SlideShare a Scribd company logo
1 of 35
PREVIOUS YEARS QUESTIONS WITH
ANSWER AND EXPLANATION
Part - 3
vrrgroup.academy@gmail.com
https://www.facebook.com/VRRAcademy
www.youtube/VRR Academy
1
2
Answer: (b)
3
Hypertext Markup Language (HTML) is the standard markup language for
documents designed to be displayed in a web browser. It can be assisted by
technologies such as Cascading Style Sheets (CSS) and scripting languages
such as JavaScript.
XML stands for eXtensible Markup Language. XML is a markup language
much like HTML. XML was designed to store and transport data.
Answer: (c)
4
Answer: (d)
5
PROM (Programmable Read-Only Memory) is a computer memory chip that can be
programmed once after it is created.
Once the PROM is programmed, the information written is permanent and cannot be erased or
deleted.
An EPROM (Erasable programmable read-only memory) is a type of PROM chip that
retains its data when its power supply is switched off. Computer memory that can retrieve
stored data after a power supply has been turned off and back on is called non-volatile.
EEPROM (Electrically Erasable Programmable Read-Only Memory) is a type of non-
volatile memory used in computers, integrated in microcontrollers for smart cards and remote
keyless systems, and other electronic devices to store relatively small amounts of data but
allowing individual bytes to be erased and reprogrammed.
Answer: (d)
6
Directing  Control Unit  Brain of the Computer
Answer: (b)
7
The binary coding schemes that are most commonly used are as follows:
1. Binary coded decimal (BCD).
2. American standard code for information interchange
(ASCII).
3. Extended binary coded decimal interchange code
(EBCDIC).
4. UNICODE.
Answer: (a)
8
Answer: (c)
9
Answer: (c)
10
Answer: (c)
11
Answer: (d)
12
Answer: (b)
13
Hypertext Markup Language (HTML) is the standard
markup language for documents designed to be displayed
in a web browser. It can be assisted by technologies such
as Cascading Style Sheets (CSS) and scripting languages
such as JavaScript.
Answer: (c)
14
Answer: (a)
15
PROM (Programmable Read-Only Memory) is a computer memory chip that can be
programmed once after it is created.
Once the PROM is programmed, the information written is permanent and cannot be erased or
deleted.
An EPROM (Erasable programmable read-only memory) is a type of PROM chip that
retains its data when its power supply is switched off. Computer memory that can retrieve
stored data after a power supply has been turned off and back on is called non-volatile.
EEPROM (Electrically Erasable Programmable Read-Only Memory) is a type of non-
volatile memory used in computers, integrated in microcontrollers for smart cards and remote
keyless systems, and other electronic devices to store relatively small amounts of data but
allowing individual bytes to be erased and reprogrammed.
Answer: (d)
16
Connection lines used to connect the internal parts of the microprocessor chip is called bus. There
are three types of buses in a microprocessor:
Data Bus − Lines that carry data to and from memory are called data bus. It is a bidirectional bus
with width equal to word length of the microprocessor.
Address Bus − It is a unidirectional responsible for carrying address of a memory location or I/O
port from CPU to memory or I/O port.
Control Bus − Lines that carry control signals like clock signals, interrupt signal or ready
signal are called control bus. They are bidirectional. Signal that denotes that a device is ready for
processing is called ready signal. Signal that indicates to a device to interrupt its process is called
an interrupt signal.
Answer: (d)
17
The binary coding schemes that are most commonly used are as follows:
1. Binary coded decimal (BCD).
2. American standard code for information interchange
(ASCII).
3. Extended binary coded decimal interchange code
(EBCDIC).
4. UNICODE.
Answer: (c)
18
Answer: (a)
19
Answer: (b)
20
Answer: (c)
21
• In computers, the case sensitivity of text defines whether uppercase and
lowercase letters are treated as distinct or equivalent.
• The concept can also be applied to the processes using the data, such as searches
and comparisons.
Answer: (a)
22
Answer: (a)
23
Email
• Invented by Ray Tomlinson.
• Email is the electronic version of sending and receiving letter.
• Electronic mail allow us to send and receive messages in electronic form.
• Email is transmitted between computer system according to certain internet
protocols or rules for exchanging E-mail.
• A user must have email address to Use email, which consists of two parts
separated by @ symbol.
• Spaces are not allowed within email address.
• vrrsekar@yahoo.com
• username - host name( Domain name)
Answer: (d)
24
25
SMTP – Simple Mail Transfer Protocol
POP – Post office Protocol
IMAP – Internet Message Access Protocol
HTTP – Hyper Text Transfer Protocol
IMAP (Internet Message Access Protocol)
 Is a standard protocol for accessing e-mail from your local server.
 IMAP is a client/server protocol in which e-mail is received and held for you by your Internet
server.
 As this requires only a small data transfer this works well even over a slow connection such as a
modem.
 Only if you request to read a specific email message will it be downloaded from the server.
 You can also create and manipulate folders or mailboxes on the server, delete messages etc.
 The POP (Post Office Protocol 3) protocol provides a simple, standardized way for users to
access mailboxes and download messages to their computers.
The SMTP (Simple Mail Transfer Protocol) protocol
 is used by the Mail Transfer Agent (MTA) to deliver your eMail to the recipient's mail server.
 The SMTP protocol can only be used to send emails, not to receive them.
 Depending on your network / ISP settings, you may only be able to use the SMTP protocol under
certain conditions
 The HTTP protocol is not a protocol dedicated for email communications, but it can be used for
accessing your mailbox.
 Also called web based email, this protocol can be used to compose or retrieve emails from an your
account.
 Hotmail is a good example of using HTTP as an email protocol. 26
27
Answer: (a)
28
• Cache Memory is a special very high-speed memory.
• It is used to speed up and synchronizing with high-speed CPU.
• Cache memory is costlier than main memory or disk memory but economical than CPU registers.
• Cache memory is an extremely fast memory type that acts as a buffer between RAM and the
CPU.
• It holds frequently requested data and instructions so that they are immediately available to the
CPU when needed.
• Cache memory is used to reduce the average time to access data from the Main memory.
• The cache is a smaller and faster memory which stores copies of the data from frequently used
main memory locations.
• There are various different independent caches in a CPU, which stored instruction and data.
Answer: (d)
29
Answer: (b)
30
• Extended binary coded decimal interchange code (EBCDIC).
In EBCDIC, characters are represented by eight bits.
• These codes store information which is readable by other computers.
• It allows 2^8 =256 combinations of bits.
Answer: (b)
31
Convert Decimal  Binary
Binary  Hexadecimal
Answer: (a)
32
Answer: (c)
33
Answer: (c)
34
Answer: (d)
35
Will continue in part 4

