HN - Aptech


 
IndexIndex  PortalPortal  CalendarCalendar  GalleryGallery  Trợ giúpTrợ giúp  Tìm kiếmTìm kiếm  Thành viênThành viên  NhómNhóm  Đăng kýĐăng ký  Đăng NhậpĐăng Nhập  
Share | 
 

 Đề thi CF

Xem chủ đề cũ hơn Xem chủ đề mới hơn Go down 
Tác giảThông điệp
c0811g_ttdung
Admin
Admin


Tổng số bài gửi: 54
Join date: 28/05/2009
Age: 25
Đến từ: HN-aptech

Bài gửiTiêu đề: Đề thi CF   Thu May 28, 2009 6:05 am

1. The access point for entry and exit of data are known as?
a) Connectors b) Ports c) Buses d) Controller

2. Which three of the following statements are TRUE?
a) Data processing cycle is information in, process and data out
b) Two categories of software are application and system software
c) Computers can take decisions on their own, like human beings.
d) The operating system has to take on conducting a process called as booting
e) The unit storing any data that comes into the CPU while processing is so called register

3. The string of bits needed to represent a character is called a .
a) Word b) Kilobyte c) Byte d) None of the above

4. The two advantages of domain model over workgroup model are
a) Centralised administration is possible b) Convenient for limited number of users
c) Security management is centralised d) Sharing of resources is easy

5. Each operating System organizes data internally with help of a program knows as file system
a) True b) False

6. Centronics ports are called as
a) Printer ports. b) Parallel ports. c) RS-232.

7. A translator that translates a statement of high-level language to machine language and immediately executes it is………
a) Translator b) Assembler c) Compiler
d) Interpreter e) None of the above

8. Advantages of a workgroup include (choose three)
a) Centralised management b) Easy to share resources c) Efficient on a large network.
d) Convenient for a limited number of users.
e) Simple design makes it easy to implement.

9. Which of the following statements related to NTFS are TRUE? (choose three)
a) Supports file compression b) No security if user logs in locally
c) Supports long file names d) Partitions as file size can be a maximum of 16 exabytes
e) Not very reliable since it does not support bad cluster mapping

10. Which of the following are TRUE about primary partition? (choose three)
a) The system partition can be located on it b) Can contain only one logical drive.
c) Can contain one and more logical drives d) The boot partition can be located on it.

11. Which two of the following are TRUE about NTFS permission?
a) NTFS permission can be assigned to both file and folder
b) NTFS permission can be assigned only to folder
c) NTFS permission are not effective if the user logs on locally.
d) NTFS permission are effective even if the user logs on locally

12.The various functions performed by Operating System are (three options)
a) It acts as a manager for the various resources and allocates them to various programs and users as and when required by them
b) It allows the user to interact with the hardware to obtain results.
c) It is used to store both data and information
d) It is referred to as the hardware of the computer machine.
e) It interprets the program instructions one at a time

13. Which of the following statement is TRUE while logging on to Windows 2000?
a) The user name is not case sensitive. b) The password is not case sensitive
c) Both name and password is case sensitive d) None of them is case sensitive.

14. Shared permissions can be applied to____________
a) Only FAT partitions b) Only NTFS partitions
c) Both FAT and NTFS partitions d) None of the above

15. Why is protocol used?
a) To connect different computers b) To share the resource on the network
c) To establish communication between computers

16. Which of the following are TRUE about extended partition? (two options)
a) The system partition can be located on it
b) The active partition can be located on it
c) Can contain one and more logical drives.
d) The boot partition can be located on it.

17. Which of the following statements related to NTFS are NOT TRUE? (choose three)
a) Supports file compression b) No security if user logs in locally
c) Supports long file names d) Partitions as file size can be 4 gigabytes maximum
e) Not very reliable since it does not support bad cluster mapping

18. The various functions performed by the Operating System are (three options)
a) It load the user program into the memory
b) It is used to store both data and information.
c) It controls the whole process of data transfer from one place to the other while computations are going on.
d) It gives instruction to display the result on the monitor.
e) It controls the computer hardware. It co-ordinates the flow of data between the various application program and the users.

