QPDEC2010 Sem 1
QPDEC2010 Sem 1
a program which translates from one high-level language to another c. a program which translates from one high-level to a machine level d. None of these Ans : c 2. When a key is pressed on the keyboard, which standard is used for converting the keystroke into the corresponding bits a. ANSI b. ASCII c. EBCDIC d. ISO Ans : a 3. A Pixel is a. A computer program that draws picture b. A picture stored in secondary memory c. The smallest resolvable part of a picture d. None of these Ans : c 4. Which device is used as the standard pointing device in a Graphical User Environment a. Keyboard b. Mouse c. Joystick d. Track ball Ans : b 5. Which number system is usually followed in a typical 32bit computer? a. 2 b. 10 c. 16 d. 32 Ans : a 6. Which of the following is not an output device? a. Scanner b. Printer c. Flat Screen d. Plotter
Ans : a 7. a. b. c. d. Which of the following devices have a limitation that we can only information to it but cannot erase or modify it Floppy Disk Hard Disk Tape Drive CDROM Ans : d 8. Which technology is used in Compact disks? a. Mechanical b. Electrical c. Electro Magnetic d. Laser Ans : d 9. Which of the following storage devices can store maximum amount of data? a. Floppy Disk b. Hard Disk c. Compact Disk d. Magneto Optic Disk Ans : b 10. Which of the following is the largest manufacturer of Hard Disk Drives? a. IBM b. Seagate c. Microsoft d. 3M Ans : b 11. a. b. c. d. Ans : a 12. The programs which are as permanent as hardware and stored in ROM is known as a. Hardware b. Software c. Firmware d. ROMware Ans : c 13. Memory is made up of a. Set of wires The memory location address are limited to 00000 to 9ffff(16) 00001 to 9ffff(16) 00010 to 9ffff(16) 10000 to 9ffff(16)
b. Set of circuits c. Large number of cells d. All of these Ans : c 14. a. b. c. d. Ans : d 15. EPROM can be used for a. Erasing the contents of ROM b. Reconstructing the contents of ROM c. Erasing and reconstructing the contents of ROM d. Duplicating ROM Ans : c 16. data a. b. c. d. Ans : d 17. a. b. c. d. Ans : a 18. a. b. c. d. Ans : d 19. a. b. c. d. Ans : d 20. Which of the following is not a valid size of a Floppy Disk? Algorithm and Flow chart help us to Know the memory capacity Identify the base of a number system Direct the output to a printer Specify the problem completely and clearly Memory unit is one part of Input device Control unit Output device Central Processing Unit Which device can understand difference between & programs? Input device Output device Memory Microprocessor The contents of information are stored in Memory data register Memory address register Memory access register Memory arithmetic register Primary memory stores Data alone Programs alone Results alone All of these
a. b. c. d. Ans : d 21. are a. b. c. d. Ans : d 22. a. b. c. d. Ans : a 23. was a. b. c. d. Ans: c 24. a. b. c. d. Ans : d
8" 5 1/4" 3 1/2" 5 1/2" The basic operations performed by a computers Arithmetic operation Logical operation Storage and relative All the above The earliest calculating devices are Abacus Clock Difference Engine None of these The man who built the first Mechanical Calculator Joseph Marie Jacquard John Mauchly Blaise Pascal Harward Ailken Punched cards were first introduced by Powers Pascal Jacquard Herman Hollerith
25. Computers built before the First Generation of computers were a. Mechanical b. Electro-mechanical c. Electrical d. None of these Ans : b 26. a. b. c. d. Word length of a Personal Computer is ___ 4 bits 8 bits 16 bits 64 bits
Ans : a 27. Size of the primary memory of a PC ranges between a. 2KB to 8KB b. 64KB & 256KB c. 256KB & 640KB d. None of these Ans : c 28. a. b. c. d. Ans : b 29. Programs are executed on the basis of a priority number in a a. Batch processing system b. Multiprogramming c. Time sharing d. None of these Ans : b 30. a. b. c. d. Cursor is a ____ Pixel Thin blinking line Pointing device None of these CPU speed of a personal computer is 32 KIPS 100 KIPS 1 MIPS None of these
Ans : b 31. In a high resolution mode, the number of dots in a line will usually be a. 320 b. 640 c. 760 d. 900 Ans : b 32. a. b. c. d. Ans : a 33. IC are classified on the basis of ___ a. Manufacturing company The unit KIPS is used to measure the speed of ___ Processor Disk drive Printer Tape drive
