SlideShare a Scribd company logo
MCQ
:
Computer
Fundamentals
BHARAT BHUSHAN @ B. K. NAL
Assistant Professor (Computer Science)
Director, BSTI, Kokar
Buddha Science & Technical Institute
www.bharatsir.com
SUPRIYA BHARATI
Assistant Professor (Computer Science)
Asst. Director, BSTI, Kokar
By
&
Computer
Fundamentals
Kokar, Ranchi-834001, Jharkhand, India
MCQ SET-28
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
1. IBM 1401 is the first computer to enter in Nepal. It
belonged to
A. First Generation
B. Second Generation
C. Third Generation
D. Froth Generation
2. Programs are executed on the basis of a priority
number in a
A. Batch processing system
B. Multiprogramming
C. Time sharing
D. None of these
3. Which of the following is input device?
A. scanner
B. speaker
C. monitor
D. projector
4. Which of the following is correct acronym of VGA?
A. Video Graphics Array
B. Visual Graphics Array
C. Volatile Graphics Array
D. Video Graphics Adapter
5. Apple company used chips from ______ for its
computers.
A. Intel
B. Motorola
C. Both of above
D. None of above
6. Which of the following will happen when data is
entered into a memory location?
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
A. It will add to the content of the location
B. It will change the address of the memory
location
C. It will erase the previous content
D. It will not be fruitful if there is already some
data at the location
7. Which of the following is true?
A. Mark I was 8 feet long
B. Mark I was 2 feet long
C. Mark I was 40 feet long
D. None of above
8. Basic is _______language.
A. a procedural
B. an object oriented
C. both A and B
D. none of the above
9. What was the name of the first commercially
available microprocessor chip?
A. Intel 308
B. Intel 33
C. Intel 4004
D. Motorola 639
10. Which computers used operating systems by
Microsoft?
A. IBM PCs
B. Apple/Macintosh PCs
C. IBM Compatibles
D. Both A & C
11. Which of the following is a way to access
secondary memory?
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
A. Random access memory
B. Action method
C. Transfer method
D. Density method
12. A number system that has eight different symbols
to represent any quantity is known as
A. Binary
B. Octal
C. Decimal
D. Hexadecimal
13. Floppy disks are available in
A. Single side single density
B. Single side double density
C. Both of above
D. None of above
14. As compared to the secondary memory, the
primary memory of a computer is
A. Large
B. Cheap
C. Fast
D. Slow
15. Which of the following memories has the shortest
access times?
A. Cache memory
B. Magnetic bubble memory
C. Magnetic core memory
D. RAM
16. Circular division of disks to store and retrieve data
are known as
A. tracks
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
B. sectors
C. cycles
D. rings
17. A term used to describe interconnected computer
configuration is
A. Multiprogramming
B. Modulation
C. Multiprocessing
D. Micro program sequence
18. Which of the following is considered first
computer in the world?
A. Z3
B. ABC
C. Mark I
D. None of above
19. Which of the following is called low level
languages?
A. Machine language
B. Assembly language
C. Both of the above
D. None of above
20. In a punched card system, data is processed by a
A. Keypunch machine, sorter and posting
machine
B. Accounting machine, posting machine, and
billing machine
C. Sorter, posting machine, and billing machine
D. Accounting machine, keypunch machine and
sorter
21. Punched cards were first introduced by
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
A. Powers
B. Pascal
C. Jacquard
D. Herman Hollerith
22. Any method for controlling access to or use of
memory is known
A. Memory map
B. Memory protection
C. Memory management
D. Memory instruction
23. The process of starting a or restarting a computer
system by loading instructions from a secondary
storage device into the computer memory is called
A. Duping
B. Booting
C. Padding
D. CPS
24. Which is the type of memory for information that
does not change on your computer?
A. RAM
B. B. ROM
C. C. ERAM
D. D. RW / RAM
25. Which of the following registers is used to keep
track of address of the memory location where
the next instruction is located?
A. Memory address register
B. Memory data register
C. Instruction register
D. Program counter
Information Security
Computer
Fundamentals
with
Bharat
Sir,
BSTI,
Kokar,
Ranchi
Buddha Science & Technical Institute, Kokar, Ranchi
www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889
Computer Fundamentals ( Set-28 )
ANSWER
1. B 11. A 21. D
2. B 12. B 22. B
3. A 13. C 23. B
4. A 14. C 24. B
5. B 15. A 25. D
6. D 16. A
7. A 17. A
8. C 18. C
9. D 19. C
10. A 20. D

