for which of the following Operating Systems?
(a) DOS
(b) Windows
(c) Unix
(d) All of the above
Answer: d

17. The earliest calculating devices are
A. Abacus                                     
B. Clock
C. Difference Engine                 
D. None of these
Answer: a                                                                BSNL TTA QUESTION PAPER 2007

No comments:

Post a Comment