SlideShare a Scribd company logo
1 of 7
Download to read offline
Multiple Choice Questions (1 marks each)
1. Which among following can be considered as most advanced ROM ?
a. DRAM
b. EEPROM
c. RAM
d. PROM
2. An exception condition in a computer system caused by an event external to the CPU is
known as ?
a. Halt
b. Process
c. Interrupt
d. None of above
3. Which technique is used that identifies the highest priority resource by means of
software?
a. Daisy chaining
b. Polling
c. Priority
d. Chaining
4. What will be the output of following program ?
#include <stdio.h>
int main()
{
int a=15;
float b=1.234;
printf("%*f",a,b);
return 0;
}
a. 1.234
b. 1.234000
c. 1.234000
d. ERROR
5. Break statement is used for
a. Quit a program
b. Quit the current iteration
c. Both of above
d. None of above
6. What is the frequency range of the IEEE 802.11g standard?
a. 2.4Gbps
b. 5Gbps
c. 2.4GHz
d. 5GHz
7. Your office currently runs a mix of 802.11b and 802.11g clients. Rumor has it that your
company is about to merge with another company that uses a different wireless
technology. Which of the following would be compatible with what your WLAN
currently runs?
a. 802.11a
b. 802.11n
c. Bluetooth
d. WiMAX
8. One byte equals to how many bits ?
a. 4 bits
b. 8 bits
c. 12 bits
d. 16 bits
9. The output quality of a printer is measured by ?
a. Dots per line
b. Dots printed per unit time
c. Dots per inch
d. All of the above
10. In Linux a user can load or upload
a. I/O Modules
b. I/O Devices
c. Kernel Modules
d. File Base I/O
OPEN QUESTION
1. The Central Processing Unit or CPU can be thought as the brain of the computer which has
three main components: the arithmetic-logic unit (ALU), control unit and on-board cache
memory. Briefly explain Arithmetic-logic unit (ALU) and Control unit (CU). (2 marks)
Ans:
Control unit: The control unit is responsible for loading and interpreting the individual
instructions that comprise the computer program. These instructions are in a language
called machine code. Machine code is a pattern of ones and zeros. The control unit also
has the task of getting the data needed by the instructions and returning the results of the
processing after the instruction has been executed.
Arithmetic-logic unit: The ALU is responsible for carrying out arithmetic operations such
as addition and subtraction as well as logical decisions such as whether one number is
bigger than another. All programs consist of complex sets of arithmetic and logical
operations. Another way of thinking of a logical operation is as a decision making
operation.
2. Briefly explain three kinds of permissions under Linux (3 Marks)
Ans:
Read: users may read the files or list the directory
Write: users may write to the file of new files to the directory
Execute: users may run the file or lookup a specific file within a directory
3. By using clear examples differentiate between Data file to Program file (4 marks)
Ans:
The work you prepare and save on the computer, such as a Word document, is held in the
computer as a document file referred to as Data file.
The application that you use to prepare your work, such as Microsoft Word, is itself another
type of file referred to as Program file.
4. Write a C program to find the factorial value of a number. Also write the algorithm and
draw flowchart. (10 marks)
Ans.
Program
#include<stdio.h>
#include<conio.h>
int main()
{
int n,i,fact=1;
printf("Enter any number : ");
scanf("%d", &n);
for(i=1; i<=n; i++)
fact = fact * i;
printf("Factorial value of %d = %d",n,fact);
return 0;
}
Algorithm
Step 1. Start
step 2. Read the number n
step 3. [Initialize]
i=1, fact=1
step 4. Repeat step 4 through 6 until i=n
step 5. fact=fact*i
step 6. i=i+1
step 7. Print fact
step 8. Stop
Flowchart
False
True
5. A computer network means where a number of computers are linked together and allows
them to share resources, exchange files, or allow electronic communications.
a. Describe Hub, Switch and Router as network devices? (3marks)
Hub: Hub will broadcast all data to every port. It has a common connection
point for all devices.
Switch: Switch will create the dynamic connection and provide information to
the requesting port.
Start
Read n
I = 1
Fact = 1
Is I <= n?
I = I + 1
Fact = fact*i
Stop
Print fact
Router: Router is the devices which will be responsible for forwarding data
packets.
b. State and Describe three key elements of the protocol? (3 marks)
Syntax: Describe the format of the data.
Semantics: Describes the meaning of each section.
Timings: Explain the timing that how fast the data can be sent
c. A network management system (NMS) is an application or set of applications
that lets network administrators to manage a network's independent components
inside a bigger network management framework. NMS may be used to monitor
both software and hardware components in a network. Describe five broad
categories of a network management system. (5 marks)
Configuration Management: The configuration management deals with the
status of each entity in the network and its relation to other entities.
Fault Management: The fault is defined as the abnormal condition in the
system. The fault management deals with the proper operation of the
individual components of a complex network.
Performance Management: The performance management monitors and
controls the network to ensure that it is running as efficiently as possible.
Security Management: Security management is responsible for controlling
access to the network based on the predefined policy.
Accounting Management: Accounting management is the control of users’
access to network resources through charges. Under accounting
management, individual users, departments, divisions, or projects are
charged for the services they receive from the network.
6. Briefly explain Disk partition, Disk clean up, Disk Defragmentation, Partition shrinking
and Extending partition. (5marks)
Ans:
Disk partition is a process of dividing a hard disk drive into several partitions.
Disk clean up is a computer maintenance utility designed to free up disk space on a
computer's hard drive by removing unnecessary files, including temporary files and
thumbnails.
Disk Defragmentation is the process of consolidating fragmented files on the hard drive
by removing free space between files.
Partition shrinking is the process of getting an unallocated space and to create or extend
partition on hard drive.
Extending partition is the process of adding more space to existing primary partitions and
logical drives.
7. Backup refers to the process of making copies of data or data files to use in the event the
original data or data files are lost or destroyed. Differentiate Full Backup to Differential
backup. (2 marks)
a. Full backup is a method of backup where all the files and folders
selected for the backup will be backed up
b. Differential backup is a backup of all changes made since the last
full backup. With differential backups, one full backup is done first
and subsequent backup runs are the changes made since the last full
backup.
8. Database Management system is a collection of application programs which allow the user
to organize, restore and retrieve information about data efficiently and as effectively as
possible. Differentiate Normalization and De-Normalization in database. (3 marks)
Normalization is the process of removing redundant data from the database by splitting
the table in a well-defined manner in order to maintain data integrity. This process saves
much of the storage space.
De-normalization is the process of adding up redundant data on the table in order to speed
up the complex queries and thus achieve better performance.

