This document contains a 25 question multiple choice quiz about computer fundamentals and operating systems. The questions cover topics such as generations of computers, computer architecture, memory, operating systems features, and applications such as word processing and spreadsheets. The document provides the question and a blank for the answer selection for each multiple choice question.
The document provides information about the exam format for the First Science: Computer Science CS1.2 course. It states that the exam is 2 hours long and contains 4 questions, with questions 1 and 2 being compulsory and the others being a choice between 3 and 4. Question 1 contains 60 multiple choice questions, with negative marking applying for incorrect answers. Question 2 involves assembly language programming. Questions 3 and 4 concern computer architecture topics. Sample multiple choice questions are provided covering various computer science topics. Instructions are also provided on how to fill out the multiple choice answer sheet.
This document contains an exam for the subject of Operating Systems with 9 questions. It begins by asking for the exam roll number and provides exam details such as code, subject, duration, and maximum marks.
The first question contains 8 short answer sub-questions on topics like interrupts, fragmentation, threads, monitors, deadlock conditions, and disk scheduling algorithms.
The remaining questions are longer form questions divided into 4 units on topics of memory management, concurrency, I/O management, and file systems. The questions assess understanding of concepts like paging, segmentation, virtual memory, deadlocks, scheduling algorithms, disk scheduling, file allocation techniques, and directory structures.
The document summarizes two approaches to implementing foveated imaging in CMOS image sensors: (1) A pyramidal architecture with multiple rings of pixels having different integration times, allowing for dynamic range enhancement. (2) A universal multiresolution sensor using a 3T pixel design that allows pixels to be grouped and averaged, enabling adaptive resolution. Both designs aim to mimic the human retina and improve efficiency over traditional sensors. The pyramidal and multiresolution sensors were fabricated in 0.18um CMOS technology and are being tested for applications like video conferencing and industrial inspection.
Ict networking exercise short questions answerGary Tsang
This document provides short answers to questions about computer networking. It covers topics like types of networks, advantages and disadvantages of centralized and decentralized networks, components of networking hardware and software, protocols, network topologies and layers of the OSI model. The document contains diagrams and explanations of networking concepts.
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Wwwguest3f9c6b
This document contains 8 sets of questions for a Computer Organization exam. Each set contains 2-3 questions related to various topics in computer organization including memory formats, arithmetic operations, processor registers, instruction sets, caching, I/O, and parallel processing. Students must answer any 5 questions out of the 16 total questions covering areas such as binary arithmetic, register organization, pipelining, memory addressing, and multiprocessor systems.
This document contains 8 questions related to advanced computer architecture for a exam. The questions cover topics such as:
- Amdahl's law and calculating the number of dies on a wafer
- Register-memory architecture and data formats
- Data dependent hazards and pipeline scheduling
- Cache organizations, blocks, and coherence protocols
- Disk and storage technologies like magnetic disks, optical disks, and magnetic tapes
- Effective bandwidth calculations for different message sizes and network overheads
- Interconnection networks, fiber optic components, and performance parameters
The questions range from short definitions and explanations to longer discussions of concepts, with some including calculations. The exam tests knowledge of computer hardware, memory systems, parallelism, and storage technologies
Tchebichef image watermarking along the edge using YCoCg-R color space for co...IJECEIAES
The document summarizes a research paper that proposes a Tchebichef watermarking technique along image edges using the YCoCg-R color space for copyright protection. The technique embeds a scrambled watermark bit into selected blocks of the image that are transformed using Tchebichef moments. The blocks are selected based on having minimum human visual characteristic entropy. The locations of the matrix moments C(0,1), C(1,0), C(0,2) and C(2,0) are used for embedding to maintain image quality. An optimal threshold is determined to balance imperceptibility and robustness against JPEG compression attacks. The technique is tested on various color images and is shown to produce good
This document provides an overview of "The Buffett Report" by Professor John Price, which aims to reveal the nine investing secrets of Warren Buffett and how to profit from them. It describes Buffett as a simple, unassuming man who is the world's most successful investor, having turned $10,000 invested in 1956 into over $280 million today through his company Berkshire Hathaway. The report claims to take readers from understanding Buffett's deep investing principles to becoming successful investors themselves through a proprietary system called Conscious Investor that allows implementing Buffett's strategies quickly. It also cites independently audited returns from the author's portfolio of 19.45% annually from 1997-2003 compared to 2.82% for
The document provides information about the exam format for the First Science: Computer Science CS1.2 course. It states that the exam is 2 hours long and contains 4 questions, with questions 1 and 2 being compulsory and the others being a choice between 3 and 4. Question 1 contains 60 multiple choice questions, with negative marking applying for incorrect answers. Question 2 involves assembly language programming. Questions 3 and 4 concern computer architecture topics. Sample multiple choice questions are provided covering various computer science topics. Instructions are also provided on how to fill out the multiple choice answer sheet.
This document contains an exam for the subject of Operating Systems with 9 questions. It begins by asking for the exam roll number and provides exam details such as code, subject, duration, and maximum marks.
The first question contains 8 short answer sub-questions on topics like interrupts, fragmentation, threads, monitors, deadlock conditions, and disk scheduling algorithms.
The remaining questions are longer form questions divided into 4 units on topics of memory management, concurrency, I/O management, and file systems. The questions assess understanding of concepts like paging, segmentation, virtual memory, deadlocks, scheduling algorithms, disk scheduling, file allocation techniques, and directory structures.
The document summarizes two approaches to implementing foveated imaging in CMOS image sensors: (1) A pyramidal architecture with multiple rings of pixels having different integration times, allowing for dynamic range enhancement. (2) A universal multiresolution sensor using a 3T pixel design that allows pixels to be grouped and averaged, enabling adaptive resolution. Both designs aim to mimic the human retina and improve efficiency over traditional sensors. The pyramidal and multiresolution sensors were fabricated in 0.18um CMOS technology and are being tested for applications like video conferencing and industrial inspection.
Ict networking exercise short questions answerGary Tsang
This document provides short answers to questions about computer networking. It covers topics like types of networks, advantages and disadvantages of centralized and decentralized networks, components of networking hardware and software, protocols, network topologies and layers of the OSI model. The document contains diagrams and explanations of networking concepts.
C O M P U T E R O R G A N I Z A T I O N J N T U M O D E L P A P E R{Wwwguest3f9c6b
This document contains 8 sets of questions for a Computer Organization exam. Each set contains 2-3 questions related to various topics in computer organization including memory formats, arithmetic operations, processor registers, instruction sets, caching, I/O, and parallel processing. Students must answer any 5 questions out of the 16 total questions covering areas such as binary arithmetic, register organization, pipelining, memory addressing, and multiprocessor systems.
This document contains 8 questions related to advanced computer architecture for a exam. The questions cover topics such as:
- Amdahl's law and calculating the number of dies on a wafer
- Register-memory architecture and data formats
- Data dependent hazards and pipeline scheduling
- Cache organizations, blocks, and coherence protocols
- Disk and storage technologies like magnetic disks, optical disks, and magnetic tapes
- Effective bandwidth calculations for different message sizes and network overheads
- Interconnection networks, fiber optic components, and performance parameters
The questions range from short definitions and explanations to longer discussions of concepts, with some including calculations. The exam tests knowledge of computer hardware, memory systems, parallelism, and storage technologies
Tchebichef image watermarking along the edge using YCoCg-R color space for co...IJECEIAES
The document summarizes a research paper that proposes a Tchebichef watermarking technique along image edges using the YCoCg-R color space for copyright protection. The technique embeds a scrambled watermark bit into selected blocks of the image that are transformed using Tchebichef moments. The blocks are selected based on having minimum human visual characteristic entropy. The locations of the matrix moments C(0,1), C(1,0), C(0,2) and C(2,0) are used for embedding to maintain image quality. An optimal threshold is determined to balance imperceptibility and robustness against JPEG compression attacks. The technique is tested on various color images and is shown to produce good
This document provides an overview of "The Buffett Report" by Professor John Price, which aims to reveal the nine investing secrets of Warren Buffett and how to profit from them. It describes Buffett as a simple, unassuming man who is the world's most successful investor, having turned $10,000 invested in 1956 into over $280 million today through his company Berkshire Hathaway. The report claims to take readers from understanding Buffett's deep investing principles to becoming successful investors themselves through a proprietary system called Conscious Investor that allows implementing Buffett's strategies quickly. It also cites independently audited returns from the author's portfolio of 19.45% annually from 1997-2003 compared to 2.82% for
Scientists divide the Animal Kingdom into two main groups: vertebrates, which have backbones, and invertebrates, which do not. Vertebrates are then divided into mammals, birds, reptiles, amphibians, and fish. Mammals have hair or fur and feed their young milk. Birds lay eggs and have feathers. Reptiles lay eggs and have scaly skin. Amphibians can live on land and water and lay eggs. Fish live in water, have gills, scales, and fins. The document then provides examples of different animals and asks the reader to identify if they are a mammal, bird, fish, amphibian, or reptile based on descriptions of
Hershey and Mars are two major chocolate companies that compete in the US chocolate market. They have both expanded overseas as well. Mars aggressively pursued military contracts during the Gulf War in 1990 and won a large contract over Hershey, becoming the main supplier of chocolates to the US army. Both companies have grown significantly since their founding, with Hershey focusing initially on the US market and Mars expanding more globally earlier on through acquisitions. Their histories, leadership styles, marketing approaches, and strategic decisions have impacted their competitive positions over time.
The document discusses new features in a prerelease version of Adobe Flash Player 10, including improved audio and video capabilities. Dynamic streaming will automatically adjust video quality based on bandwidth availability. A new protocol called RTMFP provides a secure alternative to RTMP for real-time media delivery over UDP. The release also includes support for the Speex audio codec and UDP streaming.