More Related Content

What's hot (20)

Cache mapping
Cache mappingCache mapping
Cache mapping
 
cache memory
cache memorycache memory
cache memory
 
yow! assignment kow! yow!
yow! assignment kow! yow!yow! assignment kow! yow!
yow! assignment kow! yow!
 
Joemary.doc
Joemary.docJoemary.doc
Joemary.doc
 
Bnt202 understanding pc & trouble shooting
Bnt202 understanding pc & trouble shootingBnt202 understanding pc & trouble shooting
Bnt202 understanding pc & trouble shooting
 
raymart aborque
raymart aborqueraymart aborque
raymart aborque
 
Memory
MemoryMemory
Memory
 
Unit 5-lecture-2
Unit 5-lecture-2Unit 5-lecture-2
Unit 5-lecture-2
 
Web design EJ3
Web design    EJ3Web design    EJ3
Web design EJ3
 
Cache memory
Cache memoryCache memory
Cache memory
 
cache memory
 cache memory cache memory
cache memory
 
Mi0035 – computer networks
Mi0035 – computer networksMi0035 – computer networks
Mi0035 – computer networks
 
Session 6
Session 6Session 6
Session 6
 
Computer network suggestion
Computer network suggestionComputer network suggestion
Computer network suggestion
 
Network Layer & Transport Layer
Network Layer & Transport LayerNetwork Layer & Transport Layer
Network Layer & Transport Layer
 
Parallel Processing Concepts
Parallel Processing Concepts Parallel Processing Concepts
Parallel Processing Concepts
 
Lecture02 types
Lecture02 typesLecture02 types
Lecture02 types
 
Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015Ccn aquestions jul_7_2015
Ccn aquestions jul_7_2015
 
