Q1. Which among the following option does DBMS helps to achieve?
(a) Data independence
(b) More redundancy
(c) Centralised manner to control of data
(d) Both (a) and (c)
(e) None of the above
Ans.(d)
Sol. DBMS reduces data redundancy, provide a centralised manner to
control of data and enabled data independence.
Q2. Which among the following is a Super computer series developed by
Indian scientists?
(a) Param
(b) Super30l
(c) Compaq Presario
(d) Cray YMP
(e) Blue Gene
Ans.(a)
Sol. PARAM is a series of supercomputers designed and assembled by
the Centre for Development of Advanced Computing (C-DAC) in Pune,
India. The latest machine in the series is the PARAM Kanchenjunga.
Q3. DBMS ensures data integrity by managing transactions through ACID
test. What does ACID stands for in computer science?
(a) Artistic, collaborative, inference, durability
(b) analytic, consistency, inference, duration
(c) Atomicity, consistency, isolation, durability
(d) Atomicity, collaborative, inference duration
(e) Adherence, consistency, isolation, durability
Ans.(c)
Explanation: ACID (Atomicity, Consistency, Isolation, and Durability)
is a set of properties of database transactions.
Q4. Table of contents can be prepared by using:
(a) macros
(b) headings as H1, H2, H3 and more in the document
(c) by table of contents in tools menu
(d) (b) and (c)
(e) By File menu
Ans.(b)
Sol. You can make Table of Content by using Headings.
Q5. Who developed the basic architecture of Computers?
(a) Charles Babbage
(b) Blaise Pascal
(c) Steve Newton
(d) John Von Neumann
(e) Henery Johns
Ans.(d)
Explanation: The von Neumann architecture, also known as the von
Neumann model is a computer architecture by John Von Neumann.
Q6. Which bar is usually located below the Title Bar that provides
categorized options?
(a) Menu Bar
(b) Status bar
(c) Toolbar
(d) Scroll Bar
(e) None of the above
Ans.(a)
Sol. The Menu Bar is the horizontal band that contains commands and
options that can be chosen.
Q7. Inheritance is the ability of an object to pass on its
characteristics to its ____________.
(a) subclasses
(b) off-spring
(c) super classes
(d) parents
(e) none of the above
Ans. (a)
Sol. A superclass passes its characteristics to it's subclass in
concept of inheritance in programming languages.
Q8. What does the computer Motherboard contains that houses setting
configurations and is powered by the onboard battery?
(a) CMOS
(b) RAM
(c) DRAM
(d) CPU
(e) None of these
Ans.(a)
Sol. The CMOS is a physical part of the motherboard: it is a memory
chip that houses setting configurations and is powered by the onboard
battery. The CMOS is reset and loses all custom settings in case the
battery runs out of energy, additionally, the system clock resets
when the CMOS loses power.
Q9. Which type of system can learn and adjust to new circumstances by
themselves?
(a) Database management system
(b) Expert systems
(c) Geographical systems
(d) Neural networks
(e) File based systems
Ans (d)
Sol. Neural Network is a computer system modeled on the human brain
and nervous system.
Q10. The default and maximum size of text filed in Access is ______.
(a) 266 characters & 6400 characters
(b) 288 characters & 6880 characters
(c) 299 characters & 6499 characters
(d) 50 and 255 characters
(e) None of these
Ans.(d)
Sol. The default and maximum size of text filed in Access is 50 and
255 characters.
Q11. Which among the following term is used for: Unauthorized copying
of software to be used for personal gain instead of personal backups?
(a) program thievery
(b) data snatching
(c) software piracy
(d) program looting
(e) data looting
Ans.(c)
Sol. Software piracy is the illegal copying, distribution, or use of
software.
Q12. Type _______to start a numbered list, and then press SPACEBAR or
the TAB key.
(a) 1#
(b) 1$
(c) 1.
(d) 1*
(e) None of these
Ans.(c)
Sol. 1. -> Spacebar -> enter, will start numbered list.
Q13. A/(n) ___________ is an object embedded in a web page or email,
which unobtrusively (usually invisibly) allows checking that a user
has accessed the content.
(a) email
(b) virus
(c) web beacon
(d) spam
(e) firewall
Ans.(c)
Sol. Common uses of web beacon are email tracking and page tagging
for web analytics. Its alternative names are web bug, tracking bug,
tag, or page tag.
Q14. Non-physical components of the computer are referred to as
_______.
(a) CPU
(b) Software
(c) Hardware
(d) Program
(e) None of these
Ans. (b)
Sol. Software components are not physical or tangible components.
Q15. How many rows are there in latest version of MS Excel?
(a) 65536
(b) 16,384
(c) 1,048,576
(d) 1,050,000
(e) 2,001,000
Ans.(c)
Sol. In latest version there are 1,048,576 rows by 16,384 columns.
No comments:
Post a Comment