More Related Content

Similar to BSTI-BharatSir : Computer Fundamentals Set-28

BSTI-BharatSir : Computer Fundamentals Set-7
BSTI-BharatSir : Computer Fundamentals  Set-7BSTI-BharatSir : Computer Fundamentals  Set-7
BSTI-BharatSir : Computer Fundamentals Set-7
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-24
BSTI-BharatSir : Computer Fundamentals  Set-24BSTI-BharatSir : Computer Fundamentals  Set-24
BSTI-BharatSir : Computer Fundamentals Set-24
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-9
BSTI-BharatSir : Computer Fundamentals  Set-9BSTI-BharatSir : Computer Fundamentals  Set-9
BSTI-BharatSir : Computer Fundamentals Set-9
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-8
BSTI-BharatSir : Computer Fundamentals  Set-8BSTI-BharatSir : Computer Fundamentals  Set-8
BSTI-BharatSir : Computer Fundamentals Set-8
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-22
BSTI-BharatSir : Computer Fundamentals  Set-22BSTI-BharatSir : Computer Fundamentals  Set-22
BSTI-BharatSir : Computer Fundamentals Set-22
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-17
BSTI-BharatSir : Computer Fundamentals  Set-17BSTI-BharatSir : Computer Fundamentals  Set-17
BSTI-BharatSir : Computer Fundamentals Set-17
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-25
BSTI-BharatSir : Computer Fundamentals  Set-25BSTI-BharatSir : Computer Fundamentals  Set-25
BSTI-BharatSir : Computer Fundamentals Set-25
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-4
BSTI-BharatSir : Computer Fundamentals  Set-4BSTI-BharatSir : Computer Fundamentals  Set-4
BSTI-BharatSir : Computer Fundamentals Set-4
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-27
BSTI-BharatSir : Computer Fundamentals  Set-27BSTI-BharatSir : Computer Fundamentals  Set-27
BSTI-BharatSir : Computer Fundamentals Set-27
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-6
BSTI-BharatSir : Computer Fundamentals  Set-6BSTI-BharatSir : Computer Fundamentals  Set-6
BSTI-BharatSir : Computer Fundamentals Set-6
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-3
BSTI-BharatSir : Computer Fundamentals  Set-3BSTI-BharatSir : Computer Fundamentals  Set-3
BSTI-BharatSir : Computer Fundamentals Set-3
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-20
BSTI-BharatSir : Computer Fundamentals  Set-20BSTI-BharatSir : Computer Fundamentals  Set-20
BSTI-BharatSir : Computer Fundamentals Set-20
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-21
BSTI-BharatSir : Computer Fundamentals  Set-21BSTI-BharatSir : Computer Fundamentals  Set-21
BSTI-BharatSir : Computer Fundamentals Set-21
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-12
BSTI-BharatSir : Computer Fundamentals  Set-12BSTI-BharatSir : Computer Fundamentals  Set-12
BSTI-BharatSir : Computer Fundamentals Set-12
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-11
BSTI-BharatSir : Computer Fundamentals  Set-11BSTI-BharatSir : Computer Fundamentals  Set-11
BSTI-BharatSir : Computer Fundamentals Set-11
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-15
BSTI-BharatSir : Computer Fundamentals  Set-15BSTI-BharatSir : Computer Fundamentals  Set-15
BSTI-BharatSir : Computer Fundamentals Set-15
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-10
BSTI-BharatSir : Computer Fundamentals  Set-10BSTI-BharatSir : Computer Fundamentals  Set-10
BSTI-BharatSir : Computer Fundamentals Set-10
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-2
BSTI-BharatSir : Computer Fundamentals  Set-2BSTI-BharatSir : Computer Fundamentals  Set-2
BSTI-BharatSir : Computer Fundamentals Set-2
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-18
BSTI-BharatSir : Computer Fundamentals  Set-18BSTI-BharatSir : Computer Fundamentals  Set-18
BSTI-BharatSir : Computer Fundamentals Set-18
Bharat Bhushan
 
