326. The computer memory which is essentially empty is:
(a) RAM (b) ROM
( c) Floppy disc ( d) Mouse
Answer: (b)
327. Paint brush belong to:
(a) Accessories group (b) Application group
( c) Main group ( d) None of these
Answer: (b)
328. Which of the following is not a high level Janguage?
(a) BASIC (b) ASSEMBLY
(c) PASCAL (d) FORTRAN
Answer: (b)
329. Multiplication in computer is done by:
(a) Reverse division (b) Repeated addltlon
(c) Reverse subtraction (d) None of the above
Answer: (b)
330. Which of the following is a virus?
(a) Worm (b) Trojan horse
(c) File Infecter (d)All of these
Answer: (d)
331. Computer is a/an:
(a) Mechanical device (b) Electrical device
( c) Electronic device ( d) None of tl1ese
Answer: (c)
332. Which of the following is the only language that a computer can understand?
(a) High level language (b) Pseudocode
(c) Machine language (d) Assembly language
Answer: (c)
333. What command prepares a disk for holding information?
(a) Prepare disc (b) Copy disc
( c) Disc copy · ( d) Format a disk
Answer: (d)
334. A computer virus is a software program which has essential ability to:
(a) Clone itself (b) Damage programs
( c) Hide itself ( d) None of these
Answer: (a)
335. The heart of any computer is:
(a) Memory (b) CPU
(c) 1/0 Unit (d) Discs
Answer: (b)
336. A personal computer is designed to meet the computing needs of a(n):
(a) Individual (b) Department
(c) Company (d) City
Answer: (a)
337. Which of the following standards is followed in India?
(a) IFIP (b) CCITI
(c) ISO . (d) ANSI
Answer: (b)
338. An association of several entities in" an entry-relation model is called:
(a) Tuple (b) Record
( c) Relationship ( d) Field
Answer: ()
339. Which of the following is not a goal of computer network?
(a) Resource sharing (b) Low reliability
(c) Load sharing (d) To avoid physical movement
Answer: (b)
340. Hacker is a person:
(a) Who spends hours at a computer and enjoys doing so
(b) Who repairs a computer
(c) Who designs the sotware which are threat to-the system
( d) None of these
Answer: (c)
341. Satellite to ground communication takes place through:
(a) medium wave (b) short wave
(c) microwave (d) optical signal
Answer: (c)
342. Signals that involve human communications are generally:
(a) Digital (b) Analog
( c) Either digital or analog( d) None of these
Answer: (b)
343. Spot the odd one amongst the following:
(a) BASIC (b) WINDOWS
(c) DOS (d) UNIX
Answer: (a)
344. Messages are transmitted in a computer network through:
(a) Circuit switching (b) Message switching
( c) Packet switching ( d) Multiplexing
Answer: (c)
345. A large sized network is te-rmed as:
(a) MAN (b) WAN
(c) LAN (d) VAN
Answer: (b)
346. CPU gets the address of the next instruction to be processed from: .
(a) Instruction register (b) Memory addressregister
( c) Index register ( d) Program register
Answer: (d)
347. An assembler is a:
(a) Program (b) Person who assembles the parts
( c) Symbol ( d) Language
Answer: (a)
348. Language devel oed for strin.g manipulation is:
(a) SNOBOL (b) Ada
(c) LISP (d) None of these·
Answer: (c)
349. A class that inherits a base class containing virtual function is called:
(a) Virtual (b) Polymorphic
(c) Derived (d) Base
Answer: (b)
350. A boot strap ls:
(a) A memory device
(b) A program to start up a computer
(c) Hardware of computer used to check memory
(d) An assembler
Answer: (b)
(a) RAM (b) ROM
( c) Floppy disc ( d) Mouse
Answer: (b)
327. Paint brush belong to:
(a) Accessories group (b) Application group
( c) Main group ( d) None of these
Answer: (b)
328. Which of the following is not a high level Janguage?
(a) BASIC (b) ASSEMBLY
(c) PASCAL (d) FORTRAN
Answer: (b)
329. Multiplication in computer is done by:
(a) Reverse division (b) Repeated addltlon
(c) Reverse subtraction (d) None of the above
Answer: (b)