Vishala Printers, a division of ABC, faces losing its major printing contract with CIMC due to a new policy requiring contracts to be awarded solely based on lowest bid. Mr. Mehta, head of Vishala Printers, believes some at CIMC colluded with competitors to introduce this policy to eliminate Vishala. While Vishala's rates are 40-50% higher, margins are only 15-18% due to expertise and investments. Losing the CIMC contract would significantly impact Vishala's business. Mr. Mehta must determine how to retain the contract at the meeting while justifying Vishala's value beyond price.
Este documento es una oración dirigida a Dios para pedirle que derrame su misericordia, amor, paz, alegría y bendiciones sobre una persona especial. Se le pide a Dios que llene el corazón de esta persona con estas cualidades, cure sus heridas emocionales, ilumine su vida, le enseñe a amar, y le dé fuerza, sabiduría y fe.
The document provides the syllabus for the Company Secretaries Examination. It outlines the objectives, contents, and structure of the Foundation, Intermediate and Final examinations.
The Foundation exam covers subjects like English, Business Communication, Basic Economics, Business Environment, Financial Accounting, and Elements of Business Laws and Management. The Intermediate exam includes subjects like General and Commercial Laws, Corporate Laws, and Tax Laws. The Final exam focuses on strategic management, corporate governance and ethics.
Each paper is 3 hours long and carries 100 marks. Exams will be in English, but Hindi can also be used with prior approval. The syllabus provides detailed learning objectives and contents for each subject to ensure candidates have the requisite knowledge for
This document contains a 27 question operations management exam with multiple choice answers. The questions cover topics like types of rules and regulations that can hinder global expansion, calculating upper control limits on X-charts, advantages and disadvantages of MRP systems, key components of transportation decisions, and functions of maintenance management, among other operations management topics. The exam is asking students to demonstrate their understanding of core concepts in the subject.
This document introduces a report called "The Buffett Report" which aims to reveal the nine investing secrets of Warren Buffett and how to profit from them. It was written by Professor John Price after years of researching Buffett's methods. The report claims to have discovered Buffett's closely guarded secrets and provides tools to implement a Buffett-style value investing approach. It promises to help readers avoid speculative investments, cut research time, and achieve above-average returns like Buffett has over his career.
This document contains a 37 question multiple choice quiz about information technology topics. The questions cover subjects like computer generations, architecture, operating systems, memory, storage, networking, quality of information, HTML, groupware, and vertical applications. The quiz is intended to test knowledge of fundamental IT concepts and terminology.
The document provides an overview of a two-part introduction to basic computer concepts (計概) for information management students. It discusses common terminology to help students understand what to focus on for the exam. It also introduces the first part of a diagnostic test on basic computer concepts for students who are studying diligently.
This document provides 20 multiple choice questions about Internet of Things topics. The questions cover IOT security threats, FP7 projects, issues considered in IOT implementations, characteristics of RISC processors, differences between UART, SPI and I2C communication protocols, Linux file permissions, and more. Each question is followed by 4 possible answers with only one correct response identified.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
The document contains questions and solutions about various topics related to computers and information technology. It discusses transistor and integrated circuit components of computers. It also addresses memory types like primary, magnetic, and optical storage and differentiates between sequential and random access. Number conversion between decimal, binary, hexadecimal and ASCII/Unicode representations are explained. Computer components like ports, static/dynamic RAM, seek time vs latency, monitor resolution, printers, and utility software are defined. Software architectures, cloud computing, structured programming, operating systems, files, arrays, subroutines, email, databases, spreadsheets and word processing are analyzed. Networking concepts such as LAN, MAN, WAN, TCP, IP, URLs, DNS, subnet masks,
This document contains a GATE study material question paper with 30 single mark questions and 2 two-mark questions on computer science topics. The questions cover concepts like structured programming, data structures, algorithms, computer architecture, operating systems, databases, computer networks and logic. The document also provides information about a website that offers GATE preparation material, forums and downloads.
CAPE Computer Science Unit 1 Paper 1 - Practice PaperAlex Stewart
This document provides a practice exam for the Caribbean Examinations Council Advanced Proficiency Examination in Computer Science. The exam covers fundamentals of computer science, including programming constructs like loops and functions, generations of programming languages, and basic computer hardware concepts. It consists of 45 multiple choice questions testing these core CS topics.
This document contains a quiz of 75 multiple choice questions related to computer awareness. The questions cover topics such as computer hardware, operating systems, software applications, networking, internet, security, and computer programming languages. The questions are multiple choice with one correct answer out of 5 options for each question. The questions progress from basic to more advanced computer concepts.
This document contains a quiz with questions about computer awareness and concepts. It includes 55 multiple choice questions covering topics like computer hardware, operating systems, software, networking, internet, security and more. The questions are part of a larger question bank for computer awareness that is provided on the website www.BankExamsToday.com.
Operating System Multiple Choice QuestionsShusil Baral
Here you can find 1000's of Multiple Choice Questions(MCQs) of Operating System(OS) includes the MCQs of fundamental of Operating System and core Operating System.
The document contains a 50 question practice test for the Computer Science & Applications paper-II exam. The questions cover topics like binary numbers, logic gates, algorithms, data structures, databases, operating systems and computer networks. The key answers are provided at the end with letters A through D corresponding to the multiple choice options for each question number from 1 to 50.
1)Today, the overwhelming world leader in microprocessor sales i.pdfisenbergwarne4100
1)
Today, the overwhelming world leader in microprocessor sales is:
A)
Intel.
B)
Microsoft.
C)
Motorola.
D)
Digital Equipment Corporation (DEC).
2)
Which of the following is not an example of a computer output device?
A)
Video display unit
B)
Scanner
C)
Magnetic tape unit
D)
Printer
3)
Which of the following is not an example of applications software?
A)
Spreadsheet packages
B)
Inventory record-keeping programs
C)
Word-processing software
D)
Operating systems software
4)
Which of the following describes a function of an operating system?
A)
Stores and retrieves data files
B)
Decides when to initiate a particular job from among those waiting in the input queue
C)
Controls the inflow and outflow of communications with various terminals and microcomputers
D)
All of the above
5)
Which of the following is an example of an open operating system?
A)
Linux
B)
Windows NT
C)
OS/400
D)
Windows XP
6)
A metalanguage standard for specifying a document markup language based on plain-text tags,
and used to facilitate data interchange among applications on the Web, is
A)
HTML
B)
JavaScript
C)
HTTP
D)
XML
7)
Which of the following is not an advantage of distributed and client/server systems?
A)
Data more readily available to users
B)
Increased service and responsiveness to local users
C)
Less dependence on telecommunications lines and media
D)
Reduced computing costs
8)
When data can be transmitted in both directions but not simultaneously, the transmission type is
referred to as:
A)
simplex.
B)
half-duplex.
C)
full-duplex.
D)
switched-line.
9)
A telecommunications network often includes physical media over which communication signals
are sent. All of the following are examples of physical media except:
A)
twisted pair wire.
B)
coaxial cable.
C)
fiber-optic cable.
D)
satellite.
10)
All of the following are characteristic of fiber-optic transmission, except:
A)
more secure than other transmission media.
B)
faster transmission than other transmission media.
C)
space requirements are more than other transmission media.
D)
more reliable than other transmission media.
11)
A method of operating a digital telecommunications network in which information is divided
into units of some fixed length that are then sent over the network separately, allowing the units
of data from various users to be interspersed with one another is called:
A)
bundling.
B)
time sharing.
C)
batching.
D)
packet switching.
12) The basic unit of a spreadsheet is a:
A) box
B) cube
C) cell
D) grid
13) Booting a computer means to:
A) restart the computer
B) run a program from the hard disk
C) start the computer
D) none of the above
14) The correct order from lowest to highest level of detail of the same program is:
A) assembly language, programming language, and binary
B) programming language, assembly language, and binary
C) binary, assembly language, and programming language
D) binary, programming language, and assembly language
15) Instruction sequences that repeat are called:
A) loops
B) assump.
Scientists divide the Animal Kingdom into two main groups: vertebrates, which have backbones, and invertebrates, which do not. Vertebrates are then divided into mammals, birds, reptiles, amphibians, and fish. Mammals have hair or fur and feed their young milk. Birds lay eggs and have feathers. Reptiles lay eggs and have scaly skin. Amphibians can live on land and water and lay eggs. Fish live in water, have gills, scales, and fins. The document then provides examples of different animals and asks the reader to identify if they are a mammal, bird, fish, amphibian, or reptile based on descriptions of
Hershey and Mars are two major chocolate companies that compete in the US chocolate market. They have both expanded overseas as well. Mars aggressively pursued military contracts during the Gulf War in 1990 and won a large contract over Hershey, becoming the main supplier of chocolates to the US army. Both companies have grown significantly since their founding, with Hershey focusing initially on the US market and Mars expanding more globally earlier on through acquisitions. Their histories, leadership styles, marketing approaches, and strategic decisions have impacted their competitive positions over time.
The document discusses new features in a prerelease version of Adobe Flash Player 10, including improved audio and video capabilities. Dynamic streaming will automatically adjust video quality based on bandwidth availability. A new protocol called RTMFP provides a secure alternative to RTMP for real-time media delivery over UDP. The release also includes support for the Speex audio codec and UDP streaming.
Vishala Printers, a division of ABC, faces losing its major printing contract with CIMC due to a new policy requiring contracts to be awarded solely based on lowest bid. Mr. Mehta, head of Vishala Printers, believes some at CIMC colluded with competitors to introduce this policy to eliminate Vishala. While Vishala's rates are 40-50% higher, margins are only 15-18% due to expertise and investments. Losing the CIMC contract would significantly impact Vishala's business. Mr. Mehta must determine how to retain the contract at the meeting while justifying Vishala's value beyond price.
Este documento es una oración dirigida a Dios para pedirle que derrame su misericordia, amor, paz, alegría y bendiciones sobre una persona especial. Se le pide a Dios que llene el corazón de esta persona con estas cualidades, cure sus heridas emocionales, ilumine su vida, le enseñe a amar, y le dé fuerza, sabiduría y fe.