19. Which three of the following statements related to memory are NOT TRUE?
a) Primary memory is called the main memory or the central memory
b) ROM memory is read/write memory
c) RAM memory is non volatile, its storage is permanent
d) The secondary memory is the internal memory.
e) Data is stored and retrieved from the disk in blocks.

20. The software, which has been developed for a specific application is called
a) System software b) Application software c) Accounting software
d) Used software e) Non of the above

21.With reference to primary memory, which two of the following statements are TRUE?
a) It is so called central memory
b) It is thought of as a collection of many gramophone records stacked on each other without all of them actually touching each other.
c) It is resident on the mother board. d) It is used for only read operation.

22.CPU is also referred as ___________________
a) Calculator b) Micro-Calculator c) Microprocessor d) None of them

23. The two standard types of ports are (Choose 2)
a) Serial b) Printer Port c) Parallel

24. ____________ is a collection of wires used for data transmission from one part of computer to another.
a) Cable b) Bus c) Wire Set

25. When we type the URL of any Web Site, it is converted into an IP address.
a) True b) False

26. Web site is a collection of _____________
a) Web Pages b) Web Sites c) Presentation

27. Which one of the following is used to download softwares?
a) File Transfer Protocol b) Folder Transfer Protocol c) Download Transfer Protocol

28. Conversion of decimal number 80 to binary is
a) 1100010 b) 1010000 c) 1010001 d) 1011000

29. The Decimal equivalent of 111001
a) 52 b) 47 c) 56 d) 57

30. The result of subtraction of the binary number 11100101 from 101100 is

a) -11111000 b) 1000110 c) -10111001 d) None of the above

31. Which of the following statements are FALSE? (3)
a) POST is the process of the booting the computer
b) The POST process requires a bootable disk to perform its checks
c) The user must perform the POST process when the machine is booted
d) The POST process is carried out before the operating system is loaded
e) The POST process always effectively detects hardware errors

32. The codes defined to convey information like end-of-file, end-of-page, etc. to the computer are called

a) Binary code b) Non-printable control characters
c) Symbolic codes d) ASCII code e) Character code

33. Computers that are mainly used for scientific and engineering purposes is

a) Analog b) Digital c) Hybrid

34 Hexadecimal A45C when converted to octal gives

a) 141636 b) 122134 c) 156334 d) 122243

35 Which three of the following statements are TRUE?
a) A computer virus may also be called a biological virus
b) The infection caused from a computer virus can be prevent via inoculation
c) The computer virus may spread via a floppy disk from one computer to another
d) The execution of a virus program can take place without any user intervention
e) A virus may delete data, increase the file size and also affect the hardware components

36 Binary 110111 multiplied with 110 results in

a) 1011001010 b) 101010110 c) 101001010

37 Examples of mainframes include

a) IBM 4381 b) CRAY XMP-24 c) NEC-500 d) ICL 39 series

38 Which three of the following statements related buses are TRUE?
a) The data bus controls the data flow
b) The microchips seen inside the computer are called buses
c) The transport data between the processor and other components
d) The entry and the exit points of the buses are called ports.
e) The buses do not allow the expansion of the computer

39 Which of the following are required to be maintained for proper housekeeping ? (3)
a) Power supply b) Hardware c) Software
d) Printouts e) Data


40 Programs used to prevent virus are called
a) Vaccines b) Anti-virus program c) None of the above



41 The octal equivalent of the binary number 10001010101 is


a) 215 b) 2135 c) 2125 d) None of the above



42 With reference to booting a computer, Which three of the following statements are NOT TRUE?
a) After the POST, the RAM searches for the operating system and loads it into the ROM.
b) The operating system files are first searched in the floppy disk and if not found, then on the hard disk
c) A bootable disk is used to store the backup of all data in the computer
d) A bootable disk allows the operating system to get loaded onto the computer
e) The booting process involves getting all data inside the computer ready for use.

