1 Sem CFA Question Solving, Objective Question and Dos Command PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 50

1. Define Computer . Explain the Feature of Computer?

Ans:- The term computer is derived from the word compute. The word compute means to calculate. A computer is
an electronic machine that accepts data from the user, processes the data by performing calculations and operations
on it, and generates the desired output results. Computer performs both simple and complex operations, with speed
and accuracy.
The Feature of Computer are as following;-
Speed, accuracy, diligence, storage capability and versatility are some of the key characteristics of a computer. A
brief overview of these characteristics are—
Speed The computer can process data very fast, at the rate of millions of instructions per second. Some
calculations that would have taken hours and days to complete otherwise, can be completed in a few seconds using
the computer. For example, calculation and generation of salary slips of thousands of employees of an organization,
weather forecasting that requires analysis of a large amount of data related to temperature, pressure and humidity
of various places, etc.
Accuracy Computer provides a high degree of accuracy. For example, the computer can accurately give the result
of division of any two numbers up to 10 decimal places.
Diligence When used for a longer period of time, the computer does not get tired or fatigued. It can perform long
and complex calculations with the same speed and accuracy from the start till the end.
Storage Capability Large volumes of data and information can be stored in the computer and also retrieved
whenever required. A limited amount of data can be stored, temporarily, in the primary memory. Secondary storage
devices like floppy disk and compact disk can store a large amount of data permanently.
Versatility Computer is versatile in nature. It can perform different types of tasks with the same ease. At one
moment you can use the computer to prepare a letter document and in the next moment you may play music or
print a document.

2. Explain the Application Area of Computer System?


Ans:- The application areas of the computer are listed below—
Education Computers are extensively used, as a tool and as an aid, for imparting education. Educators use
computers to prepare notes and presentations of their lectures .Computers are used to develop computer-based
training packages, to provide distance education using the e-learning software, and to conduct online examinations.
Researchersuse computers to get easy access to conference and journal details and to get global access to the
research material.
Entertainment:-Computers have had a major impact on the entertainment industry. The user can download and
view movies, play games, chat, book tickets for cinema halls, use multimedia for making movies, incorporate
visual and sound effects using computers, etc. The users can also listen to music, download and share music, create
music using computers, etc.
Sports:- A computer can be used to watch a game, view the scores, improve the game, play games (like chess,
etc.) and create games. They are also used for the purposes of training players.
Advertising:- Computer is a powerful advertising media. Advertisement can be displayed on different websites,
electronic-mails can be sent and reviews of a product by different customers can be posted. Computers are also
used to create an advertisement using the visual and the sound effects. For the advertisers, computer is a medium
via which the advertisements can be viewed globally. Web advertising has become a significant factor in the
marketing plans of almost all companies. In fact, the business model of Google is mainly dependent on web
advertising for generating revenues.
Medicine Medical researchers and practitioners use computers to access information about the advances in
medical research or to take opinion of doctors globally. The medical history of patients is stored in the computers.
Computers are also an integral part of various kinds of sophisticated medical equipment’s like ultrasound machine,
CAT scan machine, MRI scan machine, etc. Computers also provide assistance to the medical surgeons during
critical surgery operations like laparoscopic operations, etc.

3. Classify the computer on the basis of Speed and Size?


Ans:- Classifications of computer by size
Different computer have different size and memory capacity according to their evolution and their use. The mainly
used computer having different size and memory.
(a). Super computer
(b). Mainframe computer
(c). Mini computer
(d). Micro computer
(e). Desktop-computer or home or briefcase computer(Personal computer).
(f). Pocket computer (Notebook computer).

1|Page prepared by Ghanashyam Dhungana


(a). Super computer:-Super computers can process huge amounts of data, The biggest in size, the most expensive
in price than any other is classified and known as super computer. It can process trillions of instructions in seconds.
This computer is not used as a PC in a home neither by a student in a college. Governments specially use this type
of computer for their different calculations and heavy jobs. Different industries also use this huge computer for
designing their products. In most of the Hollywoods movies it is used for animation purposes. This kind of
computer is also helpful for forecasting weather reports worldwide.
(b). Mainframes:- Another giant in computers after the super computer is Mainframe, which can also process
millions of instructions per second and is capable of accessing billions of data. This computer is commonly used
in big hospitals, air line reservation companies, and many other huge companies prefer mainframe because of its
capability of retrieving data on a huge basis. This is normally to expensive and out of reach from a salary-based
person who wants a computer for his home. This kind of computer can cost thousands of dollars.
(c). Minicomputer:- This computer is next in line but offers less than mainframe in work and performance. These
are the computers which are mostly preferred by the small type of business personals, colleges, etc.
(d). Personal computers:- Almost all the computer users are familiar with the personal computers. They normally
know what the personal computer is and what are its functions. This is the computer mostly preferred by the home
users. These computers are lesser in cost than the computers given above and also, small in size; they are also
called PCs in short for Personal computers. This computer is small in size and you can easily arrange it to fit in
your single bedroom with its all accommodation. Today this is thought to be the most popular computer in all.
(e). Notebook computers:- Having a small size and low weight the notebook is easy to carry to anywhere. A student
can take it with him/her to his/her school in his/her bag with his/her book. This is easy to carry around and preferred
by students and business people to meet their assignments and other necessary tasks. The approach of this computer
is also the same as the Personal computer. It can store the same amount of data and having a memory of the same
size as that of a personal computer. One can say that it is the replacement of personal desktop computer.

4. Different between Analog and Digital Computer?


Analog Digital
Analog signal is a continuous signal which represents Digital signals are discrete time signals generated by
physical measurements. digital modulation.
Denoted by sine waves Denoted by square waves
Uses continuous range of values to represent Uses discrete or discontinuous values to represent
information information
Subjected to deterioration by noise during Can be noise-immune without deterioration during
transmission and write/read cycle. transmission and write/read cycle.
Analog instrument draws large power Digital instrument draws only negligible power

Low cost and portable Cost is high and not easily portable

5. Classify the computer on the basis of Brand?


Ans:- On the basis of brand. The computer can be classified as IBM PC, IBM compatibles and Apple/Macintosh
computer.

a. IBM PC: IBM PC is the largest computer manufacturing company establishing USA. The computer
manufactures by IBM PC or branded computer. Personal Computer (PC) is the most important type of micro
computer system. The micro computer manufactures by IBM Company are called IBM PC. These computers are
reliable, durable and have better quality but they are costly.
b. IBM Compatibles: The computers that have some functional characteristics and principles of IBM computer
are called IBM compatibles. In other word, all the computer are manufactured by the another companies rather
than IBM company are Known as IBM compatibles. All the software and hardware of IBM compatibles. These
are cheaper and Their Parts are easily available in Market. They are also duplicate or assemble computer.
c. Apple/Macintosh Computer: All the computers manufacture by apple cooperation, a leading computers
manufacturing computer of USA are known as Apple/Macintosh computers. These computers use their own
software and hardware. They are totally different than that of IBM computers, In terms of both hardware and
software. For e.g software developed for apple computer can't run or IBM computers and vice-versa. Similarly,
floppy disk formatting in IBM computer can't be recognized by apple Macintosh computer and vice-versa. It are
popularly used in desktop publishing (DTP) houses as they provide better quality of graphic output.

2|Page prepared by Ghanashyam Dhungana


6. Define mobile computing? Explain the advantage of mobile computing ?
Ans:- Mobile computing is humanâ computer interaction by which a computer is expected to be transported during
normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software.
Communication issues include ad hoc and infrastructure networks as well as communication properties, protocols,
data formats and concrete technologies. Hardware includes mobile devices or device components. Mobile software
deals with the characteristics and requirements of mobile applications.

a. Flexibility: We no longer need to stay plugged in to a specific location for working on your computer. Mobile
computing allows us unprecedented flexibility to move about and perform our activities at the same time
b. Saves Time: This technology is just the thing to use such transit time more effectively. It also allows to instantly
connecting with our family anywhere and anytime. We can connect with them over Internet using portable
computing devices such as Internet phones and share the fun.
c. Enhanced Productivity: Increased work flexibility is directly proportionate to enhanced work productivity - the
fact that you can do your work from any place you want, without waiting for, and making efforts to, get access to
computing facility translates into people being able to do more work with greater flexibility.
d. Ease of Research: Motile computing and the flexibility offered by it enable students as well as professionals to
conduct in-depth research on just about any topic or subject even when on the go!
e. Entertainment: Getting bored is so last-decade now what with zillions of entertainment options available on
mobile communication and computing devices these days. For example: games, movies, music, videos, etc.
The advantage of Mobile completion are as following :-

1- Providing wider reach.


2- Reducing transaction cost
3- Streamline business processes.
4- Competitive pricing.
5- Reducing time to order.
The disadvantages of mobile computing
1- Small screens of most devices still limit types of file and data transfer (i.e. streaming videos, etc.)
2- standards guiding applications and technology development and connection(s)
3- WAP and SMS limited to small number of characters and text.
4- use of graphics limited
5- less functionality for mobile Internet over mobile phones and existing generation of handhelds than for mobile
computer.

7. Explain the anatomy of digital computer and write the block diagram?
Ans:- The anatomy of digital Computer are as:-

Input:- It accepts the data or instructions given by the user and it converts the data and instructions from man
readable to machine readable code. Some common input devices are keyboard, mouse, scanner punched cards etc.
Processor/CPU: CPU is the portion of a computer system that carries out the instructions of a computer program,
and is the primary element carrying out the computer's functions.
Output Unit: When the computer its processing task, the results must be conveyed back to the user. Information
from the CPU is converted into an understandable form through output devices.

3|Page prepared by Ghanashyam Dhungana


8. Define computer architecture . Differentiate between RISC and CISC architecture?
Ans:- Computer architecture is a specification detailing how a set of software and hardware technology standards
interact to form a computer system or platform. In short, computer architecture refers to how a computer system
is designed and what technologies it is compatible with.

a. Input unit: It accepts the data or instructions given by the user and it converts the data and instructions from man
readable to machine readable code. Some common input devices are keyboard, mouse, scanner punched cards etc.
b. Processor/CPU: CPU is the portion of a computer system that carries out the instructions of a computer program,
and is the primary element carrying out the computer's functions. Some of the primary components of a CPU are:
i. Registers: These are the primary memory of computer system. They are mainly used to store data during the time
of processing inside ALU. The registers within CPU are special purpose temporary storage locations.
ii. Control unit: The control unit is the brain of the CPU itself. It controls overall operations and devices of computer.
iii. Arithmetic Logic Unit: ALU carries out the arithmetic and logical operations on the data made available to it.
c. Main Memory: It is a volatile memory of computer. As soon as a computer starts, primary memory stores all
running applications, operating system, user interface and any others. Its storage capacity is smaller but faster.
d. Auxiliary storage: It is the secondary memory of computer. They have slower access rates but greater storage
capacity and data stability. Auxiliary memory holds programs and data for future use because it is non-volatile.
e. Output Unit: When the computer its processing task, the results must be conveyed back to the user. Information
from the CPU is converted into an understandable form through output devices.

9. Differentiate between RISC and CISC architecture are following :-

4|Page prepared by Ghanashyam Dhungana


10. Explain memory Hierarchy with Example?
Ans:- In computer architecture, the memory hierarchy separates computer storage into a hierarchy based on
response time. Since response time, complexity, and capacity are related, the levels may also be distinguished by
their performance and controlling technologies.

11. Difference between SRAM and DRAM?


 Static RAM (SRAM)  Dynamic RAM (DRAM)
i) SRAM consists of internal flip-flops. i) DRAM consists most transistor and capacitors.
ii) Information stored in the form of bits. ii) Information stored in the form of Charge
iii) No chance of leakage. iii) Possibility of leakage.
iv) SRAMs are costlier than DRAM iv) DRAMs are less costlier than SRAM
v) Information retained as long as power is applied. v) Periodic refreshing is required to retain information.
vi) More power consumption than DRAM. vi) Less power consumption than SRAM
vii) SRAMs have high speed than DRAM. vii) DRAMs speed are generally less than SRAM.
viii) Low storage density than DRAM. viii) High storage density than SRAM.
ix) Easier to use because SRAM has shorter read ix) It’s read and write cycle are generally longer.
and write cycles. x) Used as main memory.
x) Used as cache memory. xi) It is less expensive.
xi) It is more Expensive xii) It is Analog type.
xii) It is Digital Type. xiii) Need to refresh the programs.
xiii) No need to refresh the programs.

12. Classify the Primary memory and Secondary memory with their use

Ans:- Memory

Primary memory Secondary Memory


Pen-Drive
Zip-Disk

Cache memory
RAM ROM
Buffer
Hard Disk
Programmable ROM
Static RAM Floppy Disk
Erasable Programmable. CD-ROM
ROM
Dynamic RAM Electrically Erasable Prog. ROM DVD-ROM

BRD-Disk
Memory: Magnetic tape

5|Page prepared by Ghanashyam Dhungana


Memory is one of the important components of your PC. Memory holds both raw data that needs to be processed
and the result after processing. Memory can even be a channel of communication between the microprocessor and its
peripherals. Memory comes in many types described by its functions and technology. Each has it roll in the proper
functioning of the PC. Thus a memory is a device or medium that can accept data, hold them and deliver them on
demand at later time.

There are two types of memory that is primary memory and secondary memory.

I ) Primary Memory

It is also called the main memory or internal memory. RAM and ROM are called primary memory storage
area built into computer hardware. This memory consists of small integrated circuit (IC) either on the motherboard
attached to the mother board of a computer. This memory allows CPU to store and retrieve data very quickly. The rate
of fetching data from the memory is 50 nanosecond per byte.

a) RAM (Random Access Memory): RAM is a volatile memory. It is also called temporary memory. It is the most
commonly used memory but it is a volatile memory. So it needs regular power supply to hold its data and instructions.
RAM chips are of two types S-RAM and D-RAM.