The document provides the syllabus for the Company Secretaries Examination. It outlines the objectives, contents, and structure of the Foundation, Intermediate and Final examinations.
The Foundation exam covers subjects like English, Business Communication, Basic Economics, Business Environment, Financial Accounting, and Elements of Business Laws and Management. The Intermediate exam includes subjects like General and Commercial Laws, Corporate Laws, and Tax Laws. The Final exam focuses on strategic management, corporate governance and ethics.
Each paper is 3 hours long and carries 100 marks. Exams will be in English, but Hindi can also be used with prior approval. The syllabus provides detailed learning objectives and contents for each subject to ensure candidates have the requisite knowledge for
This document contains a 27 question operations management exam with multiple choice answers. The questions cover topics like types of rules and regulations that can hinder global expansion, calculating upper control limits on X-charts, advantages and disadvantages of MRP systems, key components of transportation decisions, and functions of maintenance management, among other operations management topics. The exam is asking students to demonstrate their understanding of core concepts in the subject.
This document introduces a report called "The Buffett Report" which aims to reveal the nine investing secrets of Warren Buffett and how to profit from them. It was written by Professor John Price after years of researching Buffett's methods. The report claims to have discovered Buffett's closely guarded secrets and provides tools to implement a Buffett-style value investing approach. It promises to help readers avoid speculative investments, cut research time, and achieve above-average returns like Buffett has over his career.
This document contains a 37 question multiple choice quiz about information technology topics. The questions cover subjects like computer generations, architecture, operating systems, memory, storage, networking, quality of information, HTML, groupware, and vertical applications. The quiz is intended to test knowledge of fundamental IT concepts and terminology.
The document provides an overview of a two-part introduction to basic computer concepts (計概) for information management students. It discusses common terminology to help students understand what to focus on for the exam. It also introduces the first part of a diagnostic test on basic computer concepts for students who are studying diligently.
This document provides 20 multiple choice questions about Internet of Things topics. The questions cover IOT security threats, FP7 projects, issues considered in IOT implementations, characteristics of RISC processors, differences between UART, SPI and I2C communication protocols, Linux file permissions, and more. Each question is followed by 4 possible answers with only one correct response identified.
final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P
The document contains questions and solutions about various topics related to computers and information technology. It discusses transistor and integrated circuit components of computers. It also addresses memory types like primary, magnetic, and optical storage and differentiates between sequential and random access. Number conversion between decimal, binary, hexadecimal and ASCII/Unicode representations are explained. Computer components like ports, static/dynamic RAM, seek time vs latency, monitor resolution, printers, and utility software are defined. Software architectures, cloud computing, structured programming, operating systems, files, arrays, subroutines, email, databases, spreadsheets and word processing are analyzed. Networking concepts such as LAN, MAN, WAN, TCP, IP, URLs, DNS, subnet masks,
This document contains a GATE study material question paper with 30 single mark questions and 2 two-mark questions on computer science topics. The questions cover concepts like structured programming, data structures, algorithms, computer architecture, operating systems, databases, computer networks and logic. The document also provides information about a website that offers GATE preparation material, forums and downloads.
CAPE Computer Science Unit 1 Paper 1 - Practice PaperAlex Stewart
This document provides a practice exam for the Caribbean Examinations Council Advanced Proficiency Examination in Computer Science. The exam covers fundamentals of computer science, including programming constructs like loops and functions, generations of programming languages, and basic computer hardware concepts. It consists of 45 multiple choice questions testing these core CS topics.
This document contains a quiz of 75 multiple choice questions related to computer awareness. The questions cover topics such as computer hardware, operating systems, software applications, networking, internet, security, and computer programming languages. The questions are multiple choice with one correct answer out of 5 options for each question. The questions progress from basic to more advanced computer concepts.
This document contains a quiz with questions about computer awareness and concepts. It includes 55 multiple choice questions covering topics like computer hardware, operating systems, software, networking, internet, security and more. The questions are part of a larger question bank for computer awareness that is provided on the website www.BankExamsToday.com.
Operating System Multiple Choice QuestionsShusil Baral
Here you can find 1000's of Multiple Choice Questions(MCQs) of Operating System(OS) includes the MCQs of fundamental of Operating System and core Operating System.
The document contains a 50 question practice test for the Computer Science & Applications paper-II exam. The questions cover topics like binary numbers, logic gates, algorithms, data structures, databases, operating systems and computer networks. The key answers are provided at the end with letters A through D corresponding to the multiple choice options for each question number from 1 to 50.
1)Today, the overwhelming world leader in microprocessor sales i.pdfisenbergwarne4100
1)
Today, the overwhelming world leader in microprocessor sales is:
A)
Intel.
B)
Microsoft.
C)
Motorola.
D)
Digital Equipment Corporation (DEC).
2)
Which of the following is not an example of a computer output device?
A)
Video display unit
B)
Scanner
C)
Magnetic tape unit
D)
Printer
3)
Which of the following is not an example of applications software?
A)
Spreadsheet packages
B)
Inventory record-keeping programs
C)
Word-processing software
D)
Operating systems software
4)
Which of the following describes a function of an operating system?
A)
Stores and retrieves data files
B)
Decides when to initiate a particular job from among those waiting in the input queue
C)
Controls the inflow and outflow of communications with various terminals and microcomputers
D)
All of the above
5)
Which of the following is an example of an open operating system?
A)
Linux
B)
Windows NT
C)
OS/400
D)
Windows XP
6)
A metalanguage standard for specifying a document markup language based on plain-text tags,
and used to facilitate data interchange among applications on the Web, is
A)
HTML
B)
JavaScript
C)
HTTP
D)
XML
7)
Which of the following is not an advantage of distributed and client/server systems?
A)
Data more readily available to users
B)
Increased service and responsiveness to local users
C)
Less dependence on telecommunications lines and media
D)
Reduced computing costs
8)
When data can be transmitted in both directions but not simultaneously, the transmission type is
referred to as:
A)
simplex.
B)
half-duplex.
C)
full-duplex.
D)
switched-line.
9)
A telecommunications network often includes physical media over which communication signals
are sent. All of the following are examples of physical media except:
A)
twisted pair wire.
B)
coaxial cable.
C)
fiber-optic cable.
D)
satellite.
10)
All of the following are characteristic of fiber-optic transmission, except:
A)
more secure than other transmission media.
B)
faster transmission than other transmission media.
C)
space requirements are more than other transmission media.
D)
more reliable than other transmission media.
11)
A method of operating a digital telecommunications network in which information is divided
into units of some fixed length that are then sent over the network separately, allowing the units
of data from various users to be interspersed with one another is called:
A)
bundling.
B)
time sharing.
C)
batching.
D)
packet switching.
12) The basic unit of a spreadsheet is a:
A) box
B) cube
C) cell
D) grid
13) Booting a computer means to:
A) restart the computer
B) run a program from the hard disk
C) start the computer
D) none of the above
14) The correct order from lowest to highest level of detail of the same program is:
A) assembly language, programming language, and binary
B) programming language, assembly language, and binary
C) binary, assembly language, and programming language
D) binary, programming language, and assembly language
15) Instruction sequences that repeat are called:
A) loops
B) assump.
The document contains a sample exam for probationary officers with 47 multiple choice questions testing knowledge of computer concepts. Some key topics covered include software suites, data warehouses, file servers, security risks, point-of-sale terminals, the OSI model, operating systems, networks, data mining, URLs, databases, transaction processing, proxies, data inconsistency, programming languages, routers, data normalization, extranets, URLs, SQL, integrated circuits, primary keys, network architecture, cache memory, data dictionaries, GUIs, debugging, time bombs, Linux, backups, data hierarchy, the Internet, and menus.
This document contains a 50 question quiz on computer general awareness and concepts. The questions cover topics such as software suites, data warehouses, file servers, security risks, point-of-sale terminals, the OSI model, system software, embedded computers, operating systems, computer networks, data mining, URLs, database management systems, transaction processing, proxy servers, data inconsistency, programming languages, computer architectures, cache memory, data dictionaries, GUIs, documentation, broadband internet, malware, debugging, time bombs, Linux, backups, data hierarchy, the internet, menus, file names, authentication, and virus symptoms. The document provides multiple choice answers for each question.
The document discusses the organization and operation of computer systems at both the hardware and software level. It covers topics such as the central processing unit, instruction execution, pipelining, parallelism, memory hierarchies, storage devices, input/output, networking, and encoding of digital data. The document contains detailed diagrams and explanations of how different components of computer systems work individually and interact together.
This document contains a collection of multiple choice questions about computer fundamentals. There are 54 questions covering topics such as computer generations, components, memory, storage, operating systems, and applications. The questions are intended as a study guide or test for someone learning about basic computer concepts.
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
Nunit vs XUnit vs MSTest Differences Between These Unit Testing Frameworks.pdfflufftailshop
When it comes to unit testing in the .NET ecosystem, developers have a wide range of options available. Among the most popular choices are NUnit, XUnit, and MSTest. These unit testing frameworks provide essential tools and features to help ensure the quality and reliability of code. However, understanding the differences between these frameworks is crucial for selecting the most suitable one for your projects.
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Nordic Marketo Engage User Group_June 13_ 2024.pptx
11338 13634 July 07 (I)
1. Question Paper
Information Technology and Systems– I (MB231): July 2007
• Answer all questions.
• Each question carries one mark.
<
1. Which of the following technology was used in the First Generation computers? Answer
>
(a) Transistors
(b) Vacuum tubes
(c) ULSI technology
(d) Integrated circuits
(e) VLSI technology.
<
2. Which of the following statement(s) is/are true about RISC architecture? Answer
>
I. RISC microprocessors execute the instructions very fast.
II. RISC chips are cheaper to design and produce compared to CISC chips.
III. RISC uses more complex set of instructions when compared to CISC architecture.
(a) Only (I) above
(b) Only (II) above
(c) Only (III) above
(d) Both (I) and (II) above
(e) Both (II) and (III) above.