b. Type of computer c. Number of transistors d. None of these Ans : c 34. a. b. c. d. Ans : d 35. a. b. c. d. Ans : d 36. Assembly language a. uses alphabetic codes in place of binary numbers used in machine language b. is the easiest language to write programs c. need not be translated into machine language d. None of these A source program is a program written in a machine language a program to be translated into machine language a machine language translation of a program written in a None of these Machine language ___ is the language in which programs were first written is the only language understood by the computer differs from one type of computer to another All of these Computer software includes ____ Application programs Operating system programs Packaged programs All of these
Ans : a 37. a. b. c. d.
Ans : b 38. If a computer on the network shares resources for others to use, it is called ____ a. Server b. Client c. Mainframe Answer : a 39. Terminators are used in ______ topology. a. Bus b. Star Answer : a 40. In _____ topology, if a computers network cable is broken, whole network goes down. a. Bus b. Star
Answer : a 41. For large networks, _______ topology is used. a. Bus b. Star c. Ring Answer : b 42. ISO stands for a. International Standard Organization b. International Student Organization c. Integrated Services Organization Answer : a 43. ISO OSI model is used in a. Stand alone PC b. Network environment Answer : b 44. Network cable lies on _____ layer a. Application b. Network c. Physical Answer : c 45. ____ layer decides which physical pathway the data should take. a. Application b. Network c. Physical Answer : c 46. ISDN is an example of ______ network a. Circuit switched b. Packet switched Answer : a 47. X.25 is an example of ______ network a. Circuit switched b. Packet switched Answer : b 48. _____________ allows LAN users to share computer programs and data. a. Communication server b. Print server c. File server Answer : c
49. Print server uses ________ which is a buffer that holds data before it is send to the printer. a. Queue b. Spool c. Node Answer : b 50. A standalone program that has been modified to work on a LAN by including concurrency controls such as file and record locking is an example of____ a. LAN intrinsic software b. LAN aware software c. Groupware d. LAN ignorant software Answer : a 51. The ______ portion of LAN management software restricts access, records user activities and audit data etc. a. Configuration management b. Security management c. Performance management Answer : b 52. What is the max cable length of STP? a. 100 ft b. 200 ft c. 100 m d. 200 m Answer : d 53. What is the max data capacity of STP? a. 10 mbps b. 100 mbps c. 1000 mbps d. 10000 mbps Answer : b 54. Which connector STP uses? a. BNC b. RJ-11 c. RJ-45 d. RJ-69 Answer : c 55. What is the central device in star topology? a. STP server b. Hub/switch c. PDC
d. Router Answer : b 56. What is max data capacity for optical fiber cable? a. 10 mbps b. 100 mbps c. 1000 mbps d. 10000 mbps Answer : c 57. Which of the following architecture uses CSMA/CD access method? a. ARCnet b. Ethernet Answer : b 58. Physical security measures to protect computer facilities and resources, such as computers, data centers, software, and networks, are all of the following except: a) Requiring strong passwords. b) Shielding against electromagnetic fields. c) Fire prevention, detection, and extinguishing systems. d) Motion detector alarms that detect physical intrusion. Ans: a 59. Company executives are worried about proprietary information "walking out the door" on employees' iPods, PDAs, or USB drives. Which of the following would be the most effective and viable solution to protect against this type of data loss/theft? a) Ban the use of those devices altogether. b) Do random spot checks of those devices. c) Run software on machines that tracks and manages what is being passed across to any USB drive. d) Notify all employees via email of the risk of data loss due to those devices. Ans: c 60. __________ is a broad term that refers to the buying and selling of goods and services; servicing of customers; collaborating with business partners; and conducting electronic transactions within an organization. a) Pure e-commerce b) E-business c) Online logistics d) iCommerce Ans : b