 S-RAM

It stands for static - RAM. Static memory allows the current flow continue on its way. It alters the path taken
by the power using one of two possible courses of travel to mark the state being remembered.

 D-RAM

It stands for dynamic-RAM. Dynamic RAM uses external circuit to periodically regenerate or refresh the
stored charge to retain the stored data. It does not retain information for very long time. PCs periodically refresh
memory automatically. During the refresh period the memory is not available for normal operation.

b) ROM (Read Only Memory): It stands for read only memory. ROM is a computer memory on which data are
prerecorded. The programming code or data on a ROM chip is written by manufacturer during the manufacturing time
which cannot be erased or removed by the user. It is permanent in nature. ROM retains its data even when the computer
is turned off whereas RAM doses not retain data when the computer is turned off. ROM chips are used in all kind of
electronic devices from calculation to video games.

Most PCs have a small amount of ROM that stores code that starts off or boots the computer. Early computers
also use ROM to store basic input, output system which acts as a translator between PCs hardware and the operating
system.

Types of ROM:

I) Programmable ROM: It is a programmable ROM but not only once. Once the program is written in the PROM it
cannot be erased but can only be read. P-ROMs are programmed to record information using a special device known
as P-ROM programmer. The information recorded in the P-ROM can only be read but can't be changed.

II) Erasable Programmable-ROM: EP-ROM is a special kind of chip that can be reprogrammed to store the new
information. Its information is stored as electric charges deposited on a chip and EP-ROM can be erased by removing
it from the circuit. It can then be reprogrammed by using EP burner. There are two types of EP-ROM. i.e. EEP-ROM
and UVEP-ROM.

a) Electrically Erasable Programmable ROM: It is a kind of EP-ROM chip which doesn't have to be removed and
send back to the company and manufacturer for re-programming. It can be electrically re-programmed while in circuit
by using special software.

b) Ultra-Violent Erasable Programmable ROM: It is a kind of EP-ROM in which the stored information is erased
by exposing the chip to the ultra-Violet light.

Secondary Memory:

Primary memory is of limited capacity and volatile in nature. So to overcome this limitation secondary storage
devices are used. Secondary memory is non-volatile in nature and has larger storage capacity. It is used to store large

6|Page prepared by Ghanashyam Dhungana


volume of data on permanent basis that can be further used. e.g. magnetic disk (hard-disk, magnetic tape) and optical
disk(CD-ROM,DVD-ROM,CD-RW,BRD)

Types of Secondary memory:

I) Cache Memory: Cache memory contains a copy of main memory data when the processor requests for data. It is
used to reduce the average access time for instructions or data which are normally stored in the main memory.

Main Memory

Cache Memory

Processor

Cache memory is placed at two three labels that is L1, L2, and L3. The first level is called primary cache memory or
level 1 cache. L1 is placed in the microprocessor chip. It is smaller than level 2 cache and uses the high speeds-RAM.

L2 is included on separate printed circuit board. It has higher capacity than L1.

L3 cache is available in some modern computers only.

Basic L1 L2 L3

Speed Highest Medium Lowest

Storage Capacity Smallest Medium Highest

Buffer Memory: Buffer Memory is a small amount of highest speed memory which is a reserved section of RAM or
input output devices. Many other devices have their own buffer memory.

Storage devices:

Storage devices can store large amount of data and instructions for future use. They are used to store data such
as text, audio, video, animation and graphical images. E.g. hard disk, floppy disk, optical disk etc. These storage
devices are permanent in nature.

Types of Storage devices:

I) Hard disk: It is an online magnetic storage device. It is permanently connected to the computer system. When the
computer is on, hard disk is always available to store or give information. It is a permanent secondary storage device.
Hard disk can store all types of information such as operating system, text, audio, video, graphical images and
animation.

Hard disk is made up of collection of disk known as platters. These platters are made up of aluminum with
thin coating of magnetic material known as ferric oxide (iron). Each Platter has two read and write heads and is
connected with the help of arm. A hard disk drive rotates at the speed of 2400-7200 rpm (revolution per minute). Each
sector of hard disk con store 128-2048 bytes of information. Each platters surface may contain 400-800 tracks which
are divided into 26 sectors. Each platter stores 360000 bytes to 10000000 bytes of information. Thus different sizes of
hard disk are available in the market that is 2 GB-500 GB or even in Tera bytes.

II) Floppy disk: A floppy disk is a flat circular piece of plastic coated with magnetic materials known as iron oxide.
A floppy disk is also called as diskette. A floppy disk is a removable drive which is easy to handle and use. A floppy
disk is cheaper than hard disk which is used for backup. The size of floppy disk is 3×1/2 in diameter. A floppy disk in
covered with a square, hard plastic jacket. The jacket has a cut out for read and writes head to make contact with the
disk surface. The cut out space is covered with a metallic piece which sides when the floppy is inserted in the floppy
disk drive.

The rotational speed of floppy disk is 300-400 PRM. The disk contains concentric circles know as tracks which
is divided into equal parts known as sectors. The storage capacity of floppy disk is multiple of number of recording

7|Page prepared by Ghanashyam Dhungana


surface. E.g. a double density 3×1/2 floppy can have 40 tracks 18 sectors per track which can stores 512 bytes per
sector 2 surfaces. Total Storage capacity equals 737,280 bytes. There are different types of floppy disk i.e.

I ) Single sides Single density (SSSD)

II) Double side density (DSSD)

III) Double Side Double density (DSDD)

IV) Double Side High density (DSHD)

13. Explain the different types of input device?


Ans:- Input devices are used to enter data and instructions into computer memory from external world. Input Device
is a hardware part of the computer that is used to enter data and instructions into computer memory. The examples
of input devices include: Keyboard, Mouse, Track ball, Track Pad, Joy stick, Touch Screen, Light pen, Scanner,
Digital Camera, Microphone, Graphics tablet etc.
Keyboard:- Keyboard is the most familiar input device. It is most widely used input device to enter data and
instructions into the computer. Keyboard has a set of keys like a typewriter. It has alphabetic keys for A,B,C…Z
or a,b,c,…z. It has numeric keys like 0,1,2,3,…9. It has function keys F1, F2,…,F12 used to perform specific tasks.
It has other keys used for editing like Delete, Backspace, Home, End, etc
Mouse:- Moues used to control motion of the pointer on screen. A mouse has two or three buttons. These mouse
buttons are called Left, Right and Middle button respectively. Buttons are used to perform different functions. A
mouse has a rubber or metal ball inside its body. Mouse is rolled over a flat surface called mouse pad. The
movement of ball is detected by internal circuits of mouse. These circuits convert this movement into digital
signals, which are sent to computer. Mouse is used in graphical applications. It is also used for playing video games
on computer.
Track Ball :- Track Ball is an input device like a mouse. It is a pointing input device. It is used in Lap top / notebook
computers to control motion of pointer on screen. It is a pointing device like upside down mouse. It has a ball on
its upper side. This ball is moved by fingers or thumb and the pointer moves accordingly on screen.
Track pad :- It is used in Lap top computers to control motion of pointer on screen. Track pad is a stationary input
device. It has a flat surface of 1.5 to 2 square inch. Finger is moved on this surface to move pointer on screen.
Joystick:- It is used to control motion of an object quickly in game with the help of a hand held stick. This stick can
be moved forward, backward or side ways. This stick is mounted on a ball. When stick is moved then ball is moved
and signals are sent to the computer.

14. Explain the components of microprocessor with there use.


Ans:- Some of the common components of a microprocessor are:
 Control Unit
 I/O Units
 Arithmetic Logic Unit (ALU)
 Registers
 Cache
A brief introduction to these components is placed below.
Control Unit
The control unit, as described above, reads the instructions, and generates the necessary digital signals to operate
the other components. An instruction to add two numbers together would cause the Control Unit to activate the
addition module, for instance.
I/O Units
A processor needs to be able to communicate with the rest of the computer system. This communication occurs
through the I/O ports. The I/O ports will interface with the system memory (RAM), and also the other peripherals
of a computer.
Arithmetic Logic Unit
The Arithmetic Logic Unit, or ALU is the part of the microprocessor that performs arithmetic operations. ALUs
can typically add, subtract, divide, multiply, and perform logical operations of two numbers (and, or, nor, not, etc).

8|Page prepared by Ghanashyam Dhungana


15. Explain the Bus organization with diagram?
Ans:- The components of computer are interacted by bus. There are different types of bus structure. The bus is a
medium used to transfer data, memory address and control signal from one part to other part of computers. There
are three types of bus which are described below:

a. Address Bus: It is a group of wires or lines that are used to transfer the addresses of memory or I/O devices. It is
unidirectional.
b. Data Bus: It is used to transfer data within microprocessor and memory/input or output devices. It is bidirectional
as microprocessor requires sending or receiving data.
c. Control Bus: A control bus is a computer bus used by the CPU to communicate with devices that are contained
within the computer. This occurs through physical connections such as cables or printed circuits.

16. Classify the softcopy devices (Display device) with their advantage?
Ans:- A soft copy of a document is a digital copy, one that doesn't exist in physical form or on paper, but is instead
stored as binary or machine language in any device or hardware setup. Soft copies of documents are managed
much differently than the traditional hard copies that predated the rapid advance of digital media.
OR
Any type of human readable computer output device that creates non-permanent (i.e. hardcopy) record of that
output. For example the computer monitor screen you are probably looking at now.
Advantage of Softcopy device
It is Flexible,
sensible,
powerful,
light weight,
cheap in price and
durable.

17. Difference between impact and non-impact printer?


Ans:- The differences between them are as:
Impact printer Non-impact printer
They all need physical contact with paper to print They do not need to physically strike ink onto paper
Typically have no, or limited, options for different Can print exactly what appears on a computer screen at a
fonts, colors and graphics, and print quality may high quality.
be low.
Impact printers can also print carbon copies and This is not possible with non-impact products as they do
multipart forms, as the strike of the pin or hammer not physically touch the paper with any force.
carries through from the top copy to those
underneath.

Impact printers tend to be cheaper to run than non- Non-impact printers typically cost more to run, especially
impact models. They use less complex if you print pages that are heavy in color, graphics,
consumables and have fewer mechanical parts, so images and photos.
may be less prone to breaking down.

9|Page prepared by Ghanashyam Dhungana


18. Explain the internal organization of Hard-disk with diagram?
Ans:- Hard drives are usually devices that can be used for storing data and to retrieve it. They are composed of one
or more than one rigid disc that rapidly rotates.
-Hard disks in them contain various components such as Platter, Spindle, Actuator, power connector, Jumper block,
IDE connector etc.
- In the inside of a hard disk there is the spindle which is used to hold circular magnetic disks also known as platters.
They are usually made up of a non magnetic material,
- These platters are spun at speeds in excess of 4000 RPM, nowadays 7200 RPM based hard disks are common
enough.
- The read and write heads work on these spinning platters to read and write data. They are controlled by an actuator
arm that prevents any error.

19. Define Port. Differentiated between Serial and Parallel port?


Ans:- A computer port is a connection point or interface between a computer and an external or internal device.
Serial port Parallel port
Serial Port are used for serial Communication that is Parallel ports are used for parallel type of
bit by bit Sequence communication that is multiple bit parallel

This port can transmit single or 1 bit at a time It can transmit 8 or more bit at a time.
Data transmissions is slow Data transmission is fact as compare to serial port.
Serial ports can deliver a single streams of data at a Parallel port can deliver several streams of data at a
time. time.
The wires used for transmission less as compare to Transmission wires are more than serial port.
parallel port.

20. Define generation of computer. Explain the feature of difference generation of computer?
Ans:- The evolution of computer to the current state is defined in terms of the generations of computer. Each
generation of computer is designed based on a new technological development, resulting in better, cheaper and
smaller computers that are more powerful, faster and efficient than their predecessors.
Features of first generation computers:
 Technology used: vacuum tube
 Machines languages were used to instruct the computer.
 Magnetic core memory was used as primary memory.
 Electrostatic tubes, Parer tape, punch card, magnetic tape
 Punched card, printing devices were used for input/output operations and store the result.
 It occupies very large space, slow processing, inefficient and unreliable due to low accuracy.
 Power consumption was very high and it generated much heat.
 It could only perform straight forward simple numerical calculation.
 Computer used to be much expensive.
 For Example ENIAC, UNIVAC,EDVAC, and EDSAC.

10 | P a g e prepared by Ghanashyam Dhungana


Features of Second Generation Of computer:-
 Technology used: Transistor
 Operating speed was in terms of a microsecond.
 Assembly language and machines independent language such as COBOL (Common Business Oriented
Language) and FORTRAN (Formula Translation) were introduced the size of the computer.
 Magnetic core memory was used as primary memory.
 Magnetic drum and magnetic tape were used as secondary memory.
 Power required to operate them was low.
 It could perform scientific calculation such as solving differential equations.
 Storage capacity and use of computers are increased.

Features of the third generation computers are:


 The technology used: IC (Integrated Circuit).
 Transistors were replaced by IC in their electronic circuitry.
 High-level languages like FORTAN , BASIC and other are used to develop programs.
 Semiconductor memory like RAM and ROM were used as primary memory.
 Monitor and keyboard were introduced for data input and output respectively.
 Multiprogramming facility was developed.
 The computer was used in census calculation, military, banks and industries.
 Size, cost, power requirement and heat generation decreased.
 Processing speed and storage capacity used of computer increased.