<
3. CRAY3, CRAYXMP, PARAM 9000, PARAM 10000 are the examples of Answer
>
(a) Analog computers
(b) Supercomputers
(c) Minicomputers
(d) Microcomputers
(e) Servers.
<
4. Which of the following generation computers are based on artificial intelligence and possess voice Answer
recognition capabilities? >
(a) First
(b) Second
(c) Third
(d) Fourth
(e) Fifth.
<
5. To improve the secondary cache performance, microprocessors are provided in plastic modules that Answer
contain a special type of secondary cache called as >
(a) Frontside cache
(b) Backside cache
(c) Upside cache
(d) Downside cache
(e) Middle cache.
<
6. Memory Buffer Register holds Answer
>
(a) The address of the active memory location
(b) Data on its way to and from memory
2. (c) The address of the next instruction to be executed
(d) Accumulated results and data to be accumulated
(e) An instruction while it is being executed.
<
7. Which of the following units will convert the input data into binary codes? Answer
>
(a) Input interfaces
(b) Transformation interfaces
(c) Output interfaces
(d) Internal processing interfaces
(e) Binary interfaces.
<
8. The significant advance in the evolution of computer systems was the invention of analytical engine. Answer
Who among the following invented analytical engine? >
(a) John Napier
(b) William Oughtred
(c) Pascal
(d) Charles Babbage
(e) Leibniz.
<
9. A major step forward in the evolution of computer systems is the invention of Punch cards. Who among Answer
the following developed the concept of Punch cards? >
(a) Charles Babbage
(b) Herman Hollerith
(c) John Napier
(d) Pascal
(e) Leibniz.
<
10. Which of the following is correct with respect to Access Speed? Answer
>
(a) RAM>Hard disk>CD-ROM> Cache memory
(b) RAM>Hard disk>Cache memory>CD-ROM
(c) Cache memory>Hard disk>RAM>CD-ROM
(d) Cache memory >CD-ROM>RAM>Hard disk
(e) Cache memory>RAM>Hard disk>CD-ROM.
<
11. 1 Giga byte is equal to Answer
>
(a) One million bytes
(b) One billion bytes
(c) Ten million bytes
(d) Ten billion bytes
(e) Ten kilo bytes.
<
12. In virtual memory, program instructions and data are divided into units of fixed size called Answer
>
(a) Pages
(b) Frames
(c) Segments
(d) Blocks
(e) Cells.
<
13. If the memory is full, the operating system starts storing copies of pages in a hard disk file called Answer
>
(a) Flat file
(b) Swap file
3. (c) Program file
(d) Text file
(e) Binary file.
<
14. Data is recorded on the disk in concentric circular bands called Answer
>
(a) Segments
(b) Clusters
(c) Sectors
(d) Tracks
(e) Blocks.
<
15. Which of the following signals are generated by input/output devices, which inform operating system Answer
that some action has taken place? >
(a) Device drivers
(b) Interrupts
(c) Pages
(d) Threads
(e) Informers.
<
16. Which of the following memory enables users to work with more memory than what is installed on the Answer
computer’s mother board? >
(a) Cache memory
(b) Virtual memory
(c) Secondary memory
(d) Read only memory
(e) Registers.
<
17. The most important feature(s) that are added in Netware 6.5 Operating System is/are Answer
>
(a) Netware directory services
(b) It has ability to convert any type of server into web server
(c) Centralized web management
(d) Virtual office application
(e) Both (c) and (d) above.
<
18. The most important feature added in Vista was Windows AERO. AERO is a visual style that stands Answer
for >
(a) Application, Enterprise, Reflective and Open
(b) Authentic, Enterprise, Reflective and Open
(c) Authentic, Energetic, Response and Open
(d) Authentic, Energetic, Reflective and Open
(e) Application, Energetic, Response and Open.
<
19. UNIX Operating System is widely used because Answer
>
I. It provides easy portability across systems.
II. The commands used in UNIX operating system are easy to learn.
III. It is multi-user and multi-tasking operating system.
(a) Only (I) above
(b) Only (III) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
4. <
20. In Disk Operating System, which of the following file handles the file and memory management? Answer
>
(a) COMMAND.SYS
(b) COMMAND.COM
(c) MSDOS.COM
(d) MSDOS.SYS
(e) IO.SYS.
<
21. In UNIX, which of the following commands is used to login securely to remote node? Answer
>
(a) sh nd
(b) ssh nd
(c) shh nd
(d) shs nd
(e) hss nd.
<
22. The user interface in Mac OS X is called Answer
>
(a) System
(b) Finder
(c) Aqua
(d) Parser
(e) Tee.
<
23. In Windows XP Operating System, what does XP stands for? Answer
>
(a) Expert
(b) Experience
(c) Exposure
(d) Experiment
(e) Exponent.
<
24. Which of the following statement(s) is/are true? Answer
>
I. Objective information is known as opinions.
II. Subjective information is known as facts.
III. Objective information is unique and true in nature.
(a) Only (III) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
<
25. Which of the following statement(s) is/are false about information? Answer
>
I. Secondary information is usually collected from internal sources.
II. Primary information is less reliable and not always accurate.
III. Secondary information is easier and cheaper to collect.
(a) Only (II) above
(b) Only (III) above
(c) Both (I) and (II) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
<
26. Which of the following information is used for understanding the perceptions and interpretations of Answer
individuals and situations? >
(a) Knowledge information
5. (b) Aggregated information
(c) Objective information
(d) Qualitative information
(e) Informal information.
<
27. Which of the following types of information provides details about all entities in a group? Answer
>
(a) Detailed information
(b) Aggregated information
(c) Sampled information
(d) Summarized information
(e) Informal information.
<
28. Which of the following devices convert digital signals from input/output devices into appropriate Answer
frequencies at a transmission terminal and convert them back into digital signals at a receiving terminal? >
(a) Modems
(b) Multiplexers
(c) Routers
(d) Hubs
(e) Gateways.
<
29. Which of the following parameters of quality refers to the information which is free from errors and Answer
bias? >
(a) Age
(b) Validity
(c) Impartiality
(d) Consistency
(e) Reliability.
<
30. Errors are not always deliberate and therefore certain measures can be taken to minimize them. So Answer
which of the following measures are used to reduce the uncertainty of information? >
I. Internal controls.
II. Additional parameters that state the level of confidence with regard to the accuracy of
information.
III. Instructions pertaining to measurement and processing of information.
IV. Internal audit and external audit.
(a) Both (I) and (II) above
(b) Both (I) and (III) above
(c) Both (I) and (IV) above
(d) Both (II) and (III) above
(e) Both (II) and (IV) above.
<
31. Which of the following is basically a feature or a characteristic that is shared among a group of items, Answer
ideas or entities? >
(a) Procedure
(b) Process
(c) Principle
(d) Concept
(e) Piping.
<
32. Hyper Text Markup Language (HTML) is Answer
>
I. A script in which documents in the World Wide Web are formatted.
II. A script that supports links to other documents as well as graphics, audio and video files.
6. III. A protocol for transferring files over the Internet.
(a) Only (I) above
(b) Only (II) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) All (I), (II) and (III) above.
<
33. Acronym for IMAP is Answer
>
(a) Internet Message Access Protocol
(b) International Message Access Protocol
(c) Internet Mail Administration Protocol
(d) International Mail Administration Protocol
(e) International Multi-user Access Protocol.
<
34. ICQ is a popular Answer
>
(a) File transfer protocol
(b) Internet paging program
(c) Internet faxing program
(d) Internet telephony program
(e) Mail transfer protocol.
<
35. Data conferencing is an interactive way of sharing information among users located at different Answer
locations over a network of computers. Application sharing is a term used in data conferencing which >
I. Allows two or more participants to interact with each other by working on a single application that
is loaded onto the computer system of one of the participants.
II. Facilitates sharing the same computer screen by all participants.
III. Has similarities with remote control software.
(a) Only (I) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
<
36. Which of the following is/are project management groupware? Answer
>
(a) Lotus Notes
(b) Lotus Organizer
(c) Netscape Collabra
(d) Both (a) and (c) above
(e) Both (b) and (c) above.
<
37. Which of the following Enterprise Communication tools is a collection of user-submitted notes or Answer
messages on various subjects that are posted to servers on a world wide network? >
(a) Internet Paging
(b) Internet Fax
(c) Internet Telephony
(d) Internet Relay Chat
(e) Usenet.
<
38. Which of the following are examples of vertical applications? Answer
>
I. Word processing software.
II. Bill generation software.
III. Accounting software.
7. IV. Spreadsheet software.
(a) Both (I) and (II) above
(b) Both (I) and (III) above
(c) Both (I) and (IV) above
(d) Both (II) and (III) above
(e) Both (II) and (IV) above.
<
39. Which of the following features of word processing software enables the user to automatically move to Answer
a next line? >
(a) Word wrapping
(b) Word alignment
(c) Word justification
(d) Word count
(e) Auto format.
<
40. In MS Excel, each worksheet has Answer
>
(a) 128 columns, 32,238 rows
(b) 228 columns, 32,238 rows
(c) 256 columns, 65,536 rows
(d) 225 columns, 65,536 rows
(e) 128 columns, 65,536 rows.
<
41. In MS Excel, which of the following short cut keys are used if the user wants to move between Answer
worksheets? >
(a) SHIFT+ PgUp and SHIFT + PgDn
(b) ALT+ PgUp and ALT+ PgDn
(c) CTRL+ PgUp and CTRL+ PgDn
(d) SHIFT+ Home and SHIFT + End
(e) ALT+ Home and ALT+ End.
<
42. In MS-Excel, Which of the following statement(s) is/are false about replication? Answer
>
I. Replication is copying the formula and applying to the range of cells by dragging the mouse and
selecting the cells.
II. Replication saves time.
III. Replication increases redundancy.
(a) Only (I) above
(b) Only (II) above
(c) Only (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
<
43. In a worksheet, the cell (intersection of a row and column) which is currently being used is called as Answer
a/an >
(a) Starting cell
(b) Passive cell
(c) Active cell
(d) Relative cell
(e) Common cell.