Hardware & networking
Hardware & networkingHardware & networking
Hardware & networking
 
04 cache memory
04 cache memory04 cache memory
04 cache memory
 

Similar to PREVIOUS QUESTIONS WITH ANSWERS

Computer organisation ppt
Computer organisation pptComputer organisation ppt
Computer organisation pptchandkec
 
embedded system-Memory_Organization_final.pdf
embedded system-Memory_Organization_final.pdfembedded system-Memory_Organization_final.pdf
embedded system-Memory_Organization_final.pdfSarveshPandey64
 
Performance evaluation of ecc in single and multi( eliptic curve)
Performance evaluation of ecc in single and multi( eliptic curve)Performance evaluation of ecc in single and multi( eliptic curve)
Performance evaluation of ecc in single and multi( eliptic curve)Danilo Calle
 
Computer Architecture | Computer Fundamental and Organization
Computer Architecture | Computer Fundamental and OrganizationComputer Architecture | Computer Fundamental and Organization
Computer Architecture | Computer Fundamental and OrganizationSmit Luvani
 
Unit I Memory technology and optimization
Unit I Memory technology and optimizationUnit I Memory technology and optimization
Unit I Memory technology and optimizationK Gowsic Gowsic
 
Memory technology and optimization in Advance Computer Architechture
Memory technology and optimization in Advance Computer ArchitechtureMemory technology and optimization in Advance Computer Architechture
Memory technology and optimization in Advance Computer ArchitechtureShweta Ghate
 
Computer Memory Finder
Computer Memory FinderComputer Memory Finder
Computer Memory Findersteve predle
 
301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilogSrinivas Naidu
 
ARM architcture
ARM architcture ARM architcture
ARM architcture Hossam Adel
 
ECECS 472572 Final Exam ProjectRemember to check the errata
ECECS 472572 Final Exam ProjectRemember to check the errata ECECS 472572 Final Exam ProjectRemember to check the errata
ECECS 472572 Final Exam ProjectRemember to check the errata EvonCanales257
 
ECECS 472572 Final Exam ProjectRemember to check the errat.docx
ECECS 472572 Final Exam ProjectRemember to check the errat.docxECECS 472572 Final Exam ProjectRemember to check the errat.docx
ECECS 472572 Final Exam ProjectRemember to check the errat.docxtidwellveronique
 
ECECS 472572 Final Exam ProjectRemember to check the err.docx
ECECS 472572 Final Exam ProjectRemember to check the err.docxECECS 472572 Final Exam ProjectRemember to check the err.docx
ECECS 472572 Final Exam ProjectRemember to check the err.docxtidwellveronique
 
Please do ECE572 requirementECECS 472572 Final Exam Project (W.docx
Please do ECE572 requirementECECS 472572 Final Exam Project (W.docxPlease do ECE572 requirementECECS 472572 Final Exam Project (W.docx
Please do ECE572 requirementECECS 472572 Final Exam Project (W.docxARIV4
 
Bt0062 fundamentals of it-de
Bt0062 fundamentals of it-deBt0062 fundamentals of it-de
Bt0062 fundamentals of it-desmumbahelp
 
Mainmemoryfinalprefinal 160927115742
Mainmemoryfinalprefinal 160927115742Mainmemoryfinalprefinal 160927115742
Mainmemoryfinalprefinal 160927115742marangburu42
 

Similar to PREVIOUS QUESTIONS WITH ANSWERS (20)

Computer organisation ppt
Computer organisation pptComputer organisation ppt
Computer organisation ppt
 
Internal memory
Internal memoryInternal memory
Internal memory
 
Coa presentation3
Coa presentation3Coa presentation3
Coa presentation3
 
notes2 memory_cpu
notes2 memory_cpunotes2 memory_cpu
notes2 memory_cpu
 
Data conversion
Data conversionData conversion
Data conversion
 
embedded system-Memory_Organization_final.pdf
embedded system-Memory_Organization_final.pdfembedded system-Memory_Organization_final.pdf
embedded system-Memory_Organization_final.pdf
 
Performance evaluation of ecc in single and multi( eliptic curve)
Performance evaluation of ecc in single and multi( eliptic curve)Performance evaluation of ecc in single and multi( eliptic curve)
Performance evaluation of ecc in single and multi( eliptic curve)
 
