A. keyboard.
B. mouse.
C. joystick.
D. track ball.
In computing, a mouse is a pointing device that functions by detecting two-dimensional motion relative to its supporting surface. The mouse's motion typically translates into the motion of a pointer on a display, which allows for fine control of a Graphical User Interface.
A. a computer program that draws picture.
B. a picture stored in secondary memory.
C. the smallest resolvable part of a picture.
D. a picture stored in primary memory.
A pixel is the smallest discrete component of an image or picture on a CRT screen (usually a colored dot).
A. a combination of computer hardware.
B. a program which translates from one high-level to another high level.
C. a program which translates from one high-level to a machine level.
D. a program which translates from one machine level to another machine level.
A compiler is a computer program (or set of programs) that transforms source code written in a computer language (the source language) into another computer language (the target language, often having a binary form known as object code).
A. muti-processing OS.
B. real time OS.
C. multi-tasking OS.
D. multithreading OS.
A Real-Time Operating System (RTOS) is a multitasking operating system intended for real-time applications. Such applications include embedded systems, industrial robots, spacecraft, industrial control and scientific research equipment.
A. muti-processing OS.
B. multi-user OS.
C. multi-tasking OS.
D. real time OS.
An operating system that is capable of allowing multiple software processes to run at the same time is known as multitasking system. For example: Unix, Windows 2000.
A. muti-processing OS.
B. multi-user OS.
C. multi-tasking OS.
D. real time OS.
An operating system capable of supporting and utilizing more than one computer processor is known as multi-processing operating system. For example: Linux, Unix, Windows 2000.
A. multiprocessing.
B. multi-user.
C. multi-tasking.
D. real time.
Multi-user is a term that defines an operating system or application software that allows concurrent access by multiple users of a computer.
A. ANSI.
B. ASCII.
C. EBCDIC.
D. ISO.
It is an organization that identifies industrial and public requirements for national census standards and coordinates and manages their development, resolves national standards problems and ensures effective participation in international standardization.
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Computer forensics is a branch of forensic science pertaining to legal evidence found in computers and digital storage mediums. Computer forensics is also known as digital forensics.
A. data.
B. output.
C. input.
D. the process.
Output from computer processing, the work that has been completed, may take the form of a printed document, magnetic tape, or magnetic disk or diskette.
A. an intelligent system that controls the route of a missile.
B. multimedia.
C. simulation.
D. engineering.
Applications examples of 5th generation computers are : Defence-systems that could fend off attacks; Word processors that could be controlled by means of speech recognition; Programs that could translate documents from one language to another.
A. Embedded computer.
B. Workstations.
C. Mainframe computer.
D. Super computer.
Mainframe computers are designed to handle huge volumes of data, they support more than hundred users at same time. IBM 3090 is an example of mainframe computers.
A. transistor.
B. vacuum tube.
C. integrated circuit.
D. micro chip.
The third generation computers replaced transistors with 'Integrated Circuits'. These IC's were reliable, faster and relatively inexpensive.
A. creates files on the server.
B. is used to download files from the Net.
C. breaks a message into packets.
D. addresses the packets.
File Transfer Protocol (FTP) is a network protocol used to exchange and manipulate files over a TCP computer network, such as the Internet.
A. connects sending and receiving computer.
B. obstructs downloading of files from the net.
C. discards duplicate packets.
D. creates datagrams.
Data from an upper layer protocol is encapsulated as packets/datagrams. The internet protocol is the principal communications protocol used for relaying datagrams(packets) across an internetwork.
A. to create datagrams.
B. to obstruct downloading of files from the Net.
C. to provide delivery of a stream of bytes from one program on one computer to another program on another computer.
D. to address the packets.
It is one of the core protocols of Internet Protocol Suite. TCP (Transmission Control Protocol) is a set of rules (protocol) used along with the Internet Protocol (IP) to send data in the form of message units between computers over the Internet.
A. set of rules of communication.
B. arrangement of nodes.
C. a type of transmission media.
D. a switching technique.
Protocol is a set of rules for data representation, authentication and error detection.
A. connect LANS with different protocols.
B. connect two computers.
C. connect two LANS with the same protocol.
D. connect the node to the LAN.
It is used in forwarding information. Example, on the internet, information is directed to various paths using routers.