<
44. Users have many options to format cells in a worksheet. Which of the following tab allows the user to Answer
add color to the selected cells and change the background style? >
8. (a) Alignment tab
(b) Border tab
(c) Protection tab
(d) Pattern tab
(e) Color tab.
<
45. In character formatting, emphasis includes Answer
>
I. Marking the text bold.
II. Underlining the text.
III. Setting the size of the font.
IV. Changing the style of the font.
V. Italicizing the text.
(a) Both (I) and (II) above
(b) (I), (II) and (III) above
(c) (I), (II) and (IV) above
(d) (I), (II) and (V) above
(e) All (I), (II), (III), (IV) and (V) above.
<
46. Which of the following options is not present on the menu bar of MS-Excel workbook? Answer
>
(a) View
(b) Insert
(c) Data
(d) Tools
(e) Table.
<
47. Which of the following is not a data type in MS-Excel? Answer
>
(a) Text
(b) Number
(c) Logical
(d) Error
(e) Character.
<
48. In MS-Excel, if a formatted number does not fit into a cell, which of the following symbol is Answer
displayed? >
(a) *
(b) #
(c) &
(d) $
(e) @.
<
49. In MS-Excel, To consider a number as text, which of the following symbol is used? Answer
>
(a) Quotation
(b) Ampersand
(c) Asterisk
(d) Dollar
(e) Apostrophe.
<
50. In MS-Excel, Which of the following is correct with respect to operators and their order of priority? Answer
>
(a) * and /, %, + and - , &, ^
(b) %, ^, * and /, + and - , &
(c) * and /, %, + and -, ^, &
(d) %, &, * and /, ^, + and -
9. (e) %, + and - , * and /, &.
<
51. In MS-Excel, there are different categories of functions like Financial function, Text function, Logical Answer
function etc and there are various functions in each category. Which of the following mentioned pairs >
of are not correct?
Function Category
I. NOW Date & Time
II. FACT Statistical
III. NA Text
IV. SUBSTITUTE Logical
V. AND Text
VI. ISLOGICAL Information Function
(a) (I), (II) and (III) above
(b) (II), (III) and (IV) above
(c) (I), (II), (III) and (V) above
(d) (II), (III), (IV) and (V) above
(e) (I), (II), (III) and (VI) above.
<
52. The Solver tool in MS Excel generates three reports viz Answer, Sensitivity and Limits reports. Which Answer
of the following mentioned values is not a part of Answer report? >
(a) Original value
(b) Final value
(c) Value for the input
(d) Implicit value
(e) Values for the constraints.
<
53. The effect of Strategic, Tactical and Operational decisions for management, with respect to the time Answer
frame can be represented as >
(a) >3years, 1-3 years, <1year
(b) >1year, >2years, >3years
(c) <1year, <2years, <3years
(d) 1-3 years, >3years, <1year
(e) <1year, 1-3years, >3years.
<
54. Meter-reading card given by the electricity department is a Answer
>
(a) Information Document
(b) Action Document
(c) Edit Report
(d) Turnaround Document
(e) Computing Document.
<
55. Which of the following provide details of errors that have been detected during processing? Answer
>
(a) Information Document
(b) Action Document
(c) Edit Report
(d) Turnaround Document
(e) Computing Document.
<
56. In an organization, which of the following data is/are not processed while taking operational Answer
decisions? >
10. (a) Attendance
(b) Daily cash flows
(c) Sales figures
(d) Vendor rating
(e) Both (b) and (d) above.
<
57. Which of the following explains the main purpose of a personnel record-keeping system? Answer
>
(a) Analyzing range and distribution of employee compensation and comparing it with industry
standards and other economic indicators
(b) Forecasting of the number of personnel required for each job category
(c) Planning and monitoring of induction of new employees
(d) Keeping track of additions, deletions and any other changes to records in the personnel database
(e) Establishing a relationship between the employees.
<
58. Data can be processed in a batch mode depending upon Answer
>
I. Market conditions.
II. Volume of transactions.
III. Employee productivity.
(a) Only (I) above
(b) Only (II) above
(c) Only (III) above
(d) Both (I) and (II) above
(e) Both (II) and (III) above.
<
59. Which of the following is not a characteristic of MIS (Management Information Systems)? Answer
>
(a) Common data flow
(b) Planning element
(c) Common database
(d) Drilling
(e) Flexibility.
<
60. Which of the following types of Decision Support System rely on comparative analysis, application of Answer
formula and use of algorithm? >
(a) Status inquiry systems
(b) Data analysis systems
(c) Information analysis systems
(d) Accounting systems
(e) Design systems.
<
61. Which of the following is an example of Status inquiry systems (a type of Decision Support Systems)? Answer
>
(a) Cash flow analysis
(b) Funds flow analysis
(c) Railway reservation systems
(d) Sales analysis report
(e) Market analysis report.
<
62. In which of the following analytical modeling, target is not fixed and target needs to be arrived at after Answer
taking into consideration the constraints involved in achieving the targets? >
(a) What-if-analysis
(b) Optimization analysis
(c) Goal seek analysis
(d) Sensitivity analysis
11. (e) Data analysis.
<
63. In which of the following analytical modeling, target is fixed and changes are made to the related Answer
variable so that the target is achieved? >
(a) What-if-analysis
(b) Optimization analysis
(c) Goal seek analysis
(d) Sensitivity analysis
(e) Data analysis.
<
64. If the finance manager is provided with information on customers who exceeded their credit limits only, Answer
such report is termed as >
(a) Exception report
(b) Periodic scheduled report
(c) Demand report and response
(d) Edit report
(e) Push report.
<
65. Which of the following refers to radically changing the design of business processes to improve Answer
performance and efficiency of the organization? >
(a) Business Improvement
(b) Business Process Manufacturing
(c) Business Process Re-engineering
(d) Business Process Production
(e) Enterprise Resource Planning.
<
66. What is Artificial intelligence? Answer
>
(a) Putting your intelligence into computer
(b) Programming with your own intelligence
(c) Making a machine intelligent
(d) Playing a game
(e) Putting more memory into computer.
<
67. In OLAP, slicing and dicing refer to Answer
>
(a) The process of breaking up data into smaller dimensions to facilitate analysis
(b) The process of representing data in tabular form for analysis
(c) The process of representing data into graphs for analysis
(d) The process of changing the dimension of analysis to suit the analysts’ requirements
(e) The process of changing the dimension of analysis into fixed format for analysis.
<
68. Which of the following systems require the use of special sensing devices to measure physical Answer
phenomena such as temperature, pressure etc.? >
(a) Computer-Aided Design
(b) Computer-Aided Manufacturing
(c) Manufacturing Resource Planning
(d) Materials Requirement Planning
(e) Process Control System.
<
69. Mr. Sudhakar, a software engineer, working for Vision IT Solutions, was asked by the team leader to Answer
explain the details of the new project using a flowchart. He has drawn separate flow charts for each >
program. So what type of symbol is useful for him in connecting those flow charts?
12. (a) Parallelogram Shaped Symbol
(b) An On page Connector Symbol
(c) Predefined Process Symbol
(d) An Off Page Connector Symbol
(e) Annotation Shaped Symbol.
<
70. Which of the following is not an advantage of a flow chart? Answer
>
(a) It is easier for a programmer to explain the logic of a program to others
(b) It acts as a road map for the programmers to write the concerned program
(c) While executing a program if a bug is detected, it is easy to find out the reason by going through
the logic of a program in the flow chart form
(d) There are no standards determining the amount of detail that should be included in a flow chart
(e) A macro flowchart acts as a system model that can be broken down into detailed parts for study
and further analysis of the system.
<
71. Which of the following statements is false regarding Pseudocode? Answer
>
(a) Converting a pseudocode to a programming language is much easier when compared to
converting a flowchart or a decision table
(b) Less time and effort are required to write a pseudocode than for drawing a flowchart
(c) It is easier to modify the pseudocode of a program logic when program modifications are
necessary
(d) There are no standard rules to follow while using a pseudocode
(e) For a beginner, it is easier to follow the logic of a pseudocode, as compared to flow chart.
<
72. Which of the following is the correct order of program development lifecycle? Answer
>
(a) Defining the problem, formalizing the solution, coding, designing, testing and debugging,
maintaining the program
(b) Defining the problem, coding, designing, testing and debugging, formalizing the solution,
maintaining the program
(c) Defining the problem, formalizing the solution, designing, coding, testing and debugging,
maintaining the program
(d) Defining the problem, designing, coding, testing and debugging, formalizing the solution,
maintaining the program
(e) Defining the problem, coding, testing and debugging, formalizing the solution, designing,
maintaining the program.
<
73. Which of the following charts are useful for Mr.Sudhakar, if he wants to compare the population of Answer
Hyderabad with the population of Andhra Pradesh? >
(a) Column charts
(b) Bar charts
(c) Line charts
(d) Pie charts
(e) Gantt charts.
<
74. In programming language, ‘Switch’ statement is used to Answer
>
(a) Transfer control on the basis of certain conditions
(b) Check the conditions within another condition
(c) Specify operations based on certain conditions
(d) Check multiple values of variables
(e) Execute the loop at least once.
<
75. Which of the following is the most successful Rapid Application Development tool for Microsoft Answer
Windows application? >
13. (a) VB
(b) JAVA
(c) C++
(d) C
(e) ADA.
<
76. Which of the following is/are example(s) of fourth generation languages? Answer
>
(a) FOCUS
(b) Prolog
(c) NATURAL
(d) Both (a) and (b) above
(e) Both (a) and (c) above.
<
77. Which of the following statement(s) is/are false regarding application generators? Answer
I. Application generators are higher level languages designed to facilitate development of a >
complete application.
II. These languages are usually built around database management systems.
III. Application generators are difficult to use than other high-level programming languages such as
C++.