BSTI-BharatSir : Computer Fundamentals Set-19
BSTI-BharatSir : Computer Fundamentals  Set-19BSTI-BharatSir : Computer Fundamentals  Set-19
BSTI-BharatSir : Computer Fundamentals Set-19
Bharat Bhushan
 

Similar to BSTI-BharatSir : Computer Fundamentals Set-28 (20)

BSTI-BharatSir : Computer Fundamentals Set-7
BSTI-BharatSir : Computer Fundamentals  Set-7BSTI-BharatSir : Computer Fundamentals  Set-7
BSTI-BharatSir : Computer Fundamentals Set-7
 
BSTI-BharatSir : Computer Fundamentals Set-24
BSTI-BharatSir : Computer Fundamentals  Set-24BSTI-BharatSir : Computer Fundamentals  Set-24
BSTI-BharatSir : Computer Fundamentals Set-24
 
BSTI-BharatSir : Computer Fundamentals Set-9
BSTI-BharatSir : Computer Fundamentals  Set-9BSTI-BharatSir : Computer Fundamentals  Set-9
BSTI-BharatSir : Computer Fundamentals Set-9
 
BSTI-BharatSir : Computer Fundamentals Set-8
BSTI-BharatSir : Computer Fundamentals  Set-8BSTI-BharatSir : Computer Fundamentals  Set-8
BSTI-BharatSir : Computer Fundamentals Set-8
 
BSTI-BharatSir : Computer Fundamentals Set-22
BSTI-BharatSir : Computer Fundamentals  Set-22BSTI-BharatSir : Computer Fundamentals  Set-22
BSTI-BharatSir : Computer Fundamentals Set-22
 
BSTI-BharatSir : Computer Fundamentals Set-17
BSTI-BharatSir : Computer Fundamentals  Set-17BSTI-BharatSir : Computer Fundamentals  Set-17
BSTI-BharatSir : Computer Fundamentals Set-17
 
BSTI-BharatSir : Computer Fundamentals Set-25
BSTI-BharatSir : Computer Fundamentals  Set-25BSTI-BharatSir : Computer Fundamentals  Set-25
BSTI-BharatSir : Computer Fundamentals Set-25
 
BSTI-BharatSir : Computer Fundamentals Set-4
BSTI-BharatSir : Computer Fundamentals  Set-4BSTI-BharatSir : Computer Fundamentals  Set-4
BSTI-BharatSir : Computer Fundamentals Set-4
 
BSTI-BharatSir : Computer Fundamentals Set-27
BSTI-BharatSir : Computer Fundamentals  Set-27BSTI-BharatSir : Computer Fundamentals  Set-27
BSTI-BharatSir : Computer Fundamentals Set-27
 
BSTI-BharatSir : Computer Fundamentals Set-6
BSTI-BharatSir : Computer Fundamentals  Set-6BSTI-BharatSir : Computer Fundamentals  Set-6
BSTI-BharatSir : Computer Fundamentals Set-6
 
BSTI-BharatSir : Computer Fundamentals Set-3
BSTI-BharatSir : Computer Fundamentals  Set-3BSTI-BharatSir : Computer Fundamentals  Set-3
BSTI-BharatSir : Computer Fundamentals Set-3
 
BSTI-BharatSir : Computer Fundamentals Set-20
BSTI-BharatSir : Computer Fundamentals  Set-20BSTI-BharatSir : Computer Fundamentals  Set-20
BSTI-BharatSir : Computer Fundamentals Set-20
 