A. connects bridges.
B. connect networks with different network protocol technologies.
C. connects two peripherals.
D. connects the node to the LAN.
A gateway is a network point that acts as a entrance to another network. And thus able to connect different network together.
A. LANS with different protocols.
B. two computers.
C. two LANS with the same protocol.
D. the node to the LAN.
In telecommunication networks, a bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol
A. amplifies and retransmits a signal.
B. transmits a signal to the proper LAN.
C. sends the same power signal again.
D. is used only with wireless communication.
Repeaters regenerate the incoming signals to extend the range of local area networks.
A. connects a computer to a LAN.
B. is necessary for the modem to work.
C. does not allow wireless communication.
D. is unnecessary in bus topology.
Ethernet cards are the type of network adapters that supports ethernet for high speed network connections through cables over a local area network (LAN).
A. is an 8-wire connector.
B. allows a computer to communicate over a telephone line.
C. allows one network to communicate with another network.
D. connects the computer to its peripheral devices.
Modem ( modulator - demodulator ) can transmit and receive data over telephone or cable lines.
A. star topology.
B. bus topology.
C. ring topology.
D. tree topology.
The primary disadvantage of a star topology is the high dependence of the system on the functioning of the central hub. While the failure of an individual link only results in the isolation of a single node, the failure of the central hub renders the network inoperable, immediately isolating all nodes. The performance and scalability of the network also depend on the capabilities of the hub. Network size is limited by the number of connections that can be made to the hub, and performance for the entire network is capped by its throughput.
A. manner in which data is transmitted.
B. interconnection of dissimilar networks.
C. pattern of interconnection of nodes.
D. number of nodes in a network.
Network topology is the study of the arrangement or mapping of the elements(links, nodes, etc.) of a network, especially the physical (real) and logical (virtual) interconnections between nodes.
A. connects the node to the network.
B. makes fault isolation difficult.
C. is found only in LANs.
D. is suitable where cable length is large.
A network interface card, more commonly referred to as a NIC, is a device that allows computers to be joined together in a LAN, or local area network. Networked computers communicate with each other using a given protocol or agreed-upon language for transmitting data packets between the different machines, known as nodes
A. server.
B. client on a network.
C. a node.
D. is present only in star topology.
In network theory, the term node may refer a point in a network topology at which lines intersect or branch. A node is a connection point, either a redistribution point or a communication endpoint (some terminal equipment).
A. hub.
B. server.
C. client.
D. distributed system.
In information technology, a server is a computer program that provides services to other computer programs (and their users) in the same or other computers.
A. MB.
B. MHz.
C. Mbps.
D. Bps.
In computer networks, bandwidth is often used as a synonym for data transfer rate - the amount of data that can be carried from one point to another in a given time period (usually a second). This kind of bandwidth is usually expressed in bits (of data) per second (bps). Occasionally, it's expressed as bytes per second (Bps).
A. receiving and transmitting devices.
B. translating devices.
C. signal terminators.
D. signal storage devices.
A transponder is a wireless communications, monitoring, or control device that picks up and automatically responds to an incoming signal.
A. TCP/IP.
B. regulatory aspects of Mobile Computing Technologies.
C. legal aspects of firewall techniques.
D. legal and regulatory aspects of Internet.
Cyber law is a generic term, which refers to all the legal and regulatory aspects of Internet and the World Wide Web.
A. through coaxial cables.
B. Line-of-Sight transmission.
C. unaffected by rain and storms.
D. extremely secure communication.
Microwave power transmission (MPT) is the use of microwaves to transmit power through outer space or the atmosphere without the need for wires. It is a sub-type of the more general wireless energy transfer methods. Microwave transmission also requires line of sight in order to work properly.
A. radio waves.
B. optical fibers.
C. infrared.
D. twisted pair.
The equipment is expensive and the number of fibers in the cables makes it difficult to narrow down captured transmissions to a particular connection.
A. Control unit.
B. Memory unit.
C. ALU.
D. RAM.
Arithmetic and logic unit (ALU) performs specific operations such as addition, multiplication and conditional tests on the data in its registers.
A. stored programs in the memory.
B. were built in 19th centuary.
C. used vaccum tubes.
D. used transistors.
The first generation computers used thermionic valves (vacuum tubes) and machine language was used for giving instructions. The first generation computers used the concept of 'stored program'. The computers of this generation were very large in size and their programming was a difficult task.