61. The vast majority of e-commerce volume is of which type? a) B2B b) e-retailing c) B2C d) social commerce Ans: a 62. A company visits the Internal Revenue Service's Web site to learn how to pay its estimated quarterly income taxes. This is an example of: a) G2G b) G2B c) G2C d) E2E Ans: b 63. What is a satellite-based tracking system that is used to determine the location of a person or physical item? a) GPS b) SMS c) WAP d) WiMax Ans: a 64. What is the wireless broadband technology based on the IEEE 802.16-2004 standard, designed to provide Internet access across metro areas to fixed users? a) WAP b) Wi-Fi c) WiMax d) WLAN Ans: c 65. What is the technology that enables Internet browsing from wireless devices? a) WAP b) EMS c) WiMax d) WLAN Ans: a 66. In their effort to streamline Human Resources processes and to better manage employees, companies are developing web applications referred to as _____________.
a) asset capital management b) economic risk management c) employee relationship management d) labor relations information systems Ans: c 67. Which of the following statements most comprehensively defines the supply chain? a) Supply chains involve the flow of materials from raw materials suppliers and factories to warehouses b) Supply chains involve the flow of materials, information, money, and services from raw materials suppliers, through factories and warehouses, to the end-consumers. c) Supply chains involve the flow of materials and equipment from raw materials suppliers to factories. d) Supply chains involve the flow of materials and services from raw materials suppliers, through factories and warehouses, to the end-consumers. Ans: b 68. Supply chain management (SCM) systems add value to ERP systems by providing __________ capabilities. a) customer and product support b) analysis and decision support c) forecasting d) project management Ans: b 69. The following are components of CRM except: a) channel management b) sales and marketing c) partner management d) production Ans: d 70. The following are characteristics of ERP software except: a) designed to improve standard business transactions from all of the functional departments. b) utilizes IT tools and quality control methods to track and improve process efficiency and effectiveness. c) provides an integrated framework of all routine activities in the enterprise. d) provides easy interfaces to legacy systems as well as to partners systems. Ans: b 71. Which company makes the leading ERP software?
a) Computer Associates b) Oracle c) PeopleSoft d) SAP Ans: d 72. What best describes customer relationship management (CRM)? a) CRM is an enterprisewide effort to acquire and retain all customers. b) CRM focuses on building long-term and sustainable customer relationships that add value for both the customer and the company. c) CRM is basically a simple idea: Treat all customers the same. d) CRM means being oriented to the needs of the typical customer in the marketthe average customer. Ans: b 73. ____________ are interactive computerized systems that help employees find and connect with colleagues with the expertise required for specific problems--whether they are across the country or across the room---in order to solve specific business problems in seconds. a) Bluetooth b) Expert locating systems c) Global positioning systems d) Knowledge management systems Ans: b 74. What is the electronic movement of business documents between business partners? a) EDI b) EFT c) VAN d) XML Ans: a 75. One of the newest and possibly most revolutionary solutions to supply chain problems is: a) EDI b) EPC c) RFID d) RPC Ans: c
76. Discovering knowledge contained stored in databases is achieved with: a) data mining b) visualization c) automated decision support d) enterprise search Ans: a
in
the
data
77. IT can add value to a company directly by: a) Reducing the workforce while not reducing the production level. b) Widening the geographic market. c) Providing a competitive advantage through improved customer service. d) Reducing competition based on price. Ans: a
Match the following : COLUMN A I II III IV V Gateway-5 NIC-4 Router-1 IEEE 802.x-3 TCP/UDP-2 1 2 3 4 5
COLUMN B Network layer Transport Layer Data Link Layer Physical Layer Works at all layers of OSI