Features of the fourth generation computer are:


 Technology in use: VLSI is introduced and used Microprocessor-based technology.
 Problem-oriented fourth generation language (4GL) is used to develop the program.
 Semiconductor like RAM, ROM and cache memory is used as a primary memory.
 Magnetic disks like hard disk, optical disk (CD,DVD), Blue-ray disk, flashes memory (memory chip, pen
drive) are used as secondary memory.
 E-mail, Internet and mobile communication are developed.
 Advanced, user-friendly, web page software are developed.
 Size, cost, power requirement, heat generation decreased compared to the previous generation.
 Operating speed, storage capacity ,use of computer increased compared to the previous generation.
 For example IBM-PC, HP laptops, Mac notebook etc.
Features of the fifth generation computers are:
 Technology to be used: These machines will incorporate Bio-chip and VVLSI (Very Very Large Scale
Integration) or Ultra-Large Scale Integration (ULSI)
 The computer will have Artificial Intelligence (AI).
 Natural language will be used to develop programs.
 The computer will have parallel processing in full fledge.
 The operating speed will be in terms of LIPS(Logical Inference per Second)
 These aim is to solve highly complex problems, which require great intelligence and expertise when solved
by people.
 Quantum computation, molecular and nanotechnology will be used completely

21. What is software ? Explain different types of software ?

Ans:- The term 'software' refers to the set of electronic program instructions or data a computer processor reads in
order to perform a task or operation. In contrast, the term 'hardware' refers to the physical components that you
can see and touch, such as the computer hard drive, mouse, and keyboard.
Software can be categorized according to what it is designed to accomplish. There are two main types of software:
systems software and application software.
Systems Software:- Systems software includes the programs that are dedicated to managing the computer itself,
such as the operating system, file management utilities, and disk operating system (or DOS). The operating system
manages the computer hardware resources in addition to applications and data. Without systems software installed
in our computers we would have to type the instructions for everything we wanted the computer to do!
Applications Software:- Application software, or simply applications, are often called productivity programs or
end-user programs because they enable the user to complete tasks, such as creating documents, spreadsheets,
databases and publications, doing online research, sending email, designing graphics, running businesses, and even
playing games! Application software is specific to the task it is designed for and can be as simple as a calculator
application or as complex as a word processing application.

11 | P a g e prepared by Ghanashyam Dhungana


22. Define OS? Explain the function of OS?
Ans:- An operating system is the most important software that runs on a computer. It manages the computer's
memory and processes, as well as all of its software and hardware. It also allows you to communicate with the
computer without knowing how to speak the computer's language. Without an operating system, a computer is
useless.
Functions of Operating System

Memory management :- Memory management function of an operating system takes care of allocation and de-
allocation of memory space to the programs, data or information.
ii) File management :- The file management of function of operating system takes care of files such organization.
Storage, retrieval, naming, sharing and protection of files from unauthorized excess.
iii) process management :- An operating system takes care of creation and deletion of processes, scheduling of system
resources to different processes requesting them and providing mechanism for communicating bet n the processes.
iv) Input/Output management :- An operating system keeps track of I/O devices connected to the computers system.
v) Security management :- An operating system that protects the resources and information of computer against
distraction and unauthorized excess.

23. Explain OS as a resource manage?


Ans:- Modern computers consist of processors, memories, timers, disks, mice, network interfaces, printers, and a
wide variety of other devices. In the alternative view, the job of the operating system is to provide for an orderly
and controlled allocation of the processors, memories, and input/output devices among the various programs
competing for them.

When a computer (or network) has multiple users, the need for managing and protecting the memory, input/output
devices, and other resources is even greater, since the users might otherwise interface with one another. In
addition, users often need to share not only hardware, but information (files, databases, etc.) as well. In short, this
view of the operating system holds that its primary task is to keep track of which programs are using which
resources, to grant resource requests, to account for usage, and to mediate conflicting requests from different
programs and users.

Resource management includes multiplexing (sharing) resources in two different ways:


1. Time Multiplexing
2. Space Multiplexing
1. Time Multiplexing
When the resource is time multiplexed, different programs or users take turns using it. First one of them gets to
use the resource, then another, and so on.
For example: With only one CPU and multiple programs that want to run on it, operating system first allocates the
CPU to one long enough, another one gets to use the CPU, then another and ten eventually the first one again.
Determining how the resource is time multiplexed – who goes next and for how long – is the task of the operating
system.
2. Space Multiplexing
In space multiplexing, instead of the customers taking turns, each one gets part of the resource.
For example: Main memory is normally divided up among several running programs, so each one can be resident
at the same time (for example, in order to take turns using the CPU). Assuming there is enough memory to hold
multiple programs, it is more efficient to hold several programs in memory at once rather than give one of them
all of it, especially if it only needs a small fraction of the total. Of course, this raises issues of fairness,
protection, and so on, and it is up to the operating system to solve them.

24. Explain the types of OS?

Ans:- Here we are classifying operating system on the basis of processing method, user interface and mode of user.

Types of Operating System based on processing Method.

i) Batch Operating System :- In the type of operating system data and program is not processed until all the data are
fully input. The jobs are stored in a disk in a batch in a queue an run one or more at one time under the control of
operating System. A job may wait in a batch queue for minutes or even for hours depending upon the load on the
system. e.g. MS-Dos, IBM-Dos, Apple-Dos etc.

12 | P a g e prepared by Ghanashyam Dhungana


ii) Multitasking operating system :- A multitasking operating system provides the ability to run more than one
program at a time. e.g. a user could be running a word processing package, printing a document, copying a file etc.
The advantage of multitasking operating system is letting the user run more than one task at a time. So this leads to
an increased productivity. e.g. UNIX, LINUX, Windows-95, Windows-98, Windows-2000, Windows-XP, Windows-
NT etc.

iii) Multi-processing operating system :- A multiprocessing operating system is the one in which more than one
processors operate in a coordinated way. They share the main memory and I/O devices. The see processors can
execute different programs independently and simultaneously. They can also execute portion of the same program.
e.g. UNIX and MVS.

iv) Time Sharing Operating System :- In this operating system several user work on the computer through the
terminals, which are connected to a single CPU and operates as a time period to each user and serves them it in time.
If work is not completed at the end of its time, then it is interrupted and placed on a waiting queue. e.g. UNIX,
Windows-NT, CTSS(Compatible Time Sharing System.)

v) Real-Time Operating System :- In real time operating system the key parameter in time. They are not dedicated to
some well-defined jobs which require very fast response time. They must be quick and predictable in responding to
different events. They are mainly used in industries and are designed to operate in a time. In industrial system real
time computers have to collect data about the production process and user to control machines in factory. Consider
an e.g. of a car assembly line where certain actions must take place of specific time. If a welding robot welds too
early or too late the manufacturing process is disturbed. e.g. RLLINUX, QNX, OS,-98

Types of operating System based on mode of User :-

i) Single User operating system :- A single user operating system allows one user to work at a time. The resources of
the computer system namely the CPU time and printing facilities are idle till the user logs off. e.g. MS-Dos, PC-Dos.

ii) Multi-User operating system :- A multi-User operating system allows more than one user excess the computer
system at a time. Access the computer system at time. Access to the computer is normally provided through network
so that users access the computers remote so that users access the computers. e.g. UNIX, LINUX, NETWARE etc.

Operating system based on user interface :-

i) It is known as command user interface. This type of operating system provides the user facility of giving
commands either from keyboard or from a script. In this type of operating system and syntax. e.g. MS-DOS.

ii) GUI (Graphical User Interface) :- Graphical User Interlace allows the user to interact with the system using
window, icons, menus, menus and a pointer to control the operating system. Mouse is the key input device used in
this type of operating system. One of the most important advantage of GUI is it is easy to learn, begin and use. e.g.
Window-2000, Windows-XP, Windows-Vista.
.
25. Define Language Processor. Different between compiler, Interpreter and Assembler?
Ans:- A language processor is a special type of a computer software that has the capacity of translator the source
code or program codes into machine codes.

Compiler Interpreter Assembler


- It's a computer program(s) that - It translates high level - It is a program that takes
transforms source code written in a instructions into an basic computer instruction(s)
programming language into machine intermediate form, it translates and converts then into a
language that is the target language the code into the intermediate pattern of bits that the
which usually has a binary form form line by line an caries out computer's processor can use
known as object code. specific actions. to perform it's basic
- It generate object file. - It cannot generate object file. operations. The language
- Compiler translation is fast - Interpreter translation is slow used to program the
- Debugging is Fast - Debugging is Slow assembler is called assembly
- For E.g:- TC computer - For E.g:- BASIC language.
- Debugging is Easy
- For E.g:- TASM

13 | P a g e prepared by Ghanashyam Dhungana


26. Define Virus. Explain the types of Virus?
Ans:- A computer virus is a malicious program that self-replicates by copying itself to another program. In other
words, the computer virus spreads by itself into other executable code or documents. The purpose of creating a
computer virus is to infect vulnerable systems, gain admin control and steal user sensitive data. Hackers design
computer viruses with malicious intent and prey on online users by tricking them.
Types of Computer Viruses

A computer virus is one type of malware that inserts its virus code to multiply itself by altering the programs and
applications. The computer gets infected through the replication of malicious code.
Computer viruses come in different forms to infect the system in different ways. Some of the most common
viruses are
Boot Sector Virus – This type of virus infects the master boot record and it is challenging and a complex task to
remove this virus and often requires the system to be formatted. Mostly it spreads through removable media.
Direct Action Virus – This is also called non-resident virus, it gets installed or stays hidden in the computer
memory. It stays attached to the specific type of files that it infect. It does not affect the user experience and
system’s performance.
Resident Virus – Unlike direct action viruses, resident viruses get installed on the computer. It is difficult to
identify the virus and it is even difficult to remove a resident virus.
Multipartite Virus – This type of virus spreads through multiple ways. It infects both the boot sector and
executable files at the same time.
Polymorphic Virus – These type of viruses are difficult to identify with a traditional anti-virus program. This is
because the polymorphic viruses alters its signature pattern whenever it replicates.

27. Define open source Software . Explain the advantage of Open Source Software?
Ans:- Open-source software (OSS) is any sort of computer software that's distributed with its source code available
for modification. That means it usually includes a license for programmers to change the software in any way they
choose: They can fix bugs, improve functions, or adapt the software to suit their own needs.

Advantages of Open-Source Software:-


 Its quality can be easily and greatly improved when its source code is passed around, tested, and fixed.
 It offers a valuable learning opportunity for programmers. They can apply skills to the most popular
programs available today.
 It can be more secure than proprietary software because bugs are identified and fixed quickly.
 Since it is in the public domain, and constantly subject to updates, there is little chance it can become
unavailable or quickly outmoded—an important plus for long-term projects.

28. Define Virtual Memory? Explain the uses of Virtual Memory?


Ans:- Virtual memory is a memory management capability of an operating system (OS) that uses hardware and
software to allow a computer to compensate for physical memory shortages by temporarily transferring data from
random access memory (RAM) to disk storage.
the uses of Virtual Memory allows us to run more applications on the system than we have enough physical memory
to support. Virtual memory is simulated memory that is written to a file on the hard drive. That file is often called
page file or swap file. It's used by operating systems to simulate physical RAM by using hard disk space.

29. Define Flat-File System?


Ans:- A flat file system is a system in which every file in an operating system is at the same directory level. These
primitive file systems were mostly used in early computing systems prior to the development of the hierarchical
file systems that are used today.

30. Define database . Explain the characteristics of Database System?


Ans:- A database is a collection of information that is organized so that it can be easily accessed, managed and
updated. Data is organized into rows, columns and tables, and it is indexed to make it easier to find relevant
information.

Following characteristics –

1. Represent Some Aspects of real world applications


2. Self Describing nature
3. Logical relationship between records and data
4. Control Data Redundancy
14 | P a g e prepared by Ghanashyam Dhungana
5. Query Language
6. Multiuser and Concurrent Access
7. Multiple views of database

1. Represent Some Aspects of real world applications


A database represents some features of real world applications. Any change in the real world is reflected in the
database. For example, let us take railway reservation system; we have in our mind some certain applications of
maintaining records of attendance, waiting list, train arrival and departure time, certain day etc. related to each
train.
2. Self Describing nature
A database is of self describing nature; it always describes and narrates itself. It contains the description of the
whole data structure, the constraints and the variables. It makes it different from traditional file management system
in which definition was not the part of application program. These definitions are used by the users and DBMS
software when needed.
3. Logical relationship between records and data
A database gives a logical relationship between its records and data. So a user can access various records depending
upon the logical conditions by a single query from the database.
4. Control Data Redundancy
DBMS follows the rules of normalization, which splits a relation when any of its attributes is having redundancy in
values. Normalization is a mathematically rich and scientific process that reduces data redundancy.
5. Query Language
DBMS is equipped with query language, which makes it more efficient to retrieve and manipulate data. A user can
apply as many and as different filtering options as required to retrieve a set of data. Traditionally it was not possible
where file-processing system was used.
6. Multiuser and Concurrent Access
DBMS supports multi-user environment and allows them to access and manipulate data in parallel. Though there
are restrictions on transactions when users attempt to handle the same data item, but users are always unaware of
them.
7. Multiple views of database
Basically, a view is a subset of the database. A view is defined and devoted for a particular user of the system.
Different users of the system may have different views of the same system. Every view contains only the data of
interest to a user or a group of users. It is the responsibility of users to be aware of how and where the data of their
interest is stored.

31. What is DBMS ? Explain the function of DBMS?


Ans:- DBMS is defined as the collection of interrelated data and set of program to access those data. The collection
of data is usually database which contains information about any particular organization. There are different forms
of database management system, each characterized by the way data are defined and structured, called database
architecture A DBMS generally manipulates the data itself, the data format, field names, record structure and file
structure. It also defines rules to validate and manipulate this data. A DBMS relieves users of framing programs
for data maintenance. Fourth-generation query languages, such as SQL, are used along with the DBMS package
to interact with a database. Some other DBMS examples include: MySQL, SQL Server, Oracle, dBASE, FoxPro.
The function of DBMS

 Concurrency: concurrent access (meaning 'at the same time') to the same database by multiple users
 Security: security rules to determine access rights of users
 Backup and recovery: processes to back-up the data regularly and recover data if a problem occurs
 Integrity: database structure and rules improve the integrity of the data
 Data descriptions: a data dictionary provides a description of the data

32. Explain the different types of database models with there merits and Demerits?

Ans:-.Following are different architecture.