Computer Architecture | Computer Fundamental and Organization
Computer Architecture | Computer Fundamental and OrganizationComputer Architecture | Computer Fundamental and Organization
Computer Architecture | Computer Fundamental and Organization
 
Unit I Memory technology and optimization
Unit I Memory technology and optimizationUnit I Memory technology and optimization
Unit I Memory technology and optimization
 
Memory technology and optimization in Advance Computer Architechture
Memory technology and optimization in Advance Computer ArchitechtureMemory technology and optimization in Advance Computer Architechture
Memory technology and optimization in Advance Computer Architechture
 
Computer Memory Finder
Computer Memory FinderComputer Memory Finder
Computer Memory Finder
 
301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog301378156 design-of-sram-in-verilog
301378156 design-of-sram-in-verilog
 
ARM architcture
ARM architcture ARM architcture
ARM architcture
 
ECECS 472572 Final Exam ProjectRemember to check the errata
ECECS 472572 Final Exam ProjectRemember to check the errata ECECS 472572 Final Exam ProjectRemember to check the errata
ECECS 472572 Final Exam ProjectRemember to check the errata
 
ECECS 472572 Final Exam ProjectRemember to check the errat.docx
ECECS 472572 Final Exam ProjectRemember to check the errat.docxECECS 472572 Final Exam ProjectRemember to check the errat.docx
ECECS 472572 Final Exam ProjectRemember to check the errat.docx
 
ECECS 472572 Final Exam ProjectRemember to check the err.docx
ECECS 472572 Final Exam ProjectRemember to check the err.docxECECS 472572 Final Exam ProjectRemember to check the err.docx
ECECS 472572 Final Exam ProjectRemember to check the err.docx
 
Please do ECE572 requirementECECS 472572 Final Exam Project (W.docx
Please do ECE572 requirementECECS 472572 Final Exam Project (W.docxPlease do ECE572 requirementECECS 472572 Final Exam Project (W.docx
Please do ECE572 requirementECECS 472572 Final Exam Project (W.docx
 
Bt0062 fundamentals of it-de
Bt0062 fundamentals of it-deBt0062 fundamentals of it-de
Bt0062 fundamentals of it-de
 
M E M O R Y
M E M O R YM E M O R Y
M E M O R Y
 
Mainmemoryfinalprefinal 160927115742
Mainmemoryfinalprefinal 160927115742Mainmemoryfinalprefinal 160927115742
Mainmemoryfinalprefinal 160927115742
 

More from CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodologyCAS
 
Can you solve this
Can you solve thisCan you solve this
Can you solve thisCAS
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authenticationCAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Human resources security
Human resources securityHuman resources security
Human resources securityCAS
 
Database security
Database securityDatabase security
Database securityCAS
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)CAS
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2CAS
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1CAS
 
Growth of Human Communication systems
Growth of Human Communication systemsGrowth of Human Communication systems
Growth of Human Communication systemsCAS
 
Communication and networks Part 1
Communication and networks   Part 1Communication and networks   Part 1
Communication and networks Part 1CAS
 

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Database security
Database securityDatabase security
Database security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)Internet security association and key management protocol (isakmp)
Internet security association and key management protocol (isakmp)
 
IP Security Part 2
IP Security   Part 2IP Security   Part 2
IP Security Part 2
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
 
Growth of Human Communication systems
Growth of Human Communication systemsGrowth of Human Communication systems
Growth of Human Communication systems
 
Communication and networks Part 1
Communication and networks   Part 1Communication and networks   Part 1
Communication and networks Part 1
 

Recently uploaded

办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一F La
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of JobRemote DBA Services
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一Fs sss
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptShafqatShakeel1
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Riya Pathan
 
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一ypfy7p5ld
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCRdollysharma2066
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书saphesg8
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样umasea
 
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一F La
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一Fs
 
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxKindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxLesterJayAquino
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一z xss
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一A SSS
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一z zzz
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfDivyeshPatel234692
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...Suhani Kapoor
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一A SSS
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Discovery Institute
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxmanas23pgdm157
 

Recently uploaded (20)