IV. Application generators usually increase the time required for programming and testing.
(a) Only (III) above
(b) Only (IV) above
(c) Both (I) and (III) above
(d) Both (II) and (IV) above
(e) Both (III) and (IV) above.
<
78. In Java, which of the following provides a layer of abstraction between the compiled program and the Answer
underlying hardware platform and operating system? >
(a) Compiler
(b) Interpreter
(c) Class loader
(d) JVM
(e) Assembler.
<
79. Which of the following refers to the process by which one object acquires the general properties such Answer
as the conditions and actions of other objects? >
(a) Encapsulation
(b) Abstraction
(c) Polymorphism
(d) Inheritance
(e) Class.
<
80. In object-oriented programming, the process of binding data and functions in a single unit is called Answer
>
(a) Encapsulation
(b) Abstraction
(c) Polymorphism
(d) Inheritance
(e) Exception-handling.
<
81. In a flow chart, which of the following symbol represents programming logic that is defined Answer
elsewhere? >
(a)
14. (b)
(c)
(d)
(e)
.
<
82. Which of the following computers was the first electronic computer developed at the Moore School of Answer
engineering? >
(a) ENIAC
(b) UNIVAC
(c) EDVAC
(d) EDSAC
(e) ENAIC.
<
83 The Overall Design of the database is called as Answer
>
(a) Instance
(b) Schema
(c) View
(d) Model
(e) Design.
<
84. Which of the following refers to the actual number of associated instances for each of the two entities? Answer
>
(a) Instance
(b) Connectivity
(c) Schema
(d) Entity
(e) Cardinality.
<
85. Which of the following term in a Relational model is known as Entity instance in E-R model? Answer
>
(a) Key
(b) Entity
(c) Tuple
(d) Table
(e) Data.
<
86. Which of the following statement(s) is/are false about primary key? Answer
>
I. All primary key entries are unique.
II. The primary key may be null.
III. The primary key is not required for all tables.
(a) Only (I) above
(b) Only (II) above
(c) Both (I) and (II) above
(d) Both (I) and (III) above
(e) Both (II) and (III) above.
15. <
87. Answer
Customer ID Customer Salesperson Zone >
653 James Sally South
256 Jewel Tom North
152 Harry Sally South
569 Helen Jack West
972 Scott Howard East
Which of the following statement(s) is/ are correct based on the above relation?
I. It is in First Normal Form.
II. It is not in Third Normal Form.
III. There is a partial dependency in the above relation.
(a) Only (I) above
(b) Both (I) and (II) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
<
88. A functional dependency between two or more non-key attributes is called Answer
>
(a) Partial functional dependency
(b) Partial non-key dependency
(c) Transitive dependency
(d) Partial transitive dependency
(e) Trivial dependency.
<
89. What does the following SQL statement do? Answer
>
Select salesperson from salesdetails where state = ‘RJ’
(a) Selects all the fields from the salesdetails table for each row with a state ‘RJ’
(b) Selects the salesperson field from the salesdetails table for each row with a state ‘RJ’
(c) Selects fields with a salesdetails from the salesdetails table
(d) Selects all the fields from the salesdetails table for each row with a state labeled quot;salesdetailsquot;
(e) Counts all records and displays the value.
<
90. The relationship between DEPARTMENT and EMPLOYEE is a Answer
>
(a) One-to-one relationship
(b) One-to-many relationship
(c) Many-to-many relationship
(d) Many-to-one relationship
(e) Symmetric relationship.
<
91. The first network model developed by GE in the mid-1960s was called Answer
>
(a) Integrated Data Store (IDS)
(b) Integrated Data View (IDV)
(c) Integrated Information Store (IIS)
(d) Integrated Data Content (IDC)
(e) Integrated Data Machine (IDM).
<
92. Which of the following model(s) comes under physical Data model? Answer
>
I. Entity-relationship model.
II. Unifying model.
III. Frame memory model.
16. (a) Only (I) above
(b) Only (III) above
(c) Both (I) and (III) above
(d) Both (II) and (III) above
(e) All (I), (II) and (III) above.
<
93. Which of the file organization is used when rapid access is required and fixed length records are used? Answer
>
(a) Pile File Organization
(b) Sequential File Organization
(c) Index Sequential File Organization
(d) Indexed File Organization
(e) Hashed File Organization.
<
94. In which of the file organization exhaustive search is required to access the records? Answer
>
(a) Pile File Organization
(b) Sequential File Organization
(c) Index Sequential File Organization
(d) Indexed File Organization
(e) Hashed File Organization.
<
95. Which of the following refers to the storage of data in such a way that it is not affected by modification Answer
in data structure or changes in the application program? >
(a) Data Integrity
(b) Data Independence
(c) Data Redundancy
(d) Data Inconsistency
(e) Data Security.
<
96. Vishal Datamind, a business organization maintaining a lot of “operational data” like Product data, Answer
Account data, Payroll data for their customers. One day due to hardware problems the total data in the >
database is lost. So who is responsible for back up and recovery of a database?
(a) Application programmers
(b) End users
(c) System analyst
(d) Database administrators
(e) Network administrators.
<
97. In Database Management System, an example of logical level abstraction is/are Answer
>
I. Machine level programming.
II. Programming logic.
III. Application used by the end users.
(a) Only (I) above
(b) Only (II) above
(c) Only (III) above
(d) Both (I) and (II) above
(e) All (I), (II) and (III) above.
<
98. Suppose if we want to keep extra information about a telephone such as its location, or its type (like Answer
mobile, video-phone or who all shares the telephone) we have to model the telephone as a >
(a) Entity
(b) Attribute
(c) Instance
17. (d) Schema
(e) Constraint.
<
99. The structure of the hierarchical database is Answer
>
(a) A tree
(b) A graph
(c) A table
(d) A grid
(e) A list.
<
100.Which of the following applications of object-oriented data model stores data required by software Answer
developers pertaining to source code, dependencies among software modules , definitions and uses of >
variables?
(a) Computer Aided Design Database
(b) Computer-Aided Software Engineering Database
(c) Office Information System
(d) Multimedia Database
(e) Hypertext Database.
18. Suggested Answers
Information Technology and Systems– I (MB231): July 2007
1. Answer : (b) < TOP >
Reason : The technology used in the first generation computers is Vacuum tubes. So option (b) is
the answer.
2. Answer : (d) < TOP >
Reason : The differences between RISC and CISC are RISC microprocessors execute the
instructions very fast and RISC chips are cheaper to design and produce compared to
CISC chips. The third option is false because RISC uses less complex set of instructions
when compared to CISC architecture So option (d) is the answer.
3. Answer : (b) < TOP >
Reason: CRAY3, CRAYXMP, PARAM 9000, PARAM 10000 are the examples of Super
computers. So option (b) is the answer.
4. Answer : (e) < TOP >
Reason : Fifth generation computers are based on artificial intelligence and possess voice
recognition capabilities. So option (e) is the answer.
5. Answer : (b) < TOP >
Reason : To improve the secondary cache performance, microprocessors are provided in plastic
modules that contain a special type of secondary cache is called backside cache. So option
(b) is the answer.
6. Answer : (b) < TOP >
Reason : Memory Buffer Register holds data on its way to and from memory. So option (b) is the
answer.
7. Answer : (a) < TOP >
Reason : All computers performs four basic operations called the IPOS cycle. The internal
architectural design of computers may differ from one system to another. But, the basic
organization remains the same for all computer systems. Input devices provide a computer
with data that are transformed into binary codes.
(a) This transaction is done by input interfaces
(b) Not relevant
(c) Output interfaces accomplish the task of converting the binary code, which is
produced by the computer, into human readable form
(d) Not relevant
(e) Not relevant.
So option (a) is answer.
8. Answer : (d) < TOP >
Reason : In 1842, Charles Babbage invented the analytical engine that was intended to be
completely automatic. John Napier invented the logarithm. William Oughtred invented
rectibinear and Circula slide rules. Pascal invented mechanical adding machine. Leibniz
invented a device which can multiply,divide and find square root. So option (d) is answer.
9. Answer : (b) < TOP >
Reason : Herman Hollerith Invented Punch Cards in 1890 and with this invention of Punch Cards,
the calculating machines became fully automatic. Charles Babbage invented analytical
engine, John Napier invented logarithm, Pascal invented mechanical adding machine and
Leibniz invented a device which can multiply, divide and find square root. So option (b) is
answer.
10. Answer : (e) < TOP >
Reason : Cache memory>RAM>Hard disk>CD-ROM. The access speed for cache is very fast, the
access speed for RAM is fast, the access speed for hard disk is medium, and the access
speed for CD-ROM is slow. So option (e) is correct answer.
11. < TOP >
Answer : (b)
19. Reason : 1 Giga byte is equal to one billion bytes. So option (b) is answer.
12. Answer : (a) < TOP >
Reason : In virtual memory, program instructions and data are divided into units of fixed size
called pages. So option (a) is the answer.
13. Answer : (b) < TOP >
Reason : If the memory is full, the operating system starts storing copies of pages in a hard disk file
called Swap file. So option (b) is the answer.
14. Answer : (d) < TOP >
Reason : Data is recoded on the disk in concentric circular bands called tracks. So option (d) is the
answer.
15. Answer : (b) < TOP >
Reason : Controlling input/output processes involves tasks associated with input and output
devices.
(a) Device drivers contain specific information about a particular brand and model.
(b) Interrupts are the signals that inform the operating system that some activity has
taken place.
(c) In virtual memory, program, instructions and data are divided into units of fixed
size, called pages.
(d) Not relevant
(e) Not relevant.
So option (b) is answer.
16. Answer : (b) < TOP >
Reason : Virtual memory enables users to work with more memory that what is installed on the
computer’s motherboard. So option (b) is answer.
17. Answer : (e) < TOP >
Reason : The most important feature that Netware 4.1 provides is Netware directory services
which supports a network of servers where users can log in once and access the resources
of any server depending on their access rights. Netware 5.1 is the ability to convert any
type of server into web server. Novell has added new features in Netware 6.5 like
Centralized web management, Virtual office application. Hence option (e) is answer.