 Hierarchical Database Model
 Network Database Model
 Relational Database Model

Hierarchical Database Model


This is one of the oldest type of base model. In this model, data is rented in the form of records. Each record multiple
fields/ attributes. All records arranged in database as tree like tree the relationship between the records called parent
child relationship in which any child record relates to only a single parents type record.
15 | P a g e prepared by Ghanashyam Dhungana
Advantages:- Disadvantages:-
It is the easiest model. It is old fashioned out- dated model.
It has one or more attributes. It does not support many to many relationship.
Searching is fast & easy if parent is kids. The dependency on parent nodes is not beneficial.
It supports one to one and one to many relationships. Increase redundancy because same data is written
indifferent places.

Network Database Model:-


The network model replaced Hierarchical model due to some limitation on the model. Suppose an employee relates to
two departments, then the Hierarchical model cannot able to arrange rewards in proper place. So, network database
model was emerged to arrange non-hierarchical database. The structure of database is like graph rather than tree
structure. A network model consist of collection records which are interrelated to each other with the help of
relationship. Each record has multiple fields and each field has only one data value.

Advantages:- Disadvantages:-
It accepts many-to-many relationship. Needs long programs to handle relationship.
Searching is fast because of multi-directional pointer. Pointer needed in the database increases overhead of
The network model is simple and easy to design. storage.
It reduces data redundancy. Less security because it is opens to all

.
Relational Database Model:-
For example:- It we have relationship between student and student 1 table then we get the following.

Roll Name Math Eng. Computer


1. Hari 80 90 95
2. Sita 90 80 85
3. Ram 95 95 95
In Relational data Model, the data is organizes into tables (i.e. rows and column). These tables are called relations. A
row in a table represents a relationship among a set of values. Since, a table is a collection of such relationship, it is
generally referred to using the mathematical term relation, from which the relational data model derives its name.
Notice from above table (student, student -) that here each student here each student has unique Roll no and has marks
of Math. Eng. and computer. Her Roll no. makes relationship between two tables which in turn displays the 3rd table.

Advantage Disadvantages:
Normalization of the database is possible. It is complex than other models.
Easy to use. Too many rules makes database non-user friendly.
Very less redundancy. It needs more powerful hardware computer and data
Integrity rule can be easily implemented. storage devices.

33. Explain the different types of LAN topology with


1. LAN (Local Area Network):-
A local area network is privilege owned small size network. It covers only a small geographical area such as
with in a room, office, building or up to few kilometers.
LAN Topologies
Network topology refers to the physical of the network. It shows the geometrical representation of all the links
and linking devices, also called nodes. Simply it refers the computers in the network and how they are interconnected
to each other. The most common LAN Topologies are:-Bus Topology, Ring Topology, Star Topology, Mesh
Topology, Hybrid Topology, Tree Topology
1. Bus Topology:- Central or backbone cable (BUS) as able that is called 'BUS'. It acts as a backbone. A bus must
terminated on both sides using terminator to prevent signal bounce. The nodes are connected to the bus by a drop
line by using T-connector. Messages originating from the computers is transmitted in both direction. It is based
on client-server network architecture.

16 | P a g e prepared by Ghanashyam Dhungana


Advantages Disadvantages
 It is simple and easy to install  Data traffic is very high in bus so they may be
 It is inexpensive topology because it requires chances of data collision.
amount of cable and networking device.  The length of bus should be small other wise he
 If any computer in the network gets do, then it does performance of the network down.
not affect other computers.  If there is problem in the bus then the whole
 It is more flexible because we can ea connect or network gets down.
disconnect any nodes in the bc.  It is very difficult to find fault in the network.

2. Star Topology:- Computers in the network, are connected to each other with the help of central connecting device
known as switch or hub. It is based on client is done through the central server with the help of switch or hub in
the entire network. The hub controls the traffic and widely used topology.
Advantages Disadvantages
 It is simple, reliable and easy to install  It requires very large amount of cable.
 It is flexible to connect and remove nodes in the  It is expensive because of cables and networking
network. devices.
 It is very easy to find in the network.  If there is any problem in the central device then
 If any computers in the network goes down, then entire network goes down.
other computer can continue their functions.  The data traffic is high in central device so there may
be chance of data collsion.
3. Ring Topology:- Computers are interconnected to each other be making a closed circular structure. That means
each computer is connected to other two adjacent computers in either side. It is based on peer-to peer network
architecture .Communication is done in single direction only. When one computer receives the message, then it
compares the destination address of the message and its own address, it matches it accepts the message otherwise
the message is retransmitted to the next computer in the network.

Advantages Disadvantages
 If is simple and inexpensive topology.  It is flexible topology because it is difficult to add
 There is less chances of data collision because of and remove nodes.
one directional data transfer.  It is not suitable for large organization.
 There is no server so each computer has equal  If there is any problem in any nodes then the entire
access facility to all the resources. network goes down.

4. Mesh Topology:- Every computer in the network point to point connection to all other computers by using multi-
port connector. There multi-port connection between two computers which provide the alternate path of data
transfer. The communication is done in ho direction. It is based on peer –to-peer architecture.

Advantages Disadvantages
 It is the fastest and robust type topology.  It is the most complex and expensive topology.
 It is the most reliable topology because of multiple  It is difficult to find errors in the network.
connection.  It requires maximum amount of cable and
 Failure in any node or transmission media does not multi-port connector.
effect the network.  It is difficult to add or remove any node in the
 Less chances of data traffic because of multiple network.
path.

5. Tree Topology:- The topology is the extension of or star topology. So it extends the branch of bus or star topology
allowing more stations to access the bus. The computers arranged in a distinct hierarchical structure. Data can flow
up-to down and vice versa.
Advantages Disadvantages
 It is easy to manage network because many sub- The failure of root node will cause the failure of entire
networks. network.
 It is very flexible so we can add and remove any It is expensive because of large amount of cables and
node. networking devices.
 It is easier to find fault in the networks. The data traffic is high at the root network so there may
be chances of data connection.

6. Hybrid Topology:- If two or more topologies are computer topology. So, it is very difficult to design and to
implement the hybrid topology. It is expensive too.

17 | P a g e prepared by Ghanashyam Dhungana


34. Different between DDL and DML with their use?

35. Define normalization . Explain the different level of Normalization ?


Ans:- Database normalization is the process of structuring a relational database in accordance with a series of so-
called normal forms in order to reduce data redundancy and improve data integrity. Normalization entails
organizing the columns (attributes) and tables (relations) of a database to ensure that their dependencies are
properly enforced by database integrity constraints. It is accomplished by applying some formal rules either by a
process of synthesis (creating a new database design) or decomposition (improving an existing database design).
The different level of Normalization
a) First Normal Form (1NF)
b) Second Normal Form (2NF)
c) Third Normal Form (3NF)
d) Beyond (3NF)
a) First Normal Form
An entity type is in first normal form (1NF) when it contains no repeating groups of data. It must be in One to One
Relation

b) Second Normal Form


2NF is a normal form used in database normalization. It must be qualify for second normal form a relation must
be in first normal form (1NF) . It does not have any non-prime attribute that is dependent on any proper subset of
any candidate key of the relation. A non-prime attribute of a relation is an attribute that is not a part of any candidate
key of the relation. Put simply, a relation is in 2NF if it is in 1NF and every non-prime attribute of the relation is
dependent on the whole of every candidate key. Note that it does not put any restriction on the non-prime to non-
prime attribute dependency. That is addressed in Third normal form.

C) Third Normal Form


3NF is a normal form that is used in normalizing a database design to reduce the duplication of data and ensure
referential integrity by ensuring that the entity is in second normal form all the attributes in a table are determined
only by the candidate keys of that relation and not by any non-prime attributes.
3NF was designed to improve database processing while minimizing storage costs. 3NF data modeling was ideal
for online transaction processing (OLTP) applications with heavy order entry type of needs

36. What is data Security ?


Ans:- Data security refers to the process of protecting data from unauthorized access and data corruption throughout
its lifecycle. Data security includes data encryption, tokenization, and key management practices that protect data
across all applications and platforms.

18 | P a g e prepared by Ghanashyam Dhungana


37. Define Date mining . Explain the application of data mining?
Ans:- Data mining is a process used by companies to turn raw data into useful information. By using software to
look for patterns in large batches of data, businesses can learn more about their customers to develop more
effective marketing strategies, increase sales and decrease costs.
The application of data mining data mining is widely used:
Future Healthcare:-Data mining holds great potential to improve health systems. It uses data and analytics to identify
best practices that improve care and reduce costs. Researchers use data mining approaches like multi-dimensional
databases, machine learning, soft computing, data visualization and statistics. Mining can be used to predict the
volume of patients in every category. Processes are developed that make sure that the patients receive appropriate
care at the right place and at the right time. Data mining can also help healthcare insurers to detect fraud and abuse.
Market Basket Analysis:-Market basket analysis is a modelling technique based upon a theory that if you buy a
certain group of items you are more likely to buy another group of items. This technique may allow the retailer to
understand the purchase behaviour of a buyer. This information may help the retailer to know the buyer’s needs
and change the store’s layout accordingly. Using differential analysis comparison of results between different
stores, between customers in different demographic groups can be done.
Education:- There is a new emerging field, called Educational Data Mining, concerns with developing methods
that discover knowledge from data originating from educational Environments. The goals of EDM are identified
as predicting students’ future learning behaviour, studying the effects of educational support, and advancing
scientific knowledge about learning. Data mining can be used by an institution to take accurate decisions and also
to predict the results of the student. With the results the institution can focus on what to teach and how to teach.
Learning pattern of the students can be captured and used to develop techniques to teach them.
Manufacturing Engineering:- Knowledge is the best asset a manufacturing enterprise would possess. Data mining
tools can be very useful to discover patterns in complex manufacturing process. Data mining can be used in system-
level designing to extract the relationships between product architecture, product portfolio, and customer needs
data. It can also be used to predict the product development span time, cost, and dependencies among other tasks.
CRM:- Customer Relationship Management is all about acquiring and retaining customers, also improving
customers’ loyalty and implementing customer focused strategies. To maintain a proper relationship with a
customer a business need to collect data and analyse the information. This is where data mining plays its part. With
data mining technologies the collected data can be used for analysis. Instead of being confused where to focus to
retain customer, the seekers for the solution get filtered results.
Fraud Detection:- Billions of dollars have been lost to the action of frauds. Traditional methods of fraud detection
are time consuming and complex. Data mining aids in providing meaningful patterns and turning data into
information. Any information that is valid and useful is knowledge. A perfect fraud detection system should protect
information of all the users. A supervised method includes collection of sample records. These records are
classified fraudulent or non-fraudulent. A model is built using this data and the algorithm is made to identify
whether the record is fraudulent or not.
Intrusion Detection:- Any action that will compromise the integrity and confidentiality of a resource is an intrusion.
The defensive measures to avoid an intrusion includes user authentication, avoid programming errors, and
information protection. Data mining can help improve intrusion detection by adding a level of focus to anomaly
detection. It helps an analyst to distinguish an activity from common everyday network activity. Data mining also
helps extract data which is more relevant to the problem.
Lie Detection:- Apprehending a criminal is easy whereas bringing out the truth from him is difficult. Law
enforcement can use mining techniques to investigate crimes, monitor communication of suspected terrorists. This
filed includes text mining also. This process seeks to find meaningful patterns in data which is usually unstructured
text. The data sample collected from previous investigations are compared and a model for lie detection is created.
With this model processes can be created according to the necessity.

38. Different Between Computer Architecture and Computer Organization.

Computer Architecture Computer organization


i) It abstract model and are those attributes that are i) It expresses the realization of the architecture or
visible to programmer like instructions sets, no of how features are implemented like these registers
bits used for data, addressing techniques. ,those data paths or this connection to memory.
ii) For eg:- a company that manufactures cars, contents of CO are ALU, CPU and memory and
design and all low-level details of the car come under memory organizations.
computer architecture (abstract, programmers view) ii) while making it’s parts piece by piece and
connecting together the different components of that
car by keeping the basic design in mind comes under
computer organization (physical and visible).

19 | P a g e prepared by Ghanashyam Dhungana


DOS

Disk Operating System (DOS):


-DOS is a single user and character based operating system.
-It need command to run task in computer so it is called command base program.
-The first DOS maker is IBM Company now it is make by Microsoft Corporation (USA).
-The first DOS version is DOS 3.3 and some available version of DOS are DOS 3.36, DOS 4.21, DOS 5.22, and
DOS 6.22.
DOS command classified in two types:
a) Internal command
b) External command
a) Internal command: -
The command which don't need any supported file to execute called the internal command and e. g. CLS, MD
and REN command etc.
b) External command: -
The command which need supported files to executed called the external command and e.g. Format, Sys etc

DOS Command:
1.) DIR command (For looking)
Use: It is display contains of folder.
Syntax: C :\> Dir enter

2.) DIR Switch:


Command for checking page wise.
C :\> Dir/p enter
Command for checking width wise.
C:\>Dir/w enter
Command for checking page wise and width wise.
C:\>Dir/p/w.

Wild card character:


Dos used two type of wild card character for search any files and folder with Dir command.
1. Single character wild card =&
2. Multi character wild card =*
1.) Single character wild card ($): It is used to search single character.
C:\>Dir_A$ enter
2.) Multi character wild card (*): It is used to search multi character.
C:\>Dir_A* enter

3.) Changing Default device:


Use: command for changing the drive.
Syntax: C:\>Drine letter: enter.
E.g. C :\> D: enter

4.) MD Command:
Use command for make a new directory.
Syntax: C:\>MD_ Directory name enter
e.g. C:\>md_Ghanashyam Dhungana enter

5.) CD Command:
Use command for changing directory.
Syntax: C:\>cd_directory name enter
e.g. C:\>CD_ Ghanashyam Dhungana

6.) CD\ Command:


Use: Command for go to root directory.
Syntax: C:\ Ghanashyam Dhungana \123>CD\enter
e.g. C:\ Ghanashyam Dhungana \123>CD\enter

7) RD Command:
Use: Command for delete empty directory.