A. MAGNUM.
B. Desktop computers.
C. ICL 39.
D. FUJITSU VP-400.
A microcomputer is a computer whose CPU is a microprocessor. A microprocessor is a processor whose all components are on a single integrated-circuit chip. Those are normally single-microprocessor, single user systems designed for perfprming basic operations like education, training, small business applications, playing games etc. Three major categories at microcomputers : PDAs, Desktop computers and workstations.
A. Charles Babbage.
B. Leibnitz.
C. Pascal.
D. Dr. John Von Neumann.
The Von Neumann architecture is based on three key concepts that are :
1. Data and instructions (program) are stored in a single read-write memory.
2. The memory contents are addressable by locations.
3. Execution takes place in a sequential fashion i.e., from one instruction to the next unless modified explicitly.
A. software.
B. application software.
C. user.
D. mouse.
The peripherals are the devices that surround the system unit e.g., the keyboard, mouse, speakers, printers, monitors etc. are peripherals.
A. temporary devices.
B. data devices.
C. computing devices.
D. storage devices.
Since computer's main memory (primary memory) is temporary, secondary memory space is needed to store data and information permanently for later use. Some most common secondary storage media are the floppy diskette, the hard disk and CD-RWs etc.
A. one processor.
B. grouping of several processors to form one large group of processor.
C. processing one by one.
D. conductor through which electricity can travel without any resistance resulting in faster transfer of information between the components of a computer.
Some key features of fifth generation computers are :
Parallel processing : In parallel processing, many processors are grouped to a function as one large group processor.
Superconductors : a superconductor is a conductor through which electricity can travel without any resistance resulting in faster transfer of information between the components of a computer.
A. joystick.
B. speakers.
C. ALU.
D. plotter.
Arithmetic Logic Unit(ALU) performs all arithmetical and logical operations. Numbers to be compared are sent from memory to ALU where comparison takes place and result is returned to the memory.
A. is controlled by the input data entering the system.
B. operates from control panel.
C. controls all input,output and processing.
D. controls mainly the storage unit.
CPU controls all input, output and processing. It also controls the storage unit.
A. digital computers.
B. hybrid computers.
C. analog computers.
D. transistors.
The analog part of hybrid computers is used for measuring heart beat, blood pressure, other vital signs and then the operation is carried out in digital fashion.
A. processed information.
B. raw facts.
C. raw material.
D.
Data in computer terminology mean raw facts and figures. For example, 'Rishabh', '1986', 'B', +25 are data. Data are processed to form information. Data are aggregated and summarized in various meaningful ways to form information.
A. a report printed on computer.
B. is also known as data.
C. an output coming out from computer.
D. processed data put in intelligent for.
Processed data is said to be information.
A. 1024 KB
B. 1024 MB
C. 1000 KB
D. 1000 MB
One gigabyte is exactly 1,073,741,824 bytes (or 2 to the power 10 MB). A gigabyte is usually described as 1 billion bytes of storage.
A. program.
B. output.
C. data file.
D. input.
Data is passed through the processing unit which gives information as the output.
A. John Napier
B. Herman Hollerith.
C. Blaise Pascal.
D. John Von Neumann.
The logarithm of a number to a given base is the power of exponent to which the base must be raised in order to produce the number. John Napier invented the concept of logarithms.
A. 1000 bytes.
B. 1024 bytes.
C. 1034 bytes.
D. 1054 bytes.
I KB=1024 bytes. This is according to the binary definition.
A. Analog computer.
B. Hybrid computer.
C. Digital computer.
D. Cray X-MP-14.
They convert the data into digits (binary digits 0 and 1). They are much faster than analog computers and far more accurate.
A. analog computers.
B. digital computers.
C. both analog and digital computers.
D. only hybrid computers.
Analog computers operate by measuring rather than counting. In analog computer, continuous quantities are used.
A. digital computers.
B. hybrid computers.
C. analog computers.
D. PD
A.
The analog part of hybrid computers is used for measuring heart beat,blood pressure, other vital signs and then operation is carried out in digital fashion.