18. < TOP >
Answer : (d)
Reason : The most important feature added in Vista was Windows AERO. AERO is a visual style
that stands for Authentic, Energetic, Reflective and Open. So option (d) is answer.
19. Answer : (c) < TOP >
Reason : UNIX Operating System is widely used because:
I. It provides easy portability across systems.
III. It is multi-user and multi-tasking Operating System.
So option (c) is answer.
20. Answer : (d) < TOP >
Reason : ‘MSDOS.SYS’ file handles file and memory management. So option (d) is answer.
21. Answer : (b) < TOP >
Reason : In UNIX ‘ssh nd’ command is used to login securely to remote node. So option (b) is
answer.
22. Answer : (c) < TOP >
Reason : The user interface in Mac OS X is called ‘Aqua’. So option (c) is answer.
23. Answer : (b) < TOP >
Reason : In Windows XP Operating System, XP stands for Experience. So option (b) is answer.
24. < TOP >
Answer : (a)
Reason : Objective information is also known as facts and Subjective information is also known as
opinions and Objective information is unique and true in nature. So option (a) is answer.
20. 25. < TOP >
Answer : (c)
Reason : Primary information is usually collected from internal sources. Secondary information is
usually collected from external sources like the television, radio and Internet. Secondary
information is less reliable and not always accurate. Secondary information is easier and
cheaper to collect. So option (c) is answer.
26. < TOP >
Answer : (d)
Reason : Qualitative information refers to information gathered through personal, direct and open-
ended methods. Methods like personal interviews, observation, focus groups, case studies,
etc., are used to gather such information. The quality of the information is enhanced by
adding individual experiences. For instance, user interviews can be taken to understand
how user-friendly particular software is. So option (d) is answer.
27. < TOP >
Answer : (b)
Reason : Aggregated information provides details about all entities in a group where as Detailed
information provides information of only a particular entity in a group. So option (b) is
answer.
28. Answer : (a) < TOP >
Reason : A modem is a device that converts digital signals from input/output devices into
appropriate frequencies at a transmission terminal and converts them back into digital
signals at a recurring terminal. A multiplexer merges the transmissions of several
terminals at one end of a communications channel, while a similar unit separates the
individual transmissions at the receiving end. A router interconnects networks based on
different rules or protocols, so that the message can be routed to its destination. Hubs
provide automatic switching among connections called ports for shared access to a
network resource. Gateways interconnect the networks that use different communication
architectures. So option (a) is the answer.
29. < TOP >
Answer : (c)
Reason : Impartiality refers to the information which is free from errors and bias. So option (c) is
answer.
30. < TOP >
Answer : (c)
Reason : Errors are not always deliberate and therefore certain measures can be taken to minimize
them. Some of the measures to overcome errors are:
• internal controls
• internal audit and external audit
• additional parameters that state the level of confidence with regard to the accuracy
of information
• instructions pertaining to measurement and processing of information
The first two measures can be used to reduce the uncertainty of information while the last
two ascertain the credibility of the information.
So option (c) is answer.
31. < TOP >
Answer : (d)
Reason : Concept is basically a feature or a characteristic that is shared among a group of items,
ideas or entities. So option (d) is answer.
32. Answer : (c) < TOP >
Reason : The World Wide Web is a system of Internet servers that support specially formatted
documents. Documents are formatted in a script called Hyper Text Markup Language
(HTML) that supports links to other documents, as well as graphics, audio and video files.
FTP is a protocol is used for transferring files over the internet. HTML is not a protocol.
So option (c) is answer.
33. Answer : (a) < TOP >
Reason : IMAP is an acronym for Internet Message Access Protocol. It is like a remote file server
that allows users to retain mail on the server and organize them in folders. So option (a) is
21. answer.
34. Answer : (b) < TOP >
Reason : Internet paging runs on the background of the user’s computer screen, allowing him or
her to know when friends or colleagues (registered ones) are online. It is also known as
buddy list software. ICQ is a popular Internet paging program. ICQ stands for ‘I Seek
You’. So option (b) is answer.
35. Answer : (e) < TOP >
Reason : Data conferencing is an interactive way of sharing information among users at different
locations over a network of computers. Application sharing and application viewing are
two terms used in data conferencing. Application sharing is similar to remote control
software. It facilitates sharing of the same computer screen by all participants. So option
(e) is answer.
36. Answer : (b) < TOP >
Reason : Project management groupware helps project teams work together and keep track of
deadlines. Microsoft Project, Lotus Organizer and CA-Super Project are examples of
project management groupware. These tools not only produce project schedules and
program reports, but also send automatic reminders of due dates for project tasks.
Netscape Collabra, Lotus notes are groupware application used for discussion forums. So
option (b) is answer.
37. Answer : (e) < TOP >
Reason : Usenet is a collection of user-submitted notes or messages on various subjects that are
posted to servers on a world wide network.
Option (a) is incorrect. Internet Paging, also known as “Buddy List” software, runs on
the background of the user's computer, letting him/her know when his friends or
coworkers (only those who are registered) are online. So, it is not applicable here.
Option (b) is incorrect. Internet Fax is the mechanism of sending faxes through computers
connected over the Internet. So, it is not applicable here.
Option (c) is incorrect. Internet Telephony is the mechanism of carrying out telephonic
conversations over the Internet. So, it is not applicable here.
Option (d) is incorrect. Internet Relay Chat is an Internet service that enables a user to
join chat groups, called channels, and get into real-time text-based conversations. So, it is
not applicable here.
Hence, from above discussion, we can infer that option (e) is correct.
So option (e) is answer.
38. Answer : (d) < TOP >
Reason : Vertical applications are those that cater to the needs of a particular business function.
They are used to automate the operations of a particular business function. Vertical
applications cater only to the specific function in an organization and therefore, special
programmers or operators are required to carry out these applications. Examples of
vertical applications are accounting software and bill generation software. Horizontal
applications are general-purpose programs that can be used for writing, carrying out
numerical calculations, and data storage. Personal productivity software is a popular
horizontal application that includes word processing, spreadsheets, and special programs
for storing addresses, preparing schedules, etc.
So option (d) is answer.
39. Answer : (a) < TOP >
Reason : Word wrapping enables the word processing application software to begin a new line and
automatically move words to the next line for justification purposes.
So, from above discussion, we can infer that option (a) is correct.
Options (b), (c), (d) and (e) are all incorrect as they are not the correct terminologies. So
option (a) is the answer.
40. Answer : (c) < TOP >
Reason : In MS Excel, each worksheet has 256 columns, 65,536 rows. So option ( c) is answer.
41. < TOP >
Answer : (c)
22. Reason : Users may work on more than one sheet simultaneously. A user can click on the sheet tab
to switch from one sheet to another. Users can also use CTRL+PgUp and CTRL+PgDn to
move between worksheets. So option (c) is answer.
42. Answer : (c) < TOP >
Reason : Replication is copying the formula and applying to the range of cells by dragging the
mouse and selecting the cells. Replication saves time. But Replication eliminates
redundancy.
So option (c) is the answer.
43. Answer : (c) < TOP >
Reason : In a worksheet, the cell (intersection of a row and column) currently being used is called
Active cell. So option (c) is the answer.
44. Answer : (d) < TOP >
Reason : Users have many options to format cells in a worksheet. Pattern tab allows the user to
add color to the selected cells and change the background style. So option (d) is answer.
45. < TOP >
Answer : (d)
Reason : Character formatting emphasis includes Marking the text bold, Underlining the text,
Italicizing the text. So option ( d) is answer.
46. < TOP >
Answer : (e)
Reason : View, Insert, Data, Tools are options present in MS-Exel. Table option is not present on
the menu bar. So option ( e) is answer.
47. Answer : (e) < TOP >
Reason : Character is not a data type in MS-Excel. So option (e) is answer.
48. Answer : (b) < TOP >
Reason : # symbol is displayed in MS-Excel, if a formatted number does not fit into a cell. So
option (b) is answer.
49. Answer : (e) < TOP >
Reason : In MS-Excel, To consider a number as text, Apostrophe symbol is used. So option (e) is
answer.
50. Answer : (b) < TOP >
Reason : %, ^, * and /, + and -, & is the correct order of operator precedence. So option ( b) is
answer.
51. Answer : (d) < TOP >
Reason : In the given sequence only pair (I) and (VI) are correct. Remaining all are incorrect.
I. NOW is a date and time function.
II. FACT is not statistical function, it is infact a mathematical and trigonometric
function.
III. NA is not Text function, it is infact a Information function.
IV. SUBSTITUTE is not Logical function, it is Text function
V. AND is not Text function , it is Logical function
VI. ISLOGICAL is a Information Function.
So option (d) is answer.
52. Answer : (d) < TOP >
Reason : Implicit value is not part of Answer report. It is a part of sensitivity report. So option (d)
is answer.
53. Answer : (a) < TOP >
Reason : The effect of decisions for Strategic, Tactical and Operational, with respect to the time
frame, can be represented as >3years, 1-3 years, <1year. So option (a) is the answer.
54. Answer : (d) < TOP >
Reason : (a) Information documents serve as confirmation or proof to their recipients that certain
transactions have occurred.
23. (b) Action documents are documents that cause the recipients to initiate some action.
(c) Edit reports provide details of errors that have been detected during processing.
Missing data, invalid account numbers, etc. are presented in edit reports.
(d) These documents are designed first to initiate some action and then are returned for
further processing so as to complete the transaction.
Meter-reading card given by the electricity department is a Turnaround Document. This
card is first issued by the electricity department with the customer details. The new
reading is entered on the document when the meter is inspected by a person belonging to
the department. This card is again given to the electricity billing department for the
purpose of calculation of the electricity bill.
(e) Not relevant.
From above discussion, we can say option (d) is answer.
55. Answer : (c) < TOP >
Reason : (a) Information documents serve as confirmation or proof to their recipients that certain
transactions have occurred.