20 | P a g e prepared by Ghanashyam Dhungana


Syntax: C:\>RD_directory name enter
e.g. C:\>Rd_ Ghanashyam Dhungana enter

8.) Copy con command:


Use: Command for making a new file.
Syntax: C:\>copy con_file name enter
e.g. C:\>copy con_ Ghanashyam Dhungana.txt enter

9.) Type Command:


Use: Command for open the existing file.
Syntax: C:\>type_file name enter
e.g. C:\> Ghanashyam Dhungana.txt enter

10.) Del Command:


Use: Command for deleting the file.
Syntax: C:\>Del_file name enter
e.g. C:\>Del_ Ghanashyam Dhungana.txt enter

11.) Ren command:


Use: command for rename the existing file name.
Syntax: C:\>ren_old name new name enter.
e.g. C:\>Ren_ Ghanashyam Dhungana .txt_tikapur.txt enter

12.) Edit Command:


Use: 1. Command for modify the content of existing file.
2. Command for create a new file.
Syntax: C:\>edit_existing file name enter (modify).
Syntax: C :\> Edit_new file name enter9create new file).
e.g. C:\>edit_ Ghanashyam Dhungana t.txt enters.

13.) Ver Command:


Use: Command for checking version of DOS.
e.g. C:\>ver enters.

14. Label Command:


Use: Command for changing volume label of HDD.
e.g. C:\>label enter
15.) Tree command:
Use: Command for checking directory in tree structure.
Syntax: C:\>Tree_file name
e.g. C:\>Tree_Ghanashyam Dhungana enters.

16.) Vol command:


Use: Use command for checking volume label of HDD.
e.g. C:\>vol enters.

17.) Data command:


Use: Command for checking and change current data of computer.
e.g. C:\>data enter

18.) Time command:


Use: command for clear screen of DOS.
e.g. C:\>time enters.

19.) CLS Command:


Use: Command for clear screen of DOS.
e.g. C:\>CLS enters.

20.) Copy command:


Use: command for copied a files from folder to another folder.
Syntax: C:\>copy_source file path_destination path.
e.g. C:\>copy_C:\ Ghanashyam Dhungana \Ghanashyam Dhungana.txt_C:\Gopal.

21 | P a g e prepared by Ghanashyam Dhungana


21.) CD. Command:
Use: Command for go to parent directory from child directory
Syntax: C:\ Ghanashyam Dhungana >CD. Enter

22.) EXIT
Use: To exit from DOS.
Syntax: EXIT
e.g.: C:\> EXIT

External Commands
23.) MOVE
Use: To move the files from one location to another.
Syntax: MOVE [drive:] [path] source file [drive:] [path]
e.g.: C:\> MOVE C:\> MY doc\*.doc A:

24). XCOPY
Use: To copy files and subdirectories from one location to another.
Syntax: XCOPY [drive:] [path] file [drive:] [path]
e.g.: C:\>XCOPT C:\ my doc\ *.* A:

25.) DELTREE
Use: To delete directory and its subdirectory and files at a time.
Syntax: DELTREE [drive:] [path] directory name
e.g.: C:\>deltree TT

26.) LABEL
Use: To display the disk drive volume label.
Syntax: LABEL [drive:]
e.g.: C:\> LABEL A:
(Also allows changing the volume label of the disk drive.)

27.) SYS
Function: to transfer system file.
Syntax: SYS [Source drive:] [Destination drive:]
Example: C:\> SYS A:

28.) FORMAT
Use: To prepare a disk for use with DOS.
Syntax: FORMAT [drive:] [/s] [/q]
Example: C:\> FORMAT A:

29.) ATTRIB
Use: to change the attributes of files.
Attributes Meaning
H Hidden files
R Read only files
S System files
+ Set the attributes
- Clear
Syntax: ATTRIB [+/-] [H/R/S] [Filename]
Example: C:\> ATTRIB +H PCI.TXT
C:\> ATTRIB +R TT.EXE
C:\> ATTRIB -H PCI.TXT
C:\> ATTRIB

30.) CHKDSK
Use: To check the drives for errors and provides a disk and memory status report.
Syntax: CHKDSK Drive
Example: c:/> CHKDSK /f /v

22 | P a g e prepared by Ghanashyam Dhungana


31.) Scandisk
Use: To check and repair a disk.
Syntax: Scandisk [drive:]
Example: C:\> Scandisk D:

32.) MORE
Use: To display the output page by page instead of continuous scrolling.
Syntax: DOS-Command І MORE
Example: C:\> DIR І MORE

33.) DOSKEY
Use: To record all DOS commands into the memory that you have previously used in DOS prompt.
Syntax: DOSKEY [new DOS command =DOS command]
Example: C:\> DOSKEY

34.) /? (Help)
Use: To get any types of help about DOC commands.
Syntax: DOS command /?
Example: C:\> DIR /?

NOTE: DOS has more that 110 commands but we study only most usable command which can run by windows
(DOS).

23 | P a g e prepared by Ghanashyam Dhungana


Tribhuvan University
Faculty of Humanities & Social Sciences
OFFICE OF THE DEAN
2018
Bachelor in Computer Applications Full Marks: 60
Course Title: Computer Fundamentals and Application Pass Marks: 24
Code No: CACS 101 Time: 3 hours
Semester: Ist

Candidates are required to answer the questions in their own words as far as possible.
Group B
Attempt any SIX questions. [6*5 = 30]
11. Define Computer. Explain the anatomy of digital computer with block diagram.
12. Define Operating System. Explain the functions of Operating System.
13. Define DBMS. Explain the different database models with their merits and demerits.
14. Explain the different types of LAN topologies with their advantages and disadvantages.
15. What is WWW? Differentiate between intranet, extranet and internet with example.
16. What are contemporary technologies? Explain any two contemporary technologies with roles.
17. Write the DOS commands to complete following tasks.
a) Create sub directory theory and practical inside d:\exam\
b) Create the file name marks.txt inside theory writing the content, "Theory marks in CFA".
c) Rename the file name marks.txt with CFAmarks.txt.
d) Make hidden the file CFAmarks.txt.
e) Search the all files with .pdf extension.

Group C
Attempt any TWO questions. [2*10 = 20]
18. i) You are provided following data:
Bageswori Secondary School
Surkhet
Mark - Ledger
D E F G H I J K L M
11 Name Eng. Nep. Eco. Sociology Computer Total Percentage Result Division
12 Gautam 56 56 76 75 68
13 Saru 67 54 64 64 76
14 Binod 87 65 54 59 66
15 Ritu 45 67 56 72 85
16 Kabindra 89 34 63 59 52

Write the formula in spread sheet package to calculate following on basis on given conditions:
1. Calculate Total marks. [1]
2. Calculate Percentage. [1]
3. Mark the student with either "PASS" or "FAIL" [Pass Marks 35]. [1.5]
4. Calculate the division [if percentage >=60 then First, if percentage >=45 and percentage <60 then Second, if
percentage >=35 and percentage <45 then Third otherwise "xxx"] [1.5]
ii) Explain the features of Font control tools in word processing package. [5]
19. i) Define computer peripherals. Differentiate between impact and non-impact printers. [1 + 4]
ii) Define Presentation. Write the features of good presentation package. [5]
20. Define CMYK color model. Explain the basic tools and transforms available in Photoshop. [2 + 5 + 3]

24 | P a g e prepared by Ghanashyam Dhungana


(C) Synflooding (D) Software Piracy
9) A program either talk or music that is made available in digital format for
1) Computers that control processes, accept data in a continuous..... automatic download over the internet is called a.....
(A) data traffic pattern (B) data highway (A) wiki (B) broadcast
(C) infinite loop (D) feedback loop (C) vodcast (D) podcast
2) A language reflects the way people think mathematically is..... 10) A USB communication device that supports data encryption for secure wireless
(A) cross platform programming (B) functional communication for notebook users is called a...
(C) event driven programming (D) 3GL business programming (A) USB Wireless Network adapter (B) wireless switch
3) A mistake in an algorithm that causes incorrect results is called a.... (C) wireless hub (D) router
(A) logical error (B) syntax error 11) The term "user interface" refers to .....
(C) procedural error (D) compiler error (A) What the user sees on the screen and how they can interact with it
4) A device for changing the connection on a connector to a different configuration is .... (B) How the operating system responds to user commands
(A) a converter (B) a component (C) an attachment (D) an adapter (C) the means by which the user interacts with the peripheral devices on the computer.
5) Technique that is used to send more than one call over a single line is (D) None of these.
(A) Digital transmission (B) Infrared transmission 12) The connection between your computer at home and your local ISP is called.....
(C) Streaming (D) Multiplexing (A) the last mile (B) the home stretch
6) Which of the following would you find on LinkedIn? (C) the home page (D) the vital mile
(A) Games (B) Connections 13) ....are attempts by individuals to obtain confidential information from you by
(C) Chat (D) Applications falsifying their identity through e-mails.
7) The method of Internet access that requires a phone line, but offers faster access (A) Phishing trips (B) Viruses (C) Phishing scams (D) Spyware scams
speeds than dial-up is the.....Connection 14) ERP is an acronym for....
(A) Cable access (B) Satellite access (A)Enterprise Relationship planning (B)Enterprise Resource planning
(C) Fiber optic service (D) Digital Subscriber Line (DSL) (C)Enterprise Reorder planning (D)None.
8) ......is a form of denial of service attack in which a hostile client repeatedly sends 15) Collecting personal information and effectively posing as another individual is
SYN packets to every port on the server using fake IP addresses. known as the crime of .....
(A) Cyber crime (B) Memory shaving (A) spooling (B) spoofing (C) hacking` (D) identity theft

25 | P a g e prepared by Ghanashyam Dhungana


16) The signal that a computer is waiting for a command from the user is.... (A) The programme which arrives by being wrapped in box.
(A) prompt (B) event (C) time slice (D) interrupt (B) The programme which is the permanent part of the computer
17) Physical security is concerned with protecting computer hardware from human (C) The computer which is the part of a big computer.
tampering & natural disasters and..... security is concerned with protecting software (D) Some combination of computer hardware and software.
from unauthorized tampering or damage. 24) Which device connects a LAN to the Internet ?
(A) data (B) cyber (C) internet (D) metaphysical (A) Adapter (B) Repeater (C) Router (D) None of the above
18) Which ports connect special types of music instruments to sound cards? 25) EBCDIC stands for
(A) BUS (B) CPU (A) Extended Binary Coded Decimal Interchange Code
(C) USB (D) Musical Instrument Digital Interface (MIDI) (B) Extended Bit Code Decimal Interchange Code
(C) Extended Bit Case Decimal Interchange Code
19) Where you are likely to find an embedded operating system? (D) Extended Binary Case Decimal Interchange Code
(A) On a desktop operating system (B) On a networked PC 26) The first general purpose electronic digital computer in the world was?
(C) On a PDA (D) On a Mainframe. (A) UNIVAC (Universal Automatic Computer)
20) Which of the following places the common data elements in order from smallest (B) EDVAC (Electronic Discrete Variable Automatic Computer)
to largest? (C) ENIAC (Electronic Numerical Integrator & Computer)
(A) Bit, byte, character, record, field, file, database (D) EDSAC (Electronic Delay Storage Automatic Computer)
(B) Database, file, record, field, character 27) Signals can be analog or digital and a computer that processes the both type of
(C) Character, file, record, field, database signals is known as?
(D) Character, field, record, file, database (A) Analog computer (B) Digital Computer
21) Which protocol provides e-mail facility among different hosts? (C) Hybrid Computer (D) Mainframe Computer
(A) File Transfer Protocol (FTP) (B) TELNET 28) Human beings are referred to as Homo sapiens, which device is called Silico
(C) Simple Mail Transfer Protocol (SMTP) Sapiens?
(D) Simple Network Management Protocol (SNMP) (A) Monitor (B) Hardware (C) Robot (D) Computer
22) Which of the following memory is non-volatile? 29) EBCDIC can code up to how many different characters?
(A) DRAM (B) SRAM (C) ROM (D) None of the above (A) 256 (B) 16 (C) 32 (D) 64
23) What is embedded system? 30) Different components of the motherboard of a PC unit are linked together by

26 | P a g e prepared by Ghanashyam Dhungana


sets of parallel electrical conducting lines. What are these lines called? 39) A language translator that analyses and executes the source code in-line-by-
(A) Conductors (B) Buses (C) Connectors (D) Consecutive line manner without looking at the entire program is called a/an
31) Which is the first automatic electronic digital computer? (A) Interpreter (B) Simulator
(A) ENIAC (B) MARK I (C) Z3 (D) ABC (Atanasoff –Berry Computer) (C) Compiler (D) Commander
32) India’s first supercomputer is 40) Who designed the first electronics computer (ENIAC)?
(A) Cyber 205 (B) Aaditya (C) Anupam (D) PARAM 8000 (A) Von Neumann (B) John Eckert & John Mauchly
33) The metal disks, which are permanently housed in, sealed and contamination (C) Joseph M Jacquard (D) None of the above
free containers are called? 41) A device driver acts like a....... between the device & OS
(A) Hard disks (B) Floppy disk (C) Winchester disk (D) Flexible disk (A) inverter (B) converter
34) What was the name of the first commercially available microprocessor chip? (C) translator (D) None
(A) Intel 308 (B) Intel 33 (C) Intel 4004 (D) Motorola 639 42) Computers can be divided into.....major categories.
35) The first digital computer built with IC chips was known as (A) Four ( Micro, Mini, Mainframe, Super) (B) Three
(A) IBM 7090 (B) Apple – 1 (C) IBM System / 360 (D) VAX - 10 (C) One (D) None
36) RATS stands for 43) SAN stands for
(A) Regression Analysis Time Series (A) Storage Area Network (B) Super Array Network
(B) Regression Analysis Time Sharing (C) Shared Area Network= (D) None
(C) Real Analysis Series 44) NAS stands for
(D) All of above (A) Network Area Service (B) Network Attached Storage
37) The magnetic storage chip used to provide non-volatile direct access storage of (C) Network Attached Service (D) None
data and that have no moving parts are known as 45) To produce high quality graphics (hardcopy) in color, ......... is used
(A)Magnetic core memory (B)Magnetic tape memory (A) RGB monitor (B) Plotter
(C)Magnetic disk memory (D)Magnetic bubble memory (C) Ink-jet printer (D) Laser printer
38) A computer program that converts an entire program into machine language is 46) Hardware or software designed to guard against unauthorized access to a
called a/an computer network is known as.....
(A) Interpreter (B) Simulator (A) Hacker-proof program (B) Firewall
(C) Compiler (D) Commander (C) Hacker-resistant server (D) None