330. Which of the following is a virus?
(a) Worm (b) Trojan horse
(c) File Infecter (d)All of these
Answer: (d)
331. Computer is a/an:
(a) Mechanical device (b) Electrical device
( c) Electronic device ( d) None of tl1ese
Answer: (c)
332. Which of the following is the only language that a computer can understand?
(a) High level language (b) Pseudocode
(c) Machine language (d) Assembly language
Answer: (c)
333. What command prepares a disk for holding information?
(a) Prepare disc (b) Copy disc
( c) Disc copy · ( d) Format a disk
Answer: (d)
334. A computer virus is a software program which has essential ability to:
(a) Clone itself (b) Damage programs
( c) Hide itself ( d) None of these
Answer: (a)
335. The heart of any computer is:
(a) Memory (b) CPU
(c) 1/0 Unit (d) Discs
Answer: (b)
336. A personal computer is designed to meet the computing needs of a(n):
(a) Individual (b) Department
(c) Company (d) City
Answer: (a)
337. Which of the following standards is followed in India?
(a) IFIP (b) CCITI
(c) ISO . (d) ANSI
Answer: (b)
338. An association of several entities in" an entry-relation model is called:
(a) Tuple (b) Record
( c) Relationship ( d) Field
Answer: ()
339. Which of the following is not a goal of computer network?
(a) Resource sharing (b) Low reliability
(c) Load sharing (d) To avoid physical movement
Answer: (b)
340. Hacker is a person:
(a) Who spends hours at a computer and enjoys doing so
(b) Who repairs a computer
(c) Who designs the sotware which are threat to-the system
( d) None of these
Answer: (c)
341. Satellite to ground communication takes place through:
(a) medium wave (b) short wave
(c) microwave (d) optical signal
Answer: (c)
342. Signals that involve human communications are generally:
(a) Digital (b) Analog
( c) Either digital or analog( d) None of these
Answer: (b)
343. Spot the odd one amongst the following:
(a) BASIC (b) WINDOWS
(c) DOS (d) UNIX
Answer: (a)
344. Messages are transmitted in a computer network through:
(a) Circuit switching (b) Message switching
( c) Packet switching ( d) Multiplexing
Answer: (c)
345. A large sized network is te-rmed as:
(a) MAN (b) WAN
(c) LAN (d) VAN
Answer: (b)
346. CPU gets the address of the next instruction to be processed from: .
(a) Instruction register (b) Memory addressregister
( c) Index register ( d) Program register
Answer: (d)
347. An assembler is a:
(a) Program (b) Person who assembles the parts
( c) Symbol ( d) Language
Answer: (a)
348. Language devel oed for strin.g manipulation is:
(a) SNOBOL (b) Ada
(c) LISP (d) None of these·
Answer: (c)
349. A class that inherits a base class containing virtual function is called:
(a) Virtual (b) Polymorphic
(c) Derived (d) Base
Answer: (b)
350. A boot strap ls:
(a) A memory device
(b) A program to start up a computer
(c) Hardware of computer used to check memory
(d) An assembler
Answer: (b)
<Next Page><01,.... 18, 19, 20, 21, 22, 23, 24, 25, 26>
2. Cyber laws (Questions & Answers)
3. General English - Questions & Answers
10. ARITHMETIC/MENTAL ABILITY---> Click here
11. PSC PREVIOUS / SOLVED QUESTION PAPERS ---> Click here
2. Cyber laws (Questions & Answers)
3. General English - Questions & Answers
Related Links
2. GENERAL KNOWLEDGE QUESTIONS (English) ---> Click here
2. GENERAL KNOWLEDGE QUESTIONS (Malayalam) ---> Click here
2. GENERAL KNOWLEDGE QUESTIONS (Malayalam) ---> Click here
11. PSC PREVIOUS / SOLVED QUESTION PAPERS ---> Click here
12. PSC QUESTIONS IN MALAYALAM
* SCERT KERALA TEXT BOOKS FOR CLASS II, IV, VI, VIII, IX, X, XII – FREE DOWNLOAD ---> Click here
* NCERT & CBSE TEXT BOOKS FOR ALL CLASSES – FREE DOWNLOAD ---> Click here
* NCERT & CBSE TEXT BOOKS SOLUTIONS FOR ALL CLASSES ---> Click here
No comments:
Post a Comment