More Related Content

Similar to Multiple Choice Questions and Answers on Computer Fundamentals

Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...Joseph Wafuba
 
A Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItA Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItMichele Thomas
 
OSLecture1.ppt
OSLecture1.pptOSLecture1.ppt
OSLecture1.pptAkkiiDerp
 
Linux Operating System Resembles Unix Operating. System
Linux Operating System Resembles Unix Operating. SystemLinux Operating System Resembles Unix Operating. System
Linux Operating System Resembles Unix Operating. SystemOlga Bautista
 
Computer Programming.pdf
Computer Programming.pdfComputer Programming.pdf
Computer Programming.pdfLegesseSamuel
 
Zimsec Computer Science Notes
Zimsec Computer Science NotesZimsec Computer Science Notes
Zimsec Computer Science NotesDoubt Jafali
 
lecture1422486950.pdf
lecture1422486950.pdflecture1422486950.pdf
lecture1422486950.pdftomsmith160
 
Programming & Data Structure Lecture Notes
Programming & Data Structure Lecture NotesProgramming & Data Structure Lecture Notes
Programming & Data Structure Lecture NotesFellowBuddy.com
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating SystemSoumit Ghosh
 
03. top level view of computer function &amp; interconnection
03. top level view of computer function &amp; interconnection03. top level view of computer function &amp; interconnection
03. top level view of computer function &amp; interconnectionnoman yasin
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OSC.U
 
Bt0070, operating systems
Bt0070, operating systemsBt0070, operating systems
Bt0070, operating systemssmumbahelp
 
how to install two or more os in one pc
how to install two or more os in one pchow to install two or more os in one pc
how to install two or more os in one pckrishna kakade
 
Mca2010 – operating system
Mca2010 – operating systemMca2010 – operating system
Mca2010 – operating systemsmumbahelp
 

Similar to Multiple Choice Questions and Answers on Computer Fundamentals (20)

Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
Answer guide to uneb sample question paper 2013 print by WAFUBA SJ BUKOYO EC ...
 
computer Unit 7
computer Unit 7computer Unit 7
computer Unit 7
 
A Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To ItA Survey On Operating System Challenges And Security Issues Associate To It
A Survey On Operating System Challenges And Security Issues Associate To It
 
OSLecture1.ppt
OSLecture1.pptOSLecture1.ppt
OSLecture1.ppt
 
Linux Operating System Resembles Unix Operating. System
Linux Operating System Resembles Unix Operating. SystemLinux Operating System Resembles Unix Operating. System
Linux Operating System Resembles Unix Operating. System
 
Computer Programming.pdf
Computer Programming.pdfComputer Programming.pdf
Computer Programming.pdf
 
C with lab
C with labC with lab
C with lab
 
Zimsec Computer Science Notes
Zimsec Computer Science NotesZimsec Computer Science Notes
Zimsec Computer Science Notes
 
lecture1422486950.pdf
lecture1422486950.pdflecture1422486950.pdf
lecture1422486950.pdf
 
Programming & Data Structure Lecture Notes
Programming & Data Structure Lecture NotesProgramming & Data Structure Lecture Notes
Programming & Data Structure Lecture Notes
 
Basics of Operating System
Basics of Operating SystemBasics of Operating System
Basics of Operating System
 
03. top level view of computer function &amp; interconnection
03. top level view of computer function &amp; interconnection03. top level view of computer function &amp; interconnection
03. top level view of computer function &amp; interconnection
 
Operating system
Operating systemOperating system
Operating system
 
Ch3
Ch3Ch3
Ch3
 
Ch3 OS
Ch3 OSCh3 OS
Ch3 OS
 
OSCh3
OSCh3OSCh3
OSCh3
 
OS_Ch3
OS_Ch3OS_Ch3
OS_Ch3
 
Bt0070, operating systems
Bt0070, operating systemsBt0070, operating systems
Bt0070, operating systems
 
how to install two or more os in one pc
how to install two or more os in one pchow to install two or more os in one pc
how to install two or more os in one pc
 
Mca2010 – operating system
Mca2010 – operating systemMca2010 – operating system
Mca2010 – operating system
 