办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
办理(NUS毕业证书)新加坡国立大学毕业证成绩单原版一比一
 
do's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Jobdo's and don'ts in Telephone Interview of Job
do's and don'ts in Telephone Interview of Job
 
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一 定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
定制(UOIT学位证)加拿大安大略理工大学毕业证成绩单原版一比一
 
Ethics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.pptEthics of Animal Research Laika mission.ppt
Ethics of Animal Research Laika mission.ppt
 
Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713Escort Service Andheri WhatsApp:+91-9833363713
Escort Service Andheri WhatsApp:+91-9833363713
 
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
如何办理(UCI毕业证)加州大学欧文分校毕业证毕业证成绩单原版一比一
 
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
8377877756 Full Enjoy @24/7 Call Girls in Pitampura Delhi NCR
 
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书办理老道明大学毕业证成绩单|购买美国ODU文凭证书
办理老道明大学毕业证成绩单|购买美国ODU文凭证书
 
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
办理学位证(纽伦堡大学文凭证书)纽伦堡大学毕业证成绩单原版一模一样
 
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
办理(Hull毕业证书)英国赫尔大学毕业证成绩单原版一比一
 
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
定制(Waikato毕业证书)新西兰怀卡托大学毕业证成绩单原版一比一
 
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docxKindergarten-DLL-MELC-Q3-Week 2 asf.docx
Kindergarten-DLL-MELC-Q3-Week 2 asf.docx
 
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
定制(SCU毕业证书)南十字星大学毕业证成绩单原版一比一
 
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
办理学位证(Massey证书)新西兰梅西大学毕业证成绩单原版一比一
 
定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一定制英国克兰菲尔德大学毕业证成绩单原版一比一
定制英国克兰菲尔德大学毕业证成绩单原版一比一
 
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdfNPPE STUDY GUIDE - NOV2021_study_104040.pdf
NPPE STUDY GUIDE - NOV2021_study_104040.pdf
 
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
VIP Call Girls Firozabad Aaradhya 8250192130 Independent Escort Service Firoz...
 
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
办理学位证(UoM证书)北安普顿大学毕业证成绩单原版一比一
 
Digital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, IndiaDigital Marketing Training Institute in Mohali, India
Digital Marketing Training Institute in Mohali, India
 
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docxOutsmarting the Attackers A Deep Dive into Threat Intelligence.docx
Outsmarting the Attackers A Deep Dive into Threat Intelligence.docx
 