(b) Action documents are documents that cause the recipients to initiate some action.
(c) Edit reports provide details of errors that have been detected during processing.
Missing data, invalid account numbers, etc. are presented in edit reports.
(d) These documents are designed first to initiate some action and then are returned for
further processing so as to complete the transaction.
(e) Not relevant.
So option (c) is answer.
56. Answer : (d) < TOP >
Reason : Operational decisions involve large-scale processing of internal data like attendance, daily
cash flows, sales figures, etc. Accuracy and speed are two important aspects considered
while making operational decisions. Data pertaining to market competition would be
processed for taking strategic decisions. Vendor rating is an example of decisions taken at
the tactical level. So option (d) is answer.
57. Answer : (d) < TOP >
Reason : A personnel record-keeping system keeps track of additions, deletions and other changes
to records in the personnel database. Remaining all options are not relevant. So option (d)
is answer.
58. Answer : (b) < TOP >
Reason : In batch processing, the information that is gathered is stored but is not processed
instantly. This type of transaction processing involves accumulation of transactions until a
certain set of criteria are satisfied – such as time period (say monthly, quarterly) or
quantity (based on the volume of transactions). So option (b) is an answer.
59. Answer : (d) < TOP >
Reason : Drilling is not a characteristic of MIS. Remaining all others are characteristics of MIS
(Management Information Systems). So option (d) is the answer.
60. Answer : (b) < TOP >
Reason : Data analysis systems, a type of DSS (Decision Support Systems) are developed using
simple data processing tools and business rules. These systems rely on comparative
analysis, application of formula and use of algorithm. So option (b) is the answer.
61. Answer : (c) < TOP >
Reason : Example of Status inquiry systems (a type of Decision Support Systems) is Railway
reservation systems. So option (c) is the answer.
62. Answer : (b) < TOP >
Reason : (a)End users can make use of what-if analysis to make changes in variable or relationship
amongst variables and observe the changes. What-if analysis is used for analyzing the
various possibilities and deriving an appropriate strategy for each situation.
24. (d) Sensitivity analysis can be considered as a type of what-if-analysis in which the effect
of repeated change in a single variable is examined. This type of analysis is useful when
the user is not sure about the value of a key variable.
(c) Goal seek analysis is the reverse of what-if-analysis. In goal-seek analysis, the target is
fixed and changes are made to the related variable so that the target is achieved.
(b) Optimization analysis is complex extension of goal seek analysis. In optimization
analysis, the target is not fixed. Rather, the target needs to be arrived at after taking into
consideration the constraints involved in achieving the targets. In this analysis, one or
more variables are changed after taking into account the constraints until the best
alternative is found.
(e) Incorrect Answer.
So option (b) is the correct answer.
63. Answer : (c) < TOP >
Reason : (a)End users can make use of what-if analysis to make changes in variable or relationship
amongst variables and observe the changes. What-if analysis is used for analyzing the
various possibilities and deriving an appropriate strategy for each situation.
(d)Sensitivity analysis can be considered as a type of what-if-analysis in which the effect
of repeated change in a single variable is examined. This type of analysis is useful when
the user is not sure about the value of a key variable.
(c)Goal seek analysis is the reverse of what-if-analysis. In goal-seek analysis, the target is
fixed and changes are made to the related variable so that the target is achieved.
(b) Optimization analysis is a complex extension of goal-seek analysis. In optimization
analysis, the target is not fixed. Rather, the target needs to be arrived at after taking into
consideration the constraints involved in achieving the targets. In this analysis, one or
more variables are changed after taking into account the constraints until the best
alternative is found.
So option (c) is the correct answer.
64. Answer : (a) < TOP >
Reason : Managers and other decision makers use MIS to request information at their networked
workstation that supports their decision-making activities. This information takes the form
of periodic, exception, and demand reports and immediate responses to enquiries.
Exception reports are generated only in exceptional situations.
(b) This is the traditional form of providing information to the managers that uses a pre
specified format designed to provide managers with information on a regular basis.
(c) Here, information is available whenever a manager demands it.
(d) Edit report is not the report used by a finance manager who is provided with
information on customers who exceeded their credit limits only.
(e) Push report is not the report used by a finance manager who is provided with
information on customers who exceeded their credit limits only.
Hence option (a) is the correct answer.
65. Answer : (c) < TOP >
Reason : The process of radically changing the design of business process to improve performance
and efficiency is called Business Process Re-engineering. So option (c) is answer.
66. Answer : (c) < TOP >
Reason : AI deals with the process of creating such machines which can learn and adapt to
intelligent behaviors that are a characteristic of human beings. It is associated with the
tasks of making machines and programs that are intelligent and making use of these
machines to understand human intelligence. So option (c) is answer.
67. Answer : (d) < TOP >
Reason : In OLAP, Slicing and dicing refer to The process of changing the dimension of analysis
to suit the analyst requirements. So option (d) is answer.
68. Answer : (e) < TOP >
Reason : Process Control System is a computer system that controls an ongoing physical
manufacturing process. Such a system requires the use of special sensing devices to
measure physical phenomena such as temperature, pressure etc.
25. Option (a) is incorrect. Computer Aided Design (CAD) is a set of specialized software and
hardware that is used to design products directly on computer terminals. So, it is not
applicable here.
Option (b) is incorrect. Computer Aided Manufacturing (CAM) is a specialized computer
system, which translates the CAD information into instructions for automated machines,
so that they perform the necessary production operations. So, it is not applicable here.
Option (c) is incorrect. Manufacturing Resource Planning (MRP II) is an integrated
information system that shares data among and synchronizes the activities of production
and the other functional areas of the business like marketing, finance etc. So, it is not
applicable here.
Option (d) is incorrect. Materials Requirement Planning (MRP) enables the
implementation of the Master Production Schedule by showing time-phased requirements
for releasing and receiving of materials. So, it is not applicable here.
Hence, from above discussion, we can infer that option (e) is correct.
So option (e) is answer.
69. Answer : (b) < TOP >
Reason : An On Page Connector in a flowchart is used to connect different parts of the program
flow charts. So option (b) is the answer.
70. Answer : (d) < TOP >
Reason : All the alternatives except (d) are the advantages of using a flow chart. There are no
standards determining the amount of detail that should be included in a flow chart. So
option (d) is answer.
71. Answer : (e) < TOP >
Reason : Except (e) all other statements are true. Converting a pseudocode to a programming
language is much easier when compared to converting a flow chart or a decision table.
Less time and effort are required to write a pseudocode than for drawing a flow chart. It is
easier to modify the pseudocode of program logic when program modifications are
necessary. There are no standard rules to follow while using a pseudocode. For a beginner,
it is difficult to follow the logic of or write a pseudocode, as compared to flow chart. So
option (e) is the answer.
72. Answer : (d) < TOP >
Reason : Following is the correct order of program development lifecycle.
(i) Defining the problem.
(ii) Designing the program.
(iii) Coding the program.
(iv) Testing and debugging the program.
(v) Formalizing the solution.
(vi) Maintaining the program.
So option (d) is answer.
73. Answer : (d) < TOP >
Reason : Pie charts are used to compare the parts of a whole. So pie charts are useful for
Mr.Sudhakar, if he wants to compare the population of Hyderabad with the population of
Andhra Pradesh. So option (d) is correct answer.
74. Answer : (d) < TOP >
Reason : ‘Switch’ statement are used to check for multiple values of variables.
For loop is used to perform a task a specific number of times on the basis of the condition
‘Nested If’ statements are used to check the conditions within another condition.
‘If’ statements are used to transfer control on the basis of certain conditions.
So option (d) is answer.
75. Answer : (a) < TOP >
Reason : VB is the most successful Rapid Application Development tool (RAD) for Microsoft
Windows application. So option (a) is answer.
76. Answer : (e) < TOP >
Reason : FOCUS, NATURAL are fourth generation languages. Prolog is a fifth generation
26. language. So option (e) is answer.
77. Answer : (e) < TOP >
Reason : An application generator is a type of language designed to facilitate development of a
complete application. It includes defining input transactions, editing transactions, creating
a database, updating files, generating reports and processing queries. They drastically
reduce the time required for programming and testing. Application generators are easy to
use than other high-level programming languages such as C++. So option ( e) is answer.
78. Answer : (d) < TOP >
Reason : JVM (Java Virtual machine) provides a layer of abstraction between the compiled
program and the underlying hardware platform and operating system. Remaining all are
not relevant. So option (d) is answer.
79. Answer : (d) < TOP >
Reason : Inheritance refers to the process by which one object acquires the general properties such
as the conditions and actions of other objects.
(e) Class constitutes a set of objects that share a common structure and behavior.
(b) Abstraction refers to the process of hiding the complexity and internal functionality of
objects.
(a) Encapsulation binds together the code and the data it manipulates.
(c) Polymorphism is the property of a function by which it can exhibit different behaviors
based on different input values.
So option (d) is answer.
80. Answer : (a) < TOP >
Reason : In object-oriented programming, the process of binding data and functions in a single unit
is called Encapsulation. So option (a) is answer.
81. Answer : (c) < TOP >
Reason : (b) represents the addition of descriptive Comments or explanatory notes as
clarification.
(d) represents an entry to or exit from another part of the program flow
chart.
(c) represents programming logic that is defined else where.
(e) represents entry to exit from the page.
(a) represents beginning and ending points of a program.
So option ( c) is answer.
82. Answer : (a) < TOP >
Reason : ‘ENIAC’ (Electronic Numerical Integrator and Calculator) was the first electronic
computer developed at the Moore School of Engineering. So option (a) is the answer.
83. Answer : (b) < TOP >
Reason : The Overall Design of the database is called as Schema which includes physical schema,
logical schema and subschemas. So option (b) is the answer.
84. Answer : (e) < TOP >
Reason : Cardinality refers to the actual number of associated instances for each of the two
entities.
So option (e) is the answer.
85. Answer : (c) < TOP >
Reason : Tuple in Relational model is also known as Entity instance in E-R model . So option (c)