Recently uploaded

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

Multiple Choice Questions and Answers on Computer Fundamentals

  • 1. Multiple Choice Questions (1 marks each) 1. Which among following can be considered as most advanced ROM ? a. DRAM b. EEPROM c. RAM d. PROM 2. An exception condition in a computer system caused by an event external to the CPU is known as ? a. Halt b. Process c. Interrupt d. None of above 3. Which technique is used that identifies the highest priority resource by means of software? a. Daisy chaining b. Polling c. Priority d. Chaining 4. What will be the output of following program ? #include <stdio.h> int main() { int a=15; float b=1.234; printf("%*f",a,b); return 0; } a. 1.234 b. 1.234000 c. 1.234000 d. ERROR 5. Break statement is used for a. Quit a program b. Quit the current iteration c. Both of above
  • 2. d. None of above 6. What is the frequency range of the IEEE 802.11g standard? a. 2.4Gbps b. 5Gbps c. 2.4GHz d. 5GHz 7. Your office currently runs a mix of 802.11b and 802.11g clients. Rumor has it that your company is about to merge with another company that uses a different wireless technology. Which of the following would be compatible with what your WLAN currently runs? a. 802.11a b. 802.11n c. Bluetooth d. WiMAX 8. One byte equals to how many bits ? a. 4 bits b. 8 bits c. 12 bits d. 16 bits 9. The output quality of a printer is measured by ? a. Dots per line b. Dots printed per unit time c. Dots per inch d. All of the above 10. In Linux a user can load or upload a. I/O Modules b. I/O Devices c. Kernel Modules d. File Base I/O
  • 3. OPEN QUESTION 1. The Central Processing Unit or CPU can be thought as the brain of the computer which has three main components: the arithmetic-logic unit (ALU), control unit and on-board cache memory. Briefly explain Arithmetic-logic unit (ALU) and Control unit (CU). (2 marks) Ans: Control unit: The control unit is responsible for loading and interpreting the individual instructions that comprise the computer program. These instructions are in a language called machine code. Machine code is a pattern of ones and zeros. The control unit also has the task of getting the data needed by the instructions and returning the results of the processing after the instruction has been executed. Arithmetic-logic unit: The ALU is responsible for carrying out arithmetic operations such as addition and subtraction as well as logical decisions such as whether one number is bigger than another. All programs consist of complex sets of arithmetic and logical operations. Another way of thinking of a logical operation is as a decision making operation. 2. Briefly explain three kinds of permissions under Linux (3 Marks) Ans: Read: users may read the files or list the directory Write: users may write to the file of new files to the directory Execute: users may run the file or lookup a specific file within a directory 3. By using clear examples differentiate between Data file to Program file (4 marks) Ans: The work you prepare and save on the computer, such as a Word document, is held in the computer as a document file referred to as Data file. The application that you use to prepare your work, such as Microsoft Word, is itself another type of file referred to as Program file. 4. Write a C program to find the factorial value of a number. Also write the algorithm and draw flowchart. (10 marks)
  • 4. Ans. Program #include<stdio.h> #include<conio.h> int main() { int n,i,fact=1; printf("Enter any number : "); scanf("%d", &n); for(i=1; i<=n; i++) fact = fact * i; printf("Factorial value of %d = %d",n,fact); return 0; } Algorithm Step 1. Start step 2. Read the number n step 3. [Initialize] i=1, fact=1 step 4. Repeat step 4 through 6 until i=n step 5. fact=fact*i step 6. i=i+1 step 7. Print fact step 8. Stop
  • 5. Flowchart False True 5. A computer network means where a number of computers are linked together and allows them to share resources, exchange files, or allow electronic communications. a. Describe Hub, Switch and Router as network devices? (3marks) Hub: Hub will broadcast all data to every port. It has a common connection point for all devices. Switch: Switch will create the dynamic connection and provide information to the requesting port. Start Read n I = 1 Fact = 1 Is I <= n? I = I + 1 Fact = fact*i Stop Print fact
  • 6. Router: Router is the devices which will be responsible for forwarding data packets. b. State and Describe three key elements of the protocol? (3 marks) Syntax: Describe the format of the data. Semantics: Describes the meaning of each section. Timings: Explain the timing that how fast the data can be sent c. A network management system (NMS) is an application or set of applications that lets network administrators to manage a network's independent components inside a bigger network management framework. NMS may be used to monitor both software and hardware components in a network. Describe five broad categories of a network management system. (5 marks) Configuration Management: The configuration management deals with the status of each entity in the network and its relation to other entities. Fault Management: The fault is defined as the abnormal condition in the system. The fault management deals with the proper operation of the individual components of a complex network. Performance Management: The performance management monitors and controls the network to ensure that it is running as efficiently as possible. Security Management: Security management is responsible for controlling access to the network based on the predefined policy. Accounting Management: Accounting management is the control of users’ access to network resources through charges. Under accounting management, individual users, departments, divisions, or projects are charged for the services they receive from the network. 6. Briefly explain Disk partition, Disk clean up, Disk Defragmentation, Partition shrinking and Extending partition. (5marks) Ans: Disk partition is a process of dividing a hard disk drive into several partitions. Disk clean up is a computer maintenance utility designed to free up disk space on a computer's hard drive by removing unnecessary files, including temporary files and thumbnails. Disk Defragmentation is the process of consolidating fragmented files on the hard drive by removing free space between files. Partition shrinking is the process of getting an unallocated space and to create or extend partition on hard drive. Extending partition is the process of adding more space to existing primary partitions and logical drives.
  • 7. 7. Backup refers to the process of making copies of data or data files to use in the event the original data or data files are lost or destroyed. Differentiate Full Backup to Differential backup. (2 marks) a. Full backup is a method of backup where all the files and folders selected for the backup will be backed up b. Differential backup is a backup of all changes made since the last full backup. With differential backups, one full backup is done first and subsequent backup runs are the changes made since the last full backup. 8. Database Management system is a collection of application programs which allow the user to organize, restore and retrieve information about data efficiently and as effectively as possible. Differentiate Normalization and De-Normalization in database. (3 marks) Normalization is the process of removing redundant data from the database by splitting the table in a well-defined manner in order to maintain data integrity. This process saves much of the storage space. De-normalization is the process of adding up redundant data on the table in order to speed up the complex queries and thus achieve better performance.