BSTI-BharatSir : Computer Fundamentals Set-21
BSTI-BharatSir : Computer Fundamentals  Set-21BSTI-BharatSir : Computer Fundamentals  Set-21
BSTI-BharatSir : Computer Fundamentals Set-21
 
BSTI-BharatSir : Computer Fundamentals Set-12
BSTI-BharatSir : Computer Fundamentals  Set-12BSTI-BharatSir : Computer Fundamentals  Set-12
BSTI-BharatSir : Computer Fundamentals Set-12
 
BSTI-BharatSir : Computer Fundamentals Set-11
BSTI-BharatSir : Computer Fundamentals  Set-11BSTI-BharatSir : Computer Fundamentals  Set-11
BSTI-BharatSir : Computer Fundamentals Set-11
 
BSTI-BharatSir : Computer Fundamentals Set-15
BSTI-BharatSir : Computer Fundamentals  Set-15BSTI-BharatSir : Computer Fundamentals  Set-15
BSTI-BharatSir : Computer Fundamentals Set-15
 
BSTI-BharatSir : Computer Fundamentals Set-10
BSTI-BharatSir : Computer Fundamentals  Set-10BSTI-BharatSir : Computer Fundamentals  Set-10
BSTI-BharatSir : Computer Fundamentals Set-10
 
BSTI-BharatSir : Computer Fundamentals Set-2
BSTI-BharatSir : Computer Fundamentals  Set-2BSTI-BharatSir : Computer Fundamentals  Set-2
BSTI-BharatSir : Computer Fundamentals Set-2
 
BSTI-BharatSir : Computer Fundamentals Set-18
BSTI-BharatSir : Computer Fundamentals  Set-18BSTI-BharatSir : Computer Fundamentals  Set-18
BSTI-BharatSir : Computer Fundamentals Set-18
 
BSTI-BharatSir : Computer Fundamentals Set-19
BSTI-BharatSir : Computer Fundamentals  Set-19BSTI-BharatSir : Computer Fundamentals  Set-19
BSTI-BharatSir : Computer Fundamentals Set-19
 

More from Bharat Bhushan

NIMCET 2023 : Questions
NIMCET 2023  : QuestionsNIMCET 2023  : Questions
NIMCET 2023 : Questions
Bharat Bhushan
 
Heuristics Search Techniques in AI
Heuristics Search Techniques in AI Heuristics Search Techniques in AI
Heuristics Search Techniques in AI
Bharat Bhushan
 
Heuristics Search Techniques
Heuristics Search TechniquesHeuristics Search Techniques
Heuristics Search Techniques
Bharat Bhushan
 
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceHill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial Intelligence
Bharat Bhushan
 
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceHill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial Intelligence
Bharat Bhushan
 
Control Strategies in AI
Control Strategies in AI Control Strategies in AI
Control Strategies in AI
Bharat Bhushan
 
Control Strategies in AI
Control Strategies in AI Control Strategies in AI
Control Strategies in AI
Bharat Bhushan
 
Dynamic Programming
Dynamic ProgrammingDynamic Programming
Dynamic Programming
Bharat Bhushan
 
Algorithm Design Technique
Algorithm Design Technique Algorithm Design Technique
Algorithm Design Technique
Bharat Bhushan
 
Production System in AI
Production System in AIProduction System in AI
Production System in AI
Bharat Bhushan
 
Production System in AI
Production System in AIProduction System in AI
Production System in AI
Bharat Bhushan
 
Problem Characteristics in Artificial Intelligence
Problem Characteristics in  Artificial IntelligenceProblem Characteristics in  Artificial Intelligence
Problem Characteristics in Artificial Intelligence
Bharat Bhushan
 
Problem Characteristics in Artificial Intelligence
Problem Characteristics in  Artificial IntelligenceProblem Characteristics in  Artificial Intelligence
Problem Characteristics in Artificial Intelligence
Bharat Bhushan
 