A. analog computers.
B. digital computers.
C. hybrid computers.
D. personal computers.
Analog computers are fast as calculations are done in parallel, but they are poor in accuracy.They are mostly used in engineering and scientific applications.
A. shell.
B. kernel.
C. both kernel and shell.
D. graphical user interface.
Shell is the outermost part of the operating system and a program that acts as the command interpreter, which takes the commands from the user, interprets them and take action accordingly.
A. GUI based operating system.
B. Linux based operating system.
C. Unix based operating system.
D. Graphical non user based operating system.
GUI (Graphical User Interface) based operating systems have shells that offer graphical elements for interaction.
A. shell.
B. both kernel and shell.
C. kernel.
D. booter.
When a system starts, the kernel is loaded and it remains there for the entire duration of the computer session as its services are required continuously.
A. running program.
B. process.
C. program or process.
D. project.
A process is a program in execution. It is also known as a task.
A. click the left button of the mouse.
B. double click the left button of the mouse.
C. click the right button of the mouse.
D. point and drag the mouse.
Left click will select the item. A selected item is highlighted in some way but it does not result in the initiation of a process.
A. click the left button of the mouse.
B. double click the left button of the mouse.
C. click the right button of the mouse.
D. point and drag the mouse.
Press mouse button and while pressing mouse to another location and then release the mouse button to move or resize the window.
A. processor management.
B. storage management.
C. information management.
D. process state.
Each process is represented in the OS by a data block called Process Control Block. A PCB contains following information.
1. Process State
2. Program counter
3. CPU Register
4. Memory Limits
5. List of open files
A. folder.
B. title bar.
C. can not be stored in a folder.
D. taskbar.
A folder is a location on some storage medium in which you can store files and other folders.
A. 0 -24.
B. 1 - 23.
C. 0 - 23.
D. 1 - 24.
The TIME command allows one to enter or change the system time.
The syntax is :
time [hours : minutes [:seconds [:hundreths]]]
Valid ranges are as follows:
hours = 0 - 23
minutes = 0 - 59
seconds = 0 - 59
hundredths = 0 - 99
A. a vertical scroll bar.
B. a horizontal scroll bar.
C. three scroll arrows.
D. a scroll box and two scroll arrows.
Depending on the size of the window, the entire application may not be visible. When this happens, the window is outfitted with Vertical and / or Horizontal Scroll bars. Each scroll bar contains a scroll box and two scroll arrows. Keyboard movement keys or mouse can be used to move scroll box up/down or left/right on a scroll bar to display other parts of the application.
A. window.
B.
shortcut.
C. format.
D. restore.
When a shortcut is double-clicked, the original item opens.
A. taskbar.
B. workspace.
C. plane area.
D. menubar.
Everything that relates to the current application is displayed in the workspace.
A. page maker.
B. graphics.
C. multimedia software.
D. powerpoint.
The application software that manipulates images is known as Graphics Software and the software that incorporates images, text, sound, computer animation and the video sequences is known as multimedia software.
A. Data Publishing System.
B. Desktop Publishing Software.
C. Desktop Publishing System.
D. Data Publishing Software.
The software that handles page layout by combining the functions of a traditional typesetter and a layout artist, is known as Desktop Publishing Software.
A. Response Ratio = Total time * Elapsed time.
B. Response Ratio = Elapsed time / Execution time received.
C. Response Ratio = Execution time received / Elapsed time.
D. Response Ratio = Execution time received / Total time.
The job with highest response ratio is preferred over others. When a short job arrives, its response ratio is high, so it is scheduled for execution immediately. A longer job would achieve high enough ratio only after a subsequent wait.
A. Avira.
B. McAfee.
C. Quick Heal.
D. FAT.
File system refers to storage mechanism. Two popular file systems for Windows OS are FAT and NTFS.
A. Utility.
B. Operating System.
C. Antivirus.
D. Presentation Graphic Software.
The application software that can create professional looking visual aids is called Presentation Graphics Software. Some most popular graphics, multimedia and presentation packages are Coreldraw, Power Point etc.
A. scheduling decisions can not be made.
B. decisions cannot be made while job is in execution.
C. scheduling decisions can be made while job is in execution.
D. job with the earliest deadline is selected for scheduling.
In preemtive scheduling, a scheduling decision can be made even while the job is executing whereas in non-preemptive scheduling, a scheduling decision is made only after job completes its execution. Therefore, preemptive scheduling may force a job in execution to release the processor, so that execution of some other job can be undertaken.