PREVIOUS QUESTIONS WITH ANSWERS

  • 1. PREVIOUS YEARS QUESTIONS WITH ANSWER AND EXPLANATION Part - 3 vrrgroup.academy@gmail.com https://www.facebook.com/VRRAcademy www.youtube/VRR Academy 1
  • 3. 3 Hypertext Markup Language (HTML) is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaScript. XML stands for eXtensible Markup Language. XML is a markup language much like HTML. XML was designed to store and transport data. Answer: (c)
  • 5. 5 PROM (Programmable Read-Only Memory) is a computer memory chip that can be programmed once after it is created. Once the PROM is programmed, the information written is permanent and cannot be erased or deleted. An EPROM (Erasable programmable read-only memory) is a type of PROM chip that retains its data when its power supply is switched off. Computer memory that can retrieve stored data after a power supply has been turned off and back on is called non-volatile. EEPROM (Electrically Erasable Programmable Read-Only Memory) is a type of non- volatile memory used in computers, integrated in microcontrollers for smart cards and remote keyless systems, and other electronic devices to store relatively small amounts of data but allowing individual bytes to be erased and reprogrammed. Answer: (d)
  • 6. 6 Directing  Control Unit  Brain of the Computer Answer: (b)
  • 7. 7 The binary coding schemes that are most commonly used are as follows: 1. Binary coded decimal (BCD). 2. American standard code for information interchange (ASCII). 3. Extended binary coded decimal interchange code (EBCDIC). 4. UNICODE. Answer: (a)
  • 13. 13 Hypertext Markup Language (HTML) is the standard markup language for documents designed to be displayed in a web browser. It can be assisted by technologies such as Cascading Style Sheets (CSS) and scripting languages such as JavaScript. Answer: (c)
  • 15. 15 PROM (Programmable Read-Only Memory) is a computer memory chip that can be programmed once after it is created. Once the PROM is programmed, the information written is permanent and cannot be erased or deleted. An EPROM (Erasable programmable read-only memory) is a type of PROM chip that retains its data when its power supply is switched off. Computer memory that can retrieve stored data after a power supply has been turned off and back on is called non-volatile. EEPROM (Electrically Erasable Programmable Read-Only Memory) is a type of non- volatile memory used in computers, integrated in microcontrollers for smart cards and remote keyless systems, and other electronic devices to store relatively small amounts of data but allowing individual bytes to be erased and reprogrammed. Answer: (d)
  • 16. 16 Connection lines used to connect the internal parts of the microprocessor chip is called bus. There are three types of buses in a microprocessor: Data Bus − Lines that carry data to and from memory are called data bus. It is a bidirectional bus with width equal to word length of the microprocessor. Address Bus − It is a unidirectional responsible for carrying address of a memory location or I/O port from CPU to memory or I/O port. Control Bus − Lines that carry control signals like clock signals, interrupt signal or ready signal are called control bus. They are bidirectional. Signal that denotes that a device is ready for processing is called ready signal. Signal that indicates to a device to interrupt its process is called an interrupt signal. Answer: (d)
  • 17. 17 The binary coding schemes that are most commonly used are as follows: 1. Binary coded decimal (BCD). 2. American standard code for information interchange (ASCII). 3. Extended binary coded decimal interchange code (EBCDIC). 4. UNICODE. Answer: (c)
  • 21. 21 • In computers, the case sensitivity of text defines whether uppercase and lowercase letters are treated as distinct or equivalent. • The concept can also be applied to the processes using the data, such as searches and comparisons. Answer: (a)
  • 23. 23 Email • Invented by Ray Tomlinson. • Email is the electronic version of sending and receiving letter. • Electronic mail allow us to send and receive messages in electronic form. • Email is transmitted between computer system according to certain internet protocols or rules for exchanging E-mail. • A user must have email address to Use email, which consists of two parts separated by @ symbol. • Spaces are not allowed within email address. • vrrsekar@yahoo.com • username - host name( Domain name) Answer: (d)
  • 24. 24
  • 25. 25 SMTP – Simple Mail Transfer Protocol POP – Post office Protocol IMAP – Internet Message Access Protocol HTTP – Hyper Text Transfer Protocol
  • 26. IMAP (Internet Message Access Protocol)  Is a standard protocol for accessing e-mail from your local server.  IMAP is a client/server protocol in which e-mail is received and held for you by your Internet server.  As this requires only a small data transfer this works well even over a slow connection such as a modem.  Only if you request to read a specific email message will it be downloaded from the server.  You can also create and manipulate folders or mailboxes on the server, delete messages etc.  The POP (Post Office Protocol 3) protocol provides a simple, standardized way for users to access mailboxes and download messages to their computers. The SMTP (Simple Mail Transfer Protocol) protocol  is used by the Mail Transfer Agent (MTA) to deliver your eMail to the recipient's mail server.  The SMTP protocol can only be used to send emails, not to receive them.  Depending on your network / ISP settings, you may only be able to use the SMTP protocol under certain conditions  The HTTP protocol is not a protocol dedicated for email communications, but it can be used for accessing your mailbox.  Also called web based email, this protocol can be used to compose or retrieve emails from an your account.  Hotmail is a good example of using HTTP as an email protocol. 26
  • 28. 28 • Cache Memory is a special very high-speed memory. • It is used to speed up and synchronizing with high-speed CPU. • Cache memory is costlier than main memory or disk memory but economical than CPU registers. • Cache memory is an extremely fast memory type that acts as a buffer between RAM and the CPU. • It holds frequently requested data and instructions so that they are immediately available to the CPU when needed. • Cache memory is used to reduce the average time to access data from the Main memory. • The cache is a smaller and faster memory which stores copies of the data from frequently used main memory locations. • There are various different independent caches in a CPU, which stored instruction and data. Answer: (d)
  • 30. 30 • Extended binary coded decimal interchange code (EBCDIC). In EBCDIC, characters are represented by eight bits. • These codes store information which is readable by other computers. • It allows 2^8 =256 combinations of bits. Answer: (b)
  • 31. 31 Convert Decimal  Binary Binary  Hexadecimal Answer: (a)