Introduction to Artificial Intteligence
Introduction to Artificial IntteligenceIntroduction to Artificial Intteligence
Introduction to Artificial Intteligence
Bharat Bhushan
 
Introduction to Artificial Intteligence
Introduction to Artificial IntteligenceIntroduction to Artificial Intteligence
Introduction to Artificial Intteligence
Bharat Bhushan
 
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
Bharat Bhushan
 
DESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMSDESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMS
Bharat Bhushan
 
ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE
Bharat Bhushan
 
ARTIFICIAL INTELLIGENCE SYLLABUS
ARTIFICIAL INTELLIGENCE SYLLABUS ARTIFICIAL INTELLIGENCE SYLLABUS
ARTIFICIAL INTELLIGENCE SYLLABUS
Bharat Bhushan
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
Bharat Bhushan
 

More from Bharat Bhushan (20)

NIMCET 2023 : Questions
NIMCET 2023  : QuestionsNIMCET 2023  : Questions
NIMCET 2023 : Questions
 
Heuristics Search Techniques in AI
Heuristics Search Techniques in AI Heuristics Search Techniques in AI
Heuristics Search Techniques in AI
 
Heuristics Search Techniques
Heuristics Search TechniquesHeuristics Search Techniques
Heuristics Search Techniques
 
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceHill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial Intelligence
 
Hill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial IntelligenceHill Climbing Algorithm in Artificial Intelligence
Hill Climbing Algorithm in Artificial Intelligence
 
Control Strategies in AI
Control Strategies in AI Control Strategies in AI
Control Strategies in AI
 
Control Strategies in AI
Control Strategies in AI Control Strategies in AI
Control Strategies in AI
 
Dynamic Programming
Dynamic ProgrammingDynamic Programming
Dynamic Programming
 
Algorithm Design Technique
Algorithm Design Technique Algorithm Design Technique
Algorithm Design Technique
 
Production System in AI
Production System in AIProduction System in AI
Production System in AI
 
Production System in AI
Production System in AIProduction System in AI
Production System in AI
 
Problem Characteristics in Artificial Intelligence
Problem Characteristics in  Artificial IntelligenceProblem Characteristics in  Artificial Intelligence
Problem Characteristics in Artificial Intelligence
 
Problem Characteristics in Artificial Intelligence
Problem Characteristics in  Artificial IntelligenceProblem Characteristics in  Artificial Intelligence
Problem Characteristics in Artificial Intelligence
 
Introduction to Artificial Intteligence
Introduction to Artificial IntteligenceIntroduction to Artificial Intteligence
Introduction to Artificial Intteligence
 
Introduction to Artificial Intteligence
Introduction to Artificial IntteligenceIntroduction to Artificial Intteligence
Introduction to Artificial Intteligence
 
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
DESIGN AND ANALYSIS OF ALGORITHMS by Bharat Sir
 
DESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMSDESIGN AND ANALYSIS OF ALGORITHMS
DESIGN AND ANALYSIS OF ALGORITHMS
 
ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE ARTIFICIAL INTELLIGENCE
ARTIFICIAL INTELLIGENCE
 
ARTIFICIAL INTELLIGENCE SYLLABUS
ARTIFICIAL INTELLIGENCE SYLLABUS ARTIFICIAL INTELLIGENCE SYLLABUS
ARTIFICIAL INTELLIGENCE SYLLABUS
 
Cyber Security
Cyber Security Cyber Security
Cyber Security
 

Recently uploaded

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
DhatriParmar
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 

Recently uploaded (20)

Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptxThe Diamond Necklace by Guy De Maupassant.pptx
The Diamond Necklace by Guy De Maupassant.pptx
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 