27 | P a g e prepared by Ghanashyam Dhungana


user to purchase the unbranded version with no advertising.
47) The scrambling of code is known as (A) Malware (B) Spyware (C) Freeware (D) None
(A) Encryption (B) a firewall 54) Which is used to display one or more web pages within another normal web
(C) Scrambling (D) None page?
48) A type of message that web servers pass to your web browser when you visit (A) IFRAME (B) Hyperlink (C) Home page (D) None
the website
(A) Cache (B) Spam (C) None (D) Cookie 55) What is the main difference between a mainframe and a super computer?
49) Software that you can use free of charge for a set period. After that you have to (A) Supercomputer is much larger than mainframe computers
buy it to keep working is known as (B) Supercomputers are much smaller than mainframe computers
(A) Freeware (C) Supercomputers are focused to execute few programs as fast as possible while
(B) Shareware mainframe uses its power to execute as many programs concurrently.
(C) Software (D) None (D) None
50) A type of virus (malicious code) that looks for security loopholes in a system 56) storage area used to store data to a compensate for the difference in speed at
and uses that to replicate itself is known as which the different units can handle data is
(A) Worm (A) Memory (B) Buffer (C) Accumulator (D) None
(B) Threat 57) Computer is free from tiresome and boardroom. We call it
(C) Trojan Horse (A) Accuracy (B) Diligence (C) Versatility (D) None
(D) None 58) Integrated Circuits (ICs) are related to which generation of computers?
51) RAID stands for________ (A) First generation (B) Second generation
(A) Reproduce Array of Intelligent Disks (C) Third generation (D) None
(B) Reproduce Array of Inexpensive Disks 59) Which type of computers uses the 8-bit code called EBCDIC?
(C) Redundant Array of Inexpensive Drives (A) Minicomputers
(D) Redundant Array of Inexpensive Disks (B) Microcomputers
52) Software that monitors your online computer activities is known as (C) Mainframe computers
(A) Malware (B) Spyware (C) Freeware (D) None (D) None
53) Software that is made available at no cost and is sometimes used to entice a 60) The ALU of a computer responds to the commands coming from

28 | P a g e prepared by Ghanashyam Dhungana


(A) Primary memory (C) To control flow of information
(B) Control section (D) To do math’s works
(C) External memory 65) The terminal device that functions as a cash register, computer terminal, and
(D) Cache memory OCR reader is the?
61) A physical connection between the microprocessor memory and other parts of (A) Data collection terminal
the microcomputer is known as (B) OCR register terminal
(A) Path (C) Video Display terminal
(B) Address bus (D) POS terminal
(C) Route 66) A set of flip flops integrated together is called ____
(D) All of the above (A) Counter (B) Adder (C) Register (D) None of the above
67) A register organized to allow moving left or right operations is called a ____
62) A technique used by codes to convert an analog signal into a digital bit stream (A) Counter
is known as (B) Loader
(A) Pulse code modulation (C) Adder
(B) Pulse stretcher (D) Shift register
(C) Query processing
(D) Queue management 68) How many address lines are needed to address each machine location in a 2048
63) Before a disk drive can access any sector record, a computer program has to x 4 memory chip?
provide the record’s disk address. What information does this address specify? (A) 10
(A) Track number (B) 11
(B) Sector number (C) 8
(C) Surface number (D) 12
(D) All of above 69) Multi user systems provided cost savings for small business because they use a
64) What is the responsibility of the logical unit in the CPU of a computer? single processing unit to link several
(A) To produce result (A) Personal computers
(B) To compare numbers (B) Workstations

29 | P a g e prepared by Ghanashyam Dhungana


(C) Dumb terminals (D) Reliability
(D) Mainframes 75) Hard disk is coated on both sides with
70) The difference between memory and storage is that memory is _____ and (A) Magnetic metallic oxide
storage is __ (B) Optical metallic oxide
(A) Temporary, permanent (C) Carbon layer
(B) Permanent, temporary (D) All of the above
(C) Slow, fast 76) The contents of information are stored in
(D) All of the above (A) Memory data register
71) Which of the following is the first computer to use Stored Program Concept? (B) Memory address register
(A) UNIVAC (C) Memory arithmetic registers
(B) ENIAC (D) Memory access register
(C) EDSAC 77) The programs which are as permanent as hardware and stored in ROM is known
(D) None of above as
72) 1 nibble equals to (A) Hardware
(A) 1 bits (B) 2 bits (C) 4 bits (D) 8 bits (B) Software
73) The most commonly used standard data code to represent alphabetical, (C) Firmware
numerical and punctuation characters used in electronic data processing system is (D) ROM ware
called 78) Which of the following memories must be refreshed many times per second?
(A) ASCII (B) EBCDIC (C) BCD (D) All of the above (A) Static RAM
(B) Dynamic RAM
(C) EPROM
74) The term GIGO (Garbage In Garbage Out) is related to which characteristics of (D) ROM
computers? 79) In which mode, the communication channel is used in both directions at the
(A) Speed same time?
(B) Automatic (A) Full-duplex (B) Simplex
(C) Accuracy (C) Half-duplex (D) None of the above

30 | P a g e prepared by Ghanashyam Dhungana


85) System proposal is prepared in ...... phase of SDLC.
80) Which of the printers used in conjunction with computers uses dry ink powder? (A) Conception
(A) Daisy wheel printer (B) Line printer (B) Initiation
(C) Laser printer (D) Thermal printer (C) Analysis
81) Daisy wheel printer is a type of (D) Design
(A) Matrix printer
(B) Impact printer 86) A data warehouse
(C) Laser printer (A) Contains numerous naming conventions and formats
(D) Manual printer (B) Is organized around important subject areas
82) Which of these is considered intelligent CASE tool? (C)Contains only current data
(A) Workbench (D)None
(B) Toolkit 87) “>” symbol in DOS commands is used to
(C) Upper CASE (A) Compare two values
(D) Lower CASE (B) Redirect Input
83) Origin of internet can be tracked from (C) Redirect Output
(A) Satellite networks (D) None
(B) Radio networks 88) To connect networks of similar protocols, ........ are used
(C) ARPANET (Advanced Research Projects Agency Network) (A) Routers
(D) None (B) Gateways
84)...... is used by public & private enterprises to publish and share financial (C) Bridges
information with each other and industry analysts across all computer platforms & (D) None
the Internet. 89)........... is one reason for problems of data integrity
(A)Extensible Markup Language (XML) (A) Data availability constraints
(B) Extensible Business Reporting Language (XBRL) (B) Data inconsistency
(C) Enterprise Application Integration (EAI) (C) Data redundancy
(D) None (D) None

31 | P a g e prepared by Ghanashyam Dhungana


90) Which of the following is an advantage of mounting an application on the web? 95) Which is an open source development environment to develop dynamic web
(A) the possibility of 24-hour access for users pages?
(B) creating a system that can extend globally (A) PHP (Hypertext Preprocessor)
(C) standardizing the design of the interface (B) XML
(D) All of these (C) VB Script
91) Which of the following domains is used for profit businesses? (D) None
(A) .com 96) A protocol that allows a user to log on to a remote computer which is also
(B) .edu known as remote login is.....
(C) .net (A) FTP (B) Telnet (C) HTTP (D) None
(D) None 97) A set of rules that enables a user to log on to another computer and transfer
information between it & his/ her computer.
92) Which of the following domains is used for non-profit organizations? (A) HTTP
(A) .org (B) FTP
(B) .edu (C) WWW
(C) .net (D) None
(D) None
93) Browsers can be classified into two types. They are 98) PSTN stands for
(A) Graphical & Text (A) Public Switched Transformation Network
(B) Graphical & Navigational (B) Public Switched Telephone Network
(C) Text & Pictorial (C) Public Serviced Telnet Network
(D) None (D) None
94) The displayed data over internet can be classified into two types. They are 99) Home Page is also known as
(A) Static & Dynamic (A) Index Page
(B) Graphical & Text (B) Front Page
(C) Data & Voice (C) Back Page
(D) None (D) None

32 | P a g e prepared by Ghanashyam Dhungana


100) GPRS stands for (D) None
(A) Global Packet Radio Service 105) Freeware can be classified into four types. It includes
(B) Global Positioning Radio Service (A) Donationware, Postcardware
(C) General Packet Radio Service (B) Abandonware, Adware
(D) None (C) Both (A) & (B)
101) GSM stands for (D) None
(A) Global System for Mobile 106) Which of the following activity can be termed as software piracy?
(B) Global Service for Mobile (A) Soft loading
(C) Global System for Mobile communication (B) Counterfeiting
(D) None (C) Renting
102) TCP stands for (D) All of these
(A) Transmission Control Protocol 107) Linux is a type of ........... Software
(B) Telnet Control Protocol (A) Open Source
(C) Transmission Channel Protocol (B) Public Domain
(D) None (C) Commercial
103) Proprietary Software is also called as (D) None
(A) Closed Source Software 108) A coding language that is compatible with windows servers which is used for
(B) Open Source Software increased functionality on a website or to work with a database
(C) Commercial Software (A) HTML (B) ASP (C) XML (D) None
(D) None 109) A code that represents English characters as numbers and ranging from 0 to
127.
104) A product that is owned exclusively by a single company that can only function (A) ASCII
properly, if it is used with other products owned by the same company? (B) EBCDIC
(A) Proprietary Software (C) BCD
(B) Public Domain Software (D) All of above
(C) Commercial Software

33 | P a g e prepared by Ghanashyam Dhungana


110) An email feature, which is used to send a copy of an email to one or many (B) Utility Software
other people at the same time that you are sending it to the main recipient/s is (C) Application Software
called (D) None
(A) CC
(B) BCC
(C) To 115) A file that contains definitions of the paragraph and character styles for your
(D) None document and all things you customized like toolbars and menus is called a.......
111) An email feature which is used to send someone a BCC email, their email (A) guide
address will not show in the "to" field (B) prompt
(A) CC (C) template
(B) BCC (D) None
(C) CC & BCC 116) Programs designed specifically to address general purpose applications &
(D) None special-purpose applications are called
112) GUI stands for (A) System Software
(A) Graphic Uninstall/Install (B) Application Software
(B) Graphical User Interface (C) Operating System
(C) General Utility Interface (D) None
(D) None 117)A ..... contains buttons & menus that provide quick access to commonly used
113) A..... is a design tool that graphically shows the logic in a solution algorithm. commands.
(A) Hierarchy Chart (A) menubar
(B) Flow Chart (B) toolbar
(C) Structure Chart (C) window
(D) None (D) None
114) Programs designed to perform specific tasks related to managing computer
resources are called 118) What is the split – MAC Architecture?
(A) System Software

34 | P a g e prepared by Ghanashyam Dhungana


(A) The split-MAC architecture uses MAC addresses to create a forward/filter table (C) Peripheral devices
and break (D) None
up collision domains. 123)........ is a communication technology used by some incoming mail servers.
(B) The split-MAC architecture uses MAC addresses to create a forward/fliter table (A) TCP
(C) Both (A) & (B) (B) POP3
(D) None (C) FTP
119) In .....normal form, all non-key fields of data structure are dependent on the (D) None
whole key. 124) Which of the following format for storing & backing up computer data on tape
(A) First that evolved from Digital Audio Tape (DAT) technology?
(B) Second (A) Data Aggregation
(C) Third (B) Digital Data Storage
(D) None (C) Virtual Tape System
120) Which of the following are tasks that may be completed when configuring your (D) None
e-mail client? 125) The two basic parts of URLs are
(A) Provide the IP address of your ISP’s mail server (A) TCP & IP
(B) Provide the name of your e-mail account (B) the protocol & the domain name
(C) All of these (C) TCP & FTP
(D) None of these (D) None
121) A pixel is a...... 126) The storage locations in the internal storage of a CPU is called
(A) picture element or dot on a screen (A) reference points
(B) point of ink on a laser printed page (B) addresses
(C) point of ink on an ink jet printed page (C) locations
(D) None (D) None
122) Expansion cards are inserted into 127) The ...... database is the most widely used database structure
(A) CPU (A) General
(B) Slots (B) Standard