State True or False 1. The network interface card converts serial data from the computer into parallel data for transmission over the network cable.-False 2. All four types of information servicesdata, documents, voice, and videotransmit over networks using the TCP protocol.False 3. To prepare data and documents for transmission over a network, they are converted into digital packets based on the Internet protocol.-True 4. GSM is an internationally-accepted standard for digital cellular communication and the most popular standard for mobile phones in the world.-True 5. With VoIP, voice and data transmissions are sent over telephone wires as packets, which is more expensive than
equivalent service from traditional telecommunications companies.-False 6. Wi-Fi networks usually consist of a router, which transmits the signal, and one or more adapters, which receive the signal and are usually attached to computers.-True 7. WiMax enables wireless broadband access as an alternative to cable and DSL.-True 8. Trojans horses are referred to as backdoors because they give an attacker illegal access to a network or account through a network port.-True 9. The final participants in B2B transactions are consumers.-False 10. Major limitations of mobile computing are small screens on mobile devices, limited bandwidth, high cost, unproven security, and possible health hazards.-True 11. Bluetooth is a wireless standard designed for temporary, short-range data and voice connections among mobile devices. True 12. Insufficient telecommunications bandwidth is no longer a limitation of e-commerce.-False 13. The Internet introduced the concept of interactive marketing, which has enabled marketers and advertisers to interact directly with customers.- True 14. When the flow of work and information between departments does not work well, it results in delays, poor customer service, or higher costs.-True 15. Web-based human resource systems are extremely useful for recruiting and training.-True 16. Knowledge management (KM) is computer-based decision analysis usually done online by managers and staff. It includes forecasting, analyzing alternatives, and evaluating risk and performance.-False 17. An economic impact of EC is the trade-off between the number of customers a company can reach and the amount of interactions and information services it can provide to them, which is referred to as richness.-True Fill in the blanks 1. A type of network that is used to distribute frequently needed employee handbooks, government forms, policies, and other materials to employees over the companys internal network is referred to as a(n) ______________ Ans: Intranet 2. A _________ is a type of local area network (LAN) that uses highfrequency radio waves rather than wires to communicate between computers or devices such as printers, which are referred to as nodes on the network.
Ans: WLAN (wireless local area network) 3. __________ is the term often used to describe someone who gains unauthorized access to a computer system. Ans: Hacker 4. Viruses, worms, and Trojan horses are types of malicious code, which is also called _________. Ans: malware 5. A(n) _________ scans for unusual or suspicious traffic, which is used to identify the start of a DoS attack by the traffic pattern, alerting the network administrator to take defensive action, such as switching to another IP addresses and diverting critical servers from the path of the attack. Ans: intrusion detection system 6. _________ controls are automated methods of verifying the identity of a person, based on a physiological or behavioral characteristic, such as a fingerprint or keystroke dynamics. Ans: Biometric 7. A(n) ___________ is a technology that checks Internet packets sent to and from a network and enforces access-control policies between networks. Ans: firewall 8. One way for a business to implement ERP is to lease ERP systems from a(n) ____________. Ans: application service provider (ASP) 9. Historically, MIS has focused on capturing, storing, managing, and reporting _________ knowledge, which deals with objective, rational, and technical knowledge. Ans: Explicit 10. The most popular software tool adopted as an easy-touse and powerful DSS tool for data manipulation is Microsoft ________________. Ans: Excel 11. _________ is the practice of indiscriminately broadcasting unsolicited messages via e-mail and over the Internet; and one of the most widespread forms of digital noise. Ans: Spamming
12. The power of Intel chips is measured in MIPS, which stands for _________ . Ans: millions of instructions per second