BSTI-BharatSir : Computer Fundamentals Set-28

  • 1. MCQ : Computer Fundamentals BHARAT BHUSHAN @ B. K. NAL Assistant Professor (Computer Science) Director, BSTI, Kokar Buddha Science & Technical Institute www.bharatsir.com SUPRIYA BHARATI Assistant Professor (Computer Science) Asst. Director, BSTI, Kokar By & Computer Fundamentals Kokar, Ranchi-834001, Jharkhand, India MCQ SET-28
  • 2. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) 1. IBM 1401 is the first computer to enter in Nepal. It belonged to A. First Generation B. Second Generation C. Third Generation D. Froth Generation 2. Programs are executed on the basis of a priority number in a A. Batch processing system B. Multiprogramming C. Time sharing D. None of these 3. Which of the following is input device? A. scanner B. speaker C. monitor D. projector 4. Which of the following is correct acronym of VGA? A. Video Graphics Array B. Visual Graphics Array C. Volatile Graphics Array D. Video Graphics Adapter 5. Apple company used chips from ______ for its computers. A. Intel B. Motorola C. Both of above D. None of above 6. Which of the following will happen when data is entered into a memory location?
  • 3. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) A. It will add to the content of the location B. It will change the address of the memory location C. It will erase the previous content D. It will not be fruitful if there is already some data at the location 7. Which of the following is true? A. Mark I was 8 feet long B. Mark I was 2 feet long C. Mark I was 40 feet long D. None of above 8. Basic is _______language. A. a procedural B. an object oriented C. both A and B D. none of the above 9. What was the name of the first commercially available microprocessor chip? A. Intel 308 B. Intel 33 C. Intel 4004 D. Motorola 639 10. Which computers used operating systems by Microsoft? A. IBM PCs B. Apple/Macintosh PCs C. IBM Compatibles D. Both A & C 11. Which of the following is a way to access secondary memory?
  • 4. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) A. Random access memory B. Action method C. Transfer method D. Density method 12. A number system that has eight different symbols to represent any quantity is known as A. Binary B. Octal C. Decimal D. Hexadecimal 13. Floppy disks are available in A. Single side single density B. Single side double density C. Both of above D. None of above 14. As compared to the secondary memory, the primary memory of a computer is A. Large B. Cheap C. Fast D. Slow 15. Which of the following memories has the shortest access times? A. Cache memory B. Magnetic bubble memory C. Magnetic core memory D. RAM 16. Circular division of disks to store and retrieve data are known as A. tracks
  • 5. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) B. sectors C. cycles D. rings 17. A term used to describe interconnected computer configuration is A. Multiprogramming B. Modulation C. Multiprocessing D. Micro program sequence 18. Which of the following is considered first computer in the world? A. Z3 B. ABC C. Mark I D. None of above 19. Which of the following is called low level languages? A. Machine language B. Assembly language C. Both of the above D. None of above 20. In a punched card system, data is processed by a A. Keypunch machine, sorter and posting machine B. Accounting machine, posting machine, and billing machine C. Sorter, posting machine, and billing machine D. Accounting machine, keypunch machine and sorter 21. Punched cards were first introduced by
  • 6. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) A. Powers B. Pascal C. Jacquard D. Herman Hollerith 22. Any method for controlling access to or use of memory is known A. Memory map B. Memory protection C. Memory management D. Memory instruction 23. The process of starting a or restarting a computer system by loading instructions from a secondary storage device into the computer memory is called A. Duping B. Booting C. Padding D. CPS 24. Which is the type of memory for information that does not change on your computer? A. RAM B. B. ROM C. C. ERAM D. D. RW / RAM 25. Which of the following registers is used to keep track of address of the memory location where the next instruction is located? A. Memory address register B. Memory data register C. Instruction register D. Program counter
  • 7. Information Security Computer Fundamentals with Bharat Sir, BSTI, Kokar, Ranchi Buddha Science & Technical Institute, Kokar, Ranchi www.bharatsir.com |Mobile : 09835376044| Whatsapp : 09006365889 Computer Fundamentals ( Set-28 ) ANSWER 1. B 11. A 21. D 2. B 12. B 22. B 3. A 13. C 23. B 4. A 14. C 24. B 5. B 15. A 25. D 6. D 16. A 7. A 17. A 8. C 18. C 9. D 19. C 10. A 20. D