35 | P a g e prepared by Ghanashyam Dhungana


(C) Relational (C) Network Interface Card
(D) None (D) None
128) Mail from unwanted senders can be blocked by....... 133) ---- Is the Virus that overwrites the files or a few parts being replaced?
(A) e-mailing them & asking to be removed from the list (A) Virus
(B) using mail filters (B) File infectors
(C) clicking the unsubscribe link (C) worm
(D) None (D) None
129) ATM machines run ....... OS 134) A dynamic website that is normally database driven and which enables the
(A) Open Source owner/user to manage the content of their own website without needing to know
(B) Closed Source any coding at all is known as
(C) embedded (A) Content Management System (CMS)
(D) None (B) ASP
130) Which of the following is possible with open architecture? (C) DNS
(A) Hot swapping of devices (D) None
(B) A minimum of six new devices to be added to a computer 135) An Internet service that translates domain names to the IP addresses is called
(C) Users to upgrade and add new devices as they come on the market (A) CMS
(D) None (B) ASP
131) The fraudulent practice of sending emails purposing to be from reputable (C) DNS
companies in order to induce individuals to reveal personal information(Credit & (D) None
Debit card details) is called 136) A hacker installs malicious code on a personal computer or server. This code
(A) Hot swapping of devices (B) Pharming (C) Phishing (D) None then redirects clicks you make on a Web site to another fraudulent Web site without
your consent or knowledge. It is known as....
(A) Phishing
132) NIC stands for (B) Smishing
(A) Network Internal Card (C) Pharming
(B) Network Interconnection Channel (D) None

36 | P a g e prepared by Ghanashyam Dhungana


or networks is called
(A) Black Hat
137) The act of using the telephone in an attempt to scam the user into (B) White Hat
surrendering private information that will be used for identity theft. (C) Green Hat
(A) Pharming (D) None
(B) Smishing
(C) Vishing
(D) None 142) A type of malicious software that is activated each time your system boots up.
138) A type of phishing attack where mobile phone users receive text messages This malicious software difficult to detect because they are activated before your
containing a Web site hyperlink is called system's Operating System has completely booted up is called
(A) Pharming (A) Phishing
(B) Smishing (B) Rootkits
(C) Vishing (C) Pharming
(D) None (D) None
139) The creation of Internet Protocol (IP) packets with a forged source IP 143) Spam over instant messenger is called spim while spam over Internet
address, with the purpose of concealing the identity of the sender or impersonating telephony is known as
another computing system is called .............. (A) Malware
(A) Pharming (B) Spit
(B) Spoofing (C) Pharming
(C) Vishing (D) None
(D) None 144) The unauthorized activities of malicious software is called
140) A malware program that can be used by a black hat cracker to remotely take (A) Pharming
control of a system for further attacks like spam emails or Denial of Service attacks, (B) Payload
without a user’s knowledge is called...... (C) Phishing
(A) Zombie (B) Spoofing (C) Vishing (D) None (D) None
141) Ethical hackers who use their skill to secure the integrity of computer systems 145) Unauthorized access to restricted systems or resources is referred as

37 | P a g e prepared by Ghanashyam Dhungana


(A) Pharming (A)Logic bomb
(B) Penetration (B) Mail bombing
(C) Phishing (C) Time bomb
(D) None (D) None
146) Unauthorized access to information by using a terminal that is already logged 150) Malicious modification or destruction of data such as changing information on
on with an authorized ID is called Web sites is called
(A) Piggybacking (A) Super zapping
(B) Penetration (B) Vandalism
(C) Phishing (C) Spamming
(D) None (D) None
151) Overwhelming or saturating resources on a target system to cause a
reduction of availability to legitimate users is termed as
147) Modifying data in a Domain Name System (DNS) server so that calls to (A)Distributed DoS attack
particular Websites or even entire domains are misdirected for fraudulent purposes (B) Denial of Service (DoS) attack
is termed as (C) Data Diddling
(A) DNS cache poisoning (D) None
(B) Penetration
(C) Phishing 152) Modifying data for fun and profit is defined as
(D) None (A)Distributed DoS attack
148) Any deliberate damage to operations or equipments is called (B) Denial of Service (DoS) attack
(A) Piggybacking (C) Data Diddling
(B) Sabotage (D) None
(C) Phishing 153) Internet-mediated attack accomplished by enlisting the services of many
(D) None compromised systems to launch a denial of service (DoS) is termed as
149) Sending large numbers of unwanted e-mail messages to a single recipient or (A)Distributed DoS attack
to a group of such recipients is termed as (B) Denial of Service (DoS) attack

38 | P a g e prepared by Ghanashyam Dhungana


(C) Data Diddling (C) A network connection
(D) None (D) None
154) Creating a false identity using someone else’s identifying information 159) A method in which multiple communication devices are connected to one
(A)Distributed DoS attack another efficiently is known as......
(B) Identity Theft (A) Switching
(C) Data Diddling (B) Redundancy
(D) None (C) Capacity
155) A program or batch file that waits for a specific time before causing damage (D) None
is...... 160) What is considered as the 'backbone' of the World Wide Web?
(A)Logic bomb (B) Time bomb (C) Mail bombing (D) None (A) URL
156) A method for exploiting a vulnerability to take control of a system or (B) HTML
otherwise compromise it is termed as....... (C) HTTP
(A)Logic bomb (D)None
(B) Exploit 161) MIME stands for
(C) Mail bombing (A) Multipurpose Internet Mail Extension
(D) None (B) Multicasting Internet Mail Extension
157) The most widely used type of database management system is the (C) Multiple Internet Mail Extension
(A) Flat database. (D) None
(B) Network database. 162) FPI stands for____
(C) Relational database (A) Figure per inch
(D) Hierarchical database. (B) Frames per inch
(C) Faults per inch
(D) None
158) Which of the following will connect you to the Internet? 163) The process of analyzing large data sets in search of new, previously
(A)HTTP undiscovered relationships is known as:
(B) Internet service provider (A) data mining (B) data marting

39 | P a g e prepared by Ghanashyam Dhungana


(C) data maintenance (D) data warehousing (B) Peer to Peer networking (Group of computers that perform both Server & Client
function)
164) Collection of interrelated data and set of program to access them is called (C) Both (A) & (B)
(A) Database (B) Database Management System (D) None
(C) Data Structure (D) data warehousing 169) Which is used to connect a computer to the cabling used in LAN?
165) A repository of data that is designed to serve a particular community of (A) Network Interface Card (or) Network Adapter
knowledge workers is called (B) Router
(A) datamart (C) Modem
(B) data maintenance (D) None
(C) data warehousing 170) A device which converts data between the analog form used on telephone
(D) None lines & the digital form used on computers is.........
166) Keys that are used in combination with some other key, they have been (A) Network Interface Card (or) Network Adapter
programmed to perform certain tasks is called (B) Router
(A) Function keys (C) Modem (Modulator Demodulator)
(B) Alphanumeric keys (D) None
(C) Modifier keys( Alt, Ctrl) 171) A relay or interconnecting device that is used to join two or more LANs is
(D) None called
167) A key that is used to alternate the input mode of a group of keys on a (A) Network Interface Card (or) Network Adapter
keyboard is known as (B) Router
(A) Function keys (C) Bridge
(B) Alphanumeric keys (D) None
(C) Toggle Keys (Caps Lock, Nums Lock) 172) A device that regenerates the signal transmitted on a cable in a network is
(D) None called
168) Networking can be classified into two types. It includes (A) Repeater
(A) Server-based networking (A central Server) (B) Router
(C) Bridge

40 | P a g e prepared by Ghanashyam Dhungana


(D) None (D) None
173) A networking device that is used to receive signals from one Computer & 177) CSMA/CD stands for
transmit them on to other computers in a network is called........ (A) Carrier Sense Multiple Access with Correction Detection
(A) Repeater (B) Code Sense Multiple Access with Collision Detection
(B) Hub (C) Carrier Sense Multiple Access with Collision Detection
(C) Bridge (D) None
(D) None 178) A...... is required at each end to absorb the signal so that it does not reflect
174) Hub can be divided into two types. It includes...... back across the bus.
(A) Active Hub (Acts as a Repeater – regenerates & sends out a stronger signal) (A) gateway
(B) Passive Hub (Acts as a Junction box – Splits incoming signals for transmission) (B) terminator
(C) Both (A) & (B) (C) bridge
(D) None (D) None
179) Bus Topologies can be classified into two types. It includes
(A) Regular Bus
175) An intelligent Hub that has the ability to determine the destination of a packet (B) Local Bus
sent across the network is called......... (C) Both (A) & (B)
(A) Repeater (D) None
(B) Switch
(C) Bridge
(D) None 180) A list of rules for transferring data over a network is called?
176) A most Sophisticated relay device used in a network that can be used to (A) Protocol
interconnect systems with different protocols, formatting languages and (B) Program code
architecture is called......... (C) Rules
(A) Gateway (D) None
(B) Switch 181) Star topologies are normally implemented using a
(C) Bridge (A) Unshielded Twisted Pair (UTP) cable

41 | P a g e prepared by Ghanashyam Dhungana


(B) Twisted Pair cable determines route from source to destination & also control network traffic is known
(C) Fiber Optic Cable as..........
(D) None (A) Network Layer
182) A set of stations connected serially by cable is known as (B) Transport Layer
(A) Star topology (C) Session Layer
(B) Bus topology (D) None
(C) Ring topology 187) Layer which manages flow control & ensures reliable delivery of data packets
(D) None in sequence with no losses or duplications is known as.........
183) OSI stands for (A) Presentation Layer
(A) Open Systems Interconnection (B) Transport Layer
(B) Open Source Interconnection (C) Session Layer
(C) Open Service Interconnection (D) None
(D) None 188) Layer which establishes, maintains & terminates a connection while
184) Layer which deals with the transportation of binary data and defines cable & communicating with other client is known as.........
electrical specifications is known as.......... (A) Presentation Layer
(A) Data Link Layer (B) Transport Layer
(B) Physical Layer (C) Session Layer
(C) Session Layer (D) None
(D) None 189) Layer which translates data format & deals with compression of data and
185) Layer which converts data frames into bits and also convert bits into frames is network security is known as.........
known as.......... (A) Presentation Layer
(A) Data Link Layer (B) Application Layer
(B) Transport Layer (C) Session Layer
(C) Session Layer (D) None
(D) None 190) Layer which is the user interface to access the network services such as file
186) Layer which deals with translation of logical & physical addresses & transfer/ database access is known as.........

42 | P a g e prepared by Ghanashyam Dhungana


(A) Presentation Layer (A) Upper Divisional Protocol
(B) Application Layer (B) User Datagram Protocol
(C) Session Layer (C) Under Divisional Protocol
(D) None (D) None
191) A long message that needs to be transmitted is broken into smaller packets of 196) An Interface refers to a specification by which programs can communicate with
fixed size for error free transmission is termed as........ a web server is called
(A) Data Sequencing (A) Graphical User Interface (GUI) (B) Musical Instrument Digital
(B) Flow Control Interface (MIDI)
(C) Error control (C) Common Gateway Interface (CGI) (D) None
(D) None
192) ICMP stands for 197) VoIP stands for
(A) Internet Control Message Protocol (A) Video Over Internet Protocol
(B) Internet Connection Management Protocol (B) Voice Over Internet Protocol
(C) Internet Control Management Protocol (C) Voice On Internet Protocol
(D) None (D) None
193) IDRP stands for 198) The two application protocols most commonly associated with
(A) ICMP Repeater- Discovery Protocol (A) Network File System (NFS)
(B) ICMP Router- Discovery Protocol (B) Common Internet File System (CIFS)
(C) IDRP Router- Discovery Protocol (C) Both (A) & (B)
(D) None (D) None
194)RSS Stands for 199) An attacker outside your network pretends to be a part of your network or
(A) Rich Site Summary legal terminal is called...
(B) Really Simple Syndication (A) Password Attacks
(C) (A) or (B) (B) IP Spoofing
(D) None (C) Identity Theft
195) What is the full form of UDP? (D) None

43 | P a g e prepared by Ghanashyam Dhungana


200) A reliability & flow control technique where the source sends one packet, (C) (A) or (B)
starts a timer and waits for an acknowledgement before sending a new packet is (D) None.
called 204) which of the following is a function of Operating System (OS)?
(A) Positive Acknowledgement Retransmission (PAR) (A) Process & Memory Management
(B) Checksum (B) File Management
(C) Routing (C) Input/Output Management
(D) None (D) All of the above
201) Booting can be divided into two types. They are 205) which of the following is an example of Single User Operating System?
(A) Cold Booting (A) MS-DOS
(B) Warm Booting (B) Windows 9X
(C) (A) & (B) (C) (A) & (B)
(D) None (D) None
206) Which of the following is an example of Multi User Operating System?
(A) UNIX
(B) LINUX
202) What is booting? (C) Windows 2000/2007
(A) When a computer is switched on & the OS gets loaded from hard disk to main (D) (A) & (B) &(C)
memory 207) What is Multi – Tasking Operating System?
(B) When a computer is switched on & the OS gets loaded from CPU to main memory (A) More than one processes can be executed concurrently
(C) (A) or (B) (B) Processing is done with a time constraint
(D) None (C) A type of OS which do not interact with a computer directly.
203) What is Warm booting? (D) An OS which use multiple central processors to serve multiple real time
(A) When a computer is turned on after it has been completely shut down. applications.
(B) When a computer is restarted by pressing the restart button or pressing (ctrl + Alt 208) What is Real Time Operating System (RTOS)?
+ Del) (A) More than one processes can be executed concurrently.
key. (B) Processing is done with a time constraint

