PREPARATORY QUESTIONS

COMPUTER KNOWLEDGE

PREPARATORY SET-93

Direction (Qs.1-15): Study the following questions carefully and choose your answer from the given five options.

 

Question No : 1

_____is a feature for scheduling and multiprogramming to provide an economical inter active system of two or more users

(1) Time sharing

(2) Multitasking

(3) Time tracing

(4) Multiprocessing

(5) None of these

Question No : 2

ROLLBACK in a database is _____ statement

(1) TCL

(2) DCL

(3) DML

(4) DDL

(5) SDL

Question No : 3

The disks stores information in

(1) Tables

(2) Rows and columns

(3) Blocks

(4) Tracks and sectors

(5) All of these

Question No : 4

Which file (s)can be executed without mentioning its extension name

(1) .exe

(2) .bat

(3) .com

(4) .app

(5) All of these

Question No : 5

A programming language having a _____ is slow in execution

(1) Interpreter

(2) Compiler  

(3) Assembler

(4) Linker

(5) None of these

Question No : 6

The word processor used by DOS to write the programs or instructions

(1) WordStar

(2) WordPad

(3) Notepad

(4) MS-Word 

(5) EDIT

Question No : 7

_____ provides total solutions to reduce data redundancy, inconsistency, dependence and unauthorized access of data

(1) DBMS

(2) Tables

(3) Database

(4) Protection passwords

(5) Centralization of data

Question No : 8

Codec refers to

(1) Coder-decoder

(2) Co-declaration

(3) Command declaration

(4) Command decoding

(5) None of these

Question No : 9

Origin of internet can be tracked from

(1) ARPAnet

(2) Radio networks   

(3) Satellite networks

(4) Indian army networks

(5) Air Force networks

Question No : 10

To connect networks of similar protocols, _____, are used

(1) Routers

(2) Bridges

(3) Gateways 

(4) Dial-up routers

(5) None of these

Question No : 11

Decimal equivalent of (1111)2

(1) 11  

(2) 10

(3) 1

(4) 15

(5) 13

Question No : 12

_____is one reason for problems of data integrity

(1) Data availability constraints

(2) Data inconsistency

(3) Data redundancy

(4) Security constraints

(5) Unauthorized access of data      

Question No : 13

Dr. E.F. Codd represented _____ rules that a database must obey if it has to be considered truly relational

(1) 10

(2) 8

(3) 12

(4) 6

(5) 5

Question No : 14

“>” symbol in DOS commands is use to

(1) Compare two values

(2) Redirect input

(3) Redirect output

(4) Filter data

(5) None of these

Question No : 15

System proposal is prepared in _____ phase of SDLC

(1) Conception

(2) Initiation

(3) Analysis

(4) Design

(5) construction