1. GDI represents
1) Global Data Interface
2) Graphics Data Interface
3) Graphics Device Interface
4) Global Device Interface
5) None of these
2. Which of the following codes is written into a serially accessed memory?
1) EOD code 2) Gray code 3) Bar code
4) Excess-3 code 5) Unicode
3. ______temporarily holds program instructions, data and output until they are no longer needed by the computer.
1) Hard disk 2) Motherboard 3) CD
4) RAM 5) Floppy disk
4. Basic Input Output System (BIOS) is necessary for___
1) boot-up
2) mouse and keyboard only
3) revolution
4) audio and video system
5) None of these
5. It is an undetectable virus which attempts to allow someone to gain control of a computer system.
1) Macro virus 2) Boot sector virus
3) Root kit virus 4) Polymorphic virus
5) Memory resident virus
6. SCSI
1) is a set of standards for transferring data
2) defines commands and protocols
3) is commonly used for hard disks and tape drives
4) can connect scanners, CD drives etc
5) All the above
7. Any program logic could be expressed by using which of the following control/logic structures?
1) Sequence logic 2) Selection logic
3) Loop logic 4) All the above
5) None of these
8. The representation of numbers in the positional number system with radix 16 is
1) binary 2) decimal 3) octal
4) hexadecimal 5) dotted decimal
9. Which of the following is a non-impact printer?
1) Dot-matrix printer 2) LCD printer
3) Chain printer 4) Daisy wheel printer
5) Drum printer
10. The number system that uses _________ as a base is abbreviated as ‘octal’.
1) 10 2) 8 3) 7 4) 9 5) None of these
11. Shimmer Sparkle Text, Blinking Background, etc are known as
1) font styles 2) word art 3) font effects
4) text layout 5) text effects
12. 10 Base F type of Ethernet uses ______ topology.
1) Bus 2) Ring 3) Star
4) Tree 5) Mesh
13. The _____ tier processes HTTP protocol, scripting tasks, performs calculations, and provides access to data.
1) Client 2) Applications/Web server
3) Enterprise server 4) DBA
5) None of these
14. RSA is
1) Symmetric Cryptosystem
2) Asymmetric Cryptosystem
3) Block Cypher
4) Digital Signature
5) Both 2) and 4)
15. The statement in SQL which allows the definition of a table to change is
1) Alter 2) Update 3) Create
4) Select 5) None of these
Answer :-
Q. 1 (3) | Q. 2 (1) | Q. 3 (4) | Q. 4 (1) | Q. 5 (3) |
Q. 6 (5) | Q. 7 (4) | Q. 8 (4) | Q. 9 (2) | Q. 10 (2) |
Q. 11 (5) | Q. 12 (3) | Q. 13 (1) | Q. 14 (5) | Q. 15 (1) |
0 comments:
Post a Comment