44 | P a g e prepared by Ghanashyam Dhungana


(C) A type of OS which do not interact with a computer directly. 216) User Interface can be divided into two types. They are
(D) An OS which use multiple central processors to serve multiple real time (A) Graphical User Interface (B) Character User Interface (C) (A) & (B) (D)
applications. None
209) What is Batch Processing Operating System (RTOS)? 217) CLI stands for
(A) More than one processes can be executed concurrently. (A) Character Line Interface (B) Command Line Interface
(B) Processing is done with a time constraint (C) Character Level Interface (D) None
(C) A type of OS which do not interact with a computer directly. 218) In DOS, the DIR command is used
(D) An OS which use multiple central processors to serve multiple real time (A) to display contents of a file (B) to delete files
applications. (C) to display of files & subdirectories (D) None
210) What is Distributed Operating System (RTOS)? 219) which one of the following is an MS-DOS external command?
(A) More than one processes can be executed concurrently. (A) COPY (B) FORMAT (C) DIR (D) None
(B) Processing is done with a time constraint 220) Grouping & processing all of a firm’s transactions at one time is called,
(C) A type of OS which do not interact with a computer directly. (A) batch processing (B) a real time system (C) a database management system
(D) An OS which uses multiple central processors to serve multiple real time (D) None
applications. 221) .......... is a feature for scheduling & multi-programming to provide an
211) Core of the OS which supports the process by dividing a path to peripheral economical interactive system of two or more users.
devices? (A) time tracing (B) time sharing (C) multi-tasking (D)
(A) Kernel (B) Shell (C) Fork (D) None None
212) The program which interprets commands given by the user? 222) In Windows ME, what does ME stands for?
(A) Kernel (B) Shell (C) Fork (D) None (A) Micro-Expert (B) Millennium-Editio (C) Multi-Expert (D) None
213) A system call of OS which is used to create a new process is known as? 223) There are a total of..........actions button in PowerPoint.
(A) Kernel (B) Shell (C) Fork (D) None (A) 12 (B) 15 (C) 18 (D) None
214) A process which is not executing due to any waiting event is called? 224) Attributes can be defined for
(A) Kernel (B) Shell (C) Deadlock (D) None (A) pages (B) entity (C) macro (D) None
215) Which provides an interface between process & OS? 225) What is the default size of the data type in MS Access?
(A) Kernel (B) System Calls (C) Deadlock (D) None (A) 50 (B) 60 (C) 70 (D) None

45 | P a g e prepared by Ghanashyam Dhungana


226)....... means that the data contained in a database is accurate & reliable 235) The particular field of a record that uniquely identifies each record is called the
(A) Data redundancy (B) Data integrity (C) Data consistency (D) None (A) primary field (B) key field (C) master field (D) None.
227) The smallest unit of information about a record is called a...... 236)........ are distinct items that don’t have much meaning to you in a given answer
(A) cell (B) field (C) record (D) None. (A) Fields (B) Data (C) Queries (D) None.
228) Which combines efficient implementation techniques that enable them to be 237) A collection of related files is called...........
used in extremely large database? (A) field (B) record (C) database (D) None.
(A) Data Mining (B) Data Manipulation (C) Data reliability (D) 238) A logical schema
None. (A) is the entire database (B) is a standard way of organizing information into
229) A program that generally has more user-friendly interface than a DBMS is accessible part (C) (A) & (B) (D) None.
called a 239) In the relational modes, cardinality is termed as
(A) back end (B) front end (C) form (D) None. (A) number of tuples (B) number of tables (C) (A) & (B) (D) None.
230) A collection of conceptual tools for describing data, relationships, semantics & 240) To locate a data item for storage is
constraints is referred as.... (A) field (B) fetch (C) feed (D) None.
(A) data model (B) ER model (C) DBMS (D) None. 241) An E-R diagram is a graphic method of presenting
231) Which of the following contains information about a single ‘entity’ in the (A) entity classes & their relationships (B) primary keys & their relationships
database like a person, place, event or thing? (C) primary keys & their relationships to instances (D) None.
(A) query (B) form (C) record (D) None. 242) An entity set that does not have sufficient attributes to form a primary key, is
232)Dr.EF Codd represented....... rules that a database must obey if it has to be a.....
considered truly relational. (A) primary entity set (B) weak entity set (C) simple entity set (D) None.
(A) 4 (B) 8 (C) 12 (D) None.
233)........ is one reason for problems of data integrity
(A) Data availability constraints (B) Data redundancy (C) Data reliability 243) A computer checks ........ of username & password for a match before granting
(D) None. access.
234) ......... provides total solutions to reduce data redundancy, inconsistency, (A) website (B) network (C) database (D) None.
dependence & unauthorized access of data. 244) ..... is a primary key of one file that also appears in another file?
(A) Table (B) Protection password (C) Data reliability (D) None.

46 | P a g e prepared by Ghanashyam Dhungana


(A) Physical key (B) Foreign key (C) Logical key (D) 255) Ethernet, token ring and token bus are types of
None. (A) LAN (B) WAN (C) MAN (D)
245) ....... is an invalid type of database key? None
(A) Structured Primary key (B) Atomic Primary key (C) Logical key (D) None. 256) Which of the following items is not used in LANs?
246) Key to represent relationship between tables is called (A) Interface card (B) cable (C) computer (D) Modem
(A) Physical key (B) Foreign key (C) Logical key (D) 257) Which is the name of the network topology in which there are bidirectional
None. links between each possible nodes?
247) In ER diagram; relationship type is represented by (A) Mesh (B) Ring (C) Bus (D) None
(A) rectangle (B) diamond (C) ellipse (D) None. 258) An alternate name for the completely interconnected network topology is
248) In a relational database, a data structure that organizes the information about (A) Mesh (B) Ring (C) Bus (D) None
a single topic into rows & columns, is.... 259) Telnet is.........based computer protocol
(A) block (B) record (C) tuple (D) table (A) sound (B) image (C) text (D) None
249) Hub is associated with........ network 260) Through.........an administrator or another user can access someone else’s
(A) bus (B) ring (C) star (D) mesh computer remotely.
250) Multiplexing involves.......path and........ channel (A) Web server (B) Web application (C) telnet (D)
(A) single path & multiple channel (B) Single path & single channel None
(C) multiple path & multiple channel (D) mesh 261) How many ways you can save a document?
251) P2P is a...... application architecture (A) 5 (B) 4 (C) 3 (D) None
(A) distributed (B) client/server (C) 1-tier (D) 262) The maximum zoom % in MS Power Point is.......
None (A) 400 (B) 100 (C) 200 (D) None
252) In OSI architecture, the routing is performed by 263) In Excel, charts are created using which option?
(A) network layer (B) data link layer (C) transport layer (D) None (A) Pie Chart (B) Chart Wizard (C) Bar Chart (D) None
253) Which of the following is considered a broad band communication channel? 264) In order to include picture data type must be?
(A) Coaxial Cable (B) Fiber Optics Cable (C) Microwave Circuits (D) All of these (A) OLE (B) hyperlink (C) (A) or (B) (D) None
254) How many bits are there in the Ethernet address? 265) A........ is the term used when a search engine returns a web page that
(A) 48 bits (B) 64 bits (C) 16 bits (D) None matches search criteria

47 | P a g e prepared by Ghanashyam Dhungana


(A) blog (B) hit (C) link (D) None 275) Which one of the following is a cryptographic protocol used to secure http
266) Which is required to create an html document? concession?
(A) Internet (B) text editor (C) Browser (D) None (A) Transport Layer Security (B) Explicit Congestion Notification
267) Which of the following will be used if a sender of e-mail wants to bold, italics
etc, the text message? (C) Resource Reservation Notification (RRN) (D) None
(A) Rich text (B) Rich signature (C) Reach format (D) None 276) Which of the following inputs a computer’s memory, but unlike a virus, it does
268) Which stores information about the user’s web activity? not replicate itself?
(A) Spam (B) Cookie (C) Cache (D) None (A) Trojan Horse (B) Logic bomb (C) Firewall (D) None
269) Each IP packet must contain 277) Which one of the following is a key function of firewall?
(A) Source address (B) destination address (C) (A) & (B) (D) None (A) Monitoring (B) deleting (C) moving (D) None
278) The load instruction is mostly used to designate a transfer from memory to a
270) Vendor-created program modifications are called——— processor register known as
(A) patches (B) antiviruses (C) holes (D) None (A) Program counter (B) instruction register (C) accumulator (D) None
271) If your computer rebooting itself then it is likely that 279) The most frequently used instructions of a computer program are likely to be
(A) It has a virus (B) It does not have enough memory fetched from
(C) There has been a power surge (D) None (A) cache (B) cookie (C) main memory (D) None
272) The ........ of a Threat measures its potential impact on a System 280) Arithmetic Logic Unit(ALU) and control sections have special purpose locations
(A) vulnerabilities (B) degree of harm (C) susceptibility (D) None called
273) A digital signature is (A) secondary memory (B) registers (C) accumulator (D) None
(A) scanned signature (B) encrypting information (C) signature in binary form 281) speed of line printer is limited by the speed of
(D) None (A) cartridge used (B) paper movements (C) length of paper (D) None
274) A firewall operated by 282) What are the units used to count the speed of a printer?
(A) the pre-purchase phase (B) isolating intranet from extranet (A) DPI (B) CPM (C) PPM (D) None
(C) screening packets to/from the network & provide controllable filtering of network 283) A parallel port is most often used by a
traffic. (A) monitor (B) printer (C) mouse (D) None
(D) None 284) External devices such as printers, keyboards & modems are known as.......

48 | P a g e prepared by Ghanashyam Dhungana


(A) add on devices (B) extra hardware devices (C) peripherals (D) None 294) Information stored in RAM need to be
285) You can use the ‘Tab’ key...... (A) check (B) modify (C) refresh periodically (D) None
(A) indent a paragraph (B) move a cursor across the screen (C) Both (A) & 295) The storage device used to compensate for the difference in rates of flow of
(B) (D) None data from one device to another is termed as.....
286) In laser printers, printing is achieved by defecting laser beam on to........ (A) floppy (B) chip (C) buffer (D) None
surface of a drum. 296) Floppy disks are organized as
(A) magnetic (B) magnetized (C) photo sensitive (D) None (A) file (B) tracks & sector (C) header & footer (D) None
287) The rate at which scanning is repeated in a CRT is called..... 297) ....... is the ability of ‘jump’ directly to the requested data
(A) refresh rate (B) resolution (C) pitch (D) None (A) sequential access (B) random access
288) Which is the best position for operating the mouse? (C) quick access (D) None
(A) Tail towards the user (B) Tail facing the right (C) Tail facing the left (D) 298) The ..... is the amount of data that a storage device can move from the storage
None to the computer per second
289) First computer mouse was built by (A) data transfer rate (B) data access rate (C) data migration rate (D) None
(A) Robert Zawacki (B) William English (C) Douglas Engelbart (D) 299) Virtual memory is…….
None (A) an extremely large main memory (B) an illusion of extremely large main memory
290) ........... printer cannot print more than one character at a time (C) a type of memory (D) None
(A) Line (B) Laser (C) Dot Matrix (D) None 300) ......... acts as a temporary high speed holding area between the memory and
291) The technique that extends storage capacities of main memory beyond the the CPU thereby improving processing capabilities
actual size of the main memory is called (A) Cache (B) RAM (C) ROM (D) None
(A) switching (B) virtual storage (C) multitasking (D) None
292) Which of the following memory chip is faster?
(A) DRAM (B) RAM (C) SRAM (D) None
293) The term .........refers to data storage systems that make it possible for a
computer or electronic device to store and retrieve data
(A) storage technology (B) input technology (C) output technology (D)
None

49 | P a g e prepared by Ghanashyam Dhungana


Question 52 B 106 D 160 C 214 C 268 B
Number 53 C 107 A 161 A 215 B 269 C
Answers 54 A 108 B 162 B 216 C 270 A
1D 55 C 109 A 163 A 217 B 271 A
2B 56 B 110 A 164 A 218 C 272 B
3A 57 B 111 B 165 A 219 B 273 B
4D 58 C 112 B 166 C 220 A 274 C
5D 59 C 113 B 167 C 221 B 275 A
6B 60 B 114 B 168 A 222 B 276 B
7D 61 B 115 C 169 A 223 A 277 A
8C 62 A 116 B 170 C 224 B 278 C
9D 63 D 117 B 171 C 225 A 279 A
10 A 64 B 118 A 172 A 226 B 280 B
11 A 65 D 119 B 173 B 227 B 281 A
12 A 66 C 120 A 174 C 228 A 282 A
13 A 67 D 121 A 175 B 229 C 283 B
14 B 68 B 122 B 176 A 230 A 284 C
15 D 69 C 123 B 177 C 231 C 285 A
16 A 70 A 124 B 178 B 232 C 286 C
17 A 71 C 125 B 179 C 233 A 287 A
18 D 72 C 126 B 180 A 234 B 288 A
19 C 73 A 127 C 181 A 235 B 289 C
20 D 74 C 128 B 182 C 236 A 290 C
21 C 75 A 129 C 183 A 237 B 291 B
22 C 76 A 130 C 184 B 238 A 292 C
23 D 77 C 131 C 185 A 239 A 293 A
24 C 78 B 132 C 186 A 240 B 294 C
25 A 79 A 133 B 187 B 241 A 295 C
26 C 80 C 134 A 188 C 242 B 296 B
27 C 81 B 135 C 189 A 243 C 297 B
28 D 82 A 136 C 190 B 244 B 298 A
29 A 83 C 137 C 191 A 245 A 299 B
30 B 84 B 138 B 192 A 246 B 300 A
31 D 85 B 139 B 193 B 247 A
32 D 86 B 140 A 194 C 248 D
33 C 87 C 141 B 195 B 249 C
34 C 88 C 142 B 196 C 250 A
35 C 89 A 143 B 197 B 251 B
36 A 90 D 144 B 198 C 252 A
37 D 91 A 145 B 199 C 253 D
38 C 92 A 146 A 200 A 254 A
39 A 93 A 147 A 201 C 255 A
40 B 94 A 148 B 202 A 256 D
41 C 95 A 149 B 203 B 257 A
42 A 96 B 150 B 204 D 258 A
43 A 97 B 151 B 205 C 259 C
44 B 98 B 152 C 206 D 260 C
45 B 99 A 153 A 207 A 261 C
46 B 100 C 154 B 208 B 262 A
47 A 101 C 155 B 209 C 263 B
48 D 102 A 156 B 210 D 264 A
49 B 103 A 157 C 211 A 265 B
50 A 104 A 158 B 212 B 266 B
51 D 105 C 159 A 213 C 267 A

50 | P a g e prepared by Ghanashyam Dhungana

You might also like