43 Which two of the following statements are NOT TRUE?
a) Microcomputer cannot be used for computer graphics, CAD and CAM applications
b) Mainframes are large computers, which have multiple processors that allow parallel processing of different tasks
c) Microcomputers are also known as personal computers.
d) Supercomputers have a superior technology and are used for complex scientific applications
e) Minicomputers are more powerful than the microcomputer

44 RS-232 refers to which two of the following ?
a) Mouse port b) Electronic Industry Standard c) Centronics port
c) Parallel port d) None of the above

45 With reference to EEPROMS which three of the following statements are TRUE ?
a) Are useful in process control equipment, where real time response is necessary
b) Can be erased and reprogrammed by exposing them to ultra violet rays
c) Are used where the software programs stored require to be modified continuously
d) Does not have to be removed from its socket for programming since its circuitry can be integrated into the computer.
e) Are programmed to a “1” and “0” by burning out a fusible link between selected cells.

46 Three examples of fourth generation language are
a) Fortran b) Ingres c) Cobol
d) Dbase e) Foxpro


47 The tool used for writing the set of instructions is called
a) Keyboard b) Program c) Software
d) Programing language e) None of above

48 The inherent benefits of a computerised system are: (3 options)
a) Repetitive calculation have done by the system b) All details are available at one place
c) Errors due to manual calculation are eliminated d) Data entry is reduced to nil
e) Records are maintained at a faster rate

49 With reference to hard disks which three of the following statements are NOT TRUE ?
a) The vacumed container, which protects the set of platters in a disk pack, is called a spindle
b) In a fixed head disk there is one read write head per track
c) Access time is the time taken by read write head to reach the specified cylinder
d) During a read / write operation the platter is stationary and the head rotates.
e) Certain control data is recorded at the start and end of each sector.

50 Which two of the following statements are TRUE ?
a) Control data recorded on a disk during formatting is used only by the disk drive
b) The density of data stored on a disk decreases towards the innermost tracks
c) Each track has the same width as the head
d) The hard disk is known as the main memory of the computer system

51 Which two of the following statements are TRUE about primary partition?
a) Any primary partition on a hard disk can be designated as the active partition
b) Primary partition can never be made as an active partition
c) It is also known as the boot partition
d) It is also known as the root partition

52 All digital computers use number system to store the data
a) Decimal b) Binary c)Octal e)Hexadecimal

53 Which of the following are NOT TRUE about extended partition? (two options)
a) The system partition cannot be located on it
b) The active partition can be located on it
c) Can contain only one logical drive.
d) The boot partition can be located on it.

54 Which two of the following statements about Positional numbering system are TRUE?
a) The numer of the symbols are very few
b) Each symbol represented some value irrespective of its position in the number
c) Each symbol represented different value depending on the position it occupies
d) Numer system consisted of bar like I, II, ... is positional number system

55 In Windows 2000 Professional it is possible to restrict users from visiting a particular site
a) true b) false

56 ASCII uses bits per character
a) 8 b) 7 c) 6 e) None of above

57 Which three of the following statements are NOT TRUE?
a) One character is stored in one byte
b) Character K is represented by 45 in ASCII code
c) The number 35795 cannot be represented in bynary form
d) The ASCII code uses 8 bits to represent a single character
e) In the binary number system the value of the digit to the left will become twice its predecesor

58 The result of addition of binary numbers 1011011 and 1010110 is
a) 10100001 b)10110101 c)10110001 d)None of those

59 Which of the following statements are NOT TRUE about single user operating system?(2 choices)
a) Only one user can interact with it at a time
b) It supports 2 processor
c) MS-DOS is a single user operating system which acts as a client in networking environment

60 Which three of the following statements with reference to registers in CPU are TRUE?
a)They are the collection if wires used for data transmission from one part of the computer to another
b) The speed and performance of the CPU does not depend upon the number and size of the register
c) They are special high-speed storage area within the CPU
d) All data must be represented in the register before it can be processed
e) They can have the address of the memory where the data is stored instead of having the data itself
Về Đầu Trang Go down
Xem lý lịch thành viên http://c0811g.online-talk.net
 

Đề thi CF

Xem chủ đề cũ hơn Xem chủ đề mới hơn Về Đầu Trang 
Trang 1 trong tổng số 1 trang

Permissions in this forum:Bạn không có quyền trả lời bài viết
HN - Aptech ::  ::  :: -