A. demand paging.
B. thrashing.
C. overflow.
D. segmentation.
If page traffic is too much, this situation is called thrashing.
A. title bar.
B. menu bar.
C. standard toolbar.
D. formatting toolbar.
It is the topmost horizontal bar of each application window and it contains the title of the open window. Apart from the title, it has several other elements also viz. application icon, active file name, minimize button, maximize/restore button and exit button.
A. * .
B. ? .
C. $ .
D. ^ .
When ? is the last character in a primary or secondary name pattern, then it goes for one or no character matching otherwise it goes for exactly one character matching.
A. delete[filename].
B. erase[filename].
C. del pathname.
D. del [drive:] pathname /p.
The other syntax is :
erase[drive:] pathname /p
Here, /p switch causes del or erase to prompt you before a file is actually deleted. If /p is specified, file name is displayed and confirmation is asked as Delete Y/N? If you press Y, file is deleted, if N, delete operation is canceled.
A. path.
B. file.
C. wild card.
D. folder.
Full name of a file or directory consists of pathprimaryname.extension.
A. title bar.
B. menu bar.
C. workspace.
D. scroll bar.
The title bar is a part of the window that contains title and other elements.
A. title menu.
B. shortcut menu.
C. edit menu.
D. file menu.
When we right click (press and release the right mouse button once), the shortcut menu is displayed.
A. Windows 98.
B. Windows 2000.
C. Mach kernel.
D. both Windows 98 and 2000.
Most kernels were developed for specific operating systems such as Windows 98 and 2000. Mach kernel was developed for use with many operating systems.
A. interrupt handler.
B. scheduler.
C. supervisor.
D. memory manager.
Supervisor allocates CPU to the scheduled process.
A. interrupt handler.
B. scheduler.
C. supervisor.
D. memory manager.
Scheduling is the process of deciding how to commit resources between a variety of possible tasks.
A. interrupt handler.
B. scheduler.
C. supervisor.
D. memory manager.
Memory manager accepts requests from the program to allocate and deallocate chunks of memory.
A. interrupt handler.
B. scheduler.
C. supervisor.
D. memory manager.
An interrupt handler is also known as ISR (Interrupt Service Routine)
A. memory management.
B. file process management.
C. processor.
D. process management.
It takes care that the individual processes do not interfere with each other and writes to their areas of memory.
A. interface caller.
B. system calls.
C. kernel.
D. segmentation.
System calls are the functions that a programmer can call to perform the services of an operating system.
A. kernel.
B. collonel.
C. virtual memory.
D. shell.
The kernel provides the basic services for all other parts of the operating system.
A. by pressing Ctrl +
A.
B. by pressing Shift +
A.
C. by pressing Enter +
A.
D. by pressing Alt +
A.
There are 2 other ways. We can also select multiple items by pressing and holding down the CTRL key and clicking the item we want, or by clicking the Select All on the edit menu.
A. My Documents.
B. My Computer.
C. Recycle Bin.
D. Accessories.
Recycle Bin is a holding place for files that we no longer need.
A. removed from hard disk.
B. actually not removed from hard disk until we “empty” the recycle bin.
C. permanently deleted and cannot be retrieved again by any means.
D. copied in a different subfolder in another drive.
Files in recycle bin can be retrieved by selecting and clicking restore command in the file menu.
A. does not go into the recycle bin.
B. goes into a folder named “deleted files”.
C. goes into the recycle bin.
D. goes into My Computer.
A file is permanently deleted and cannot be recalled or recovered when we delete a file from floppy drives.
A. utility.
B. antivirus software.
C. presentation graphics software.
D. customized software.
The requirement of the second user may differ from the first and the software may not fit in the requirements of a new user.
A. utility.
B. package.
C. system software.
D. desktop publishing software.
Apart from composing the text, its layout, line drawings, charts and graphs can be created and included in the main body of text using standard programs and achieved using DTP package.
A. compiler.
B. interpreter.
C. assembler.
D. customized software.
If there is any error in any line, it reports it at the same time and program execution cannot resume until the error is rectified.

System software can be further divided into:
·
·
·
·
·