28 Oct 2016

AKTU(UPTU) Previous Year Question Papers

Find Previous Year Question Papers,Notes, and Ebooks 


B.Tech First Year Question Papers for All Branch -

Click Here For Download Now
B.Tech Second Year Question Papers for All Branch-



B.Tech Third Year Question Papers for All Branch-


B.Tech Fourth Year Question Papers for All Branch-


MBA Previous Year Question Papers-


Notes and Ebooks:

  • Basic Electronics First Year -           Download
  • VLSI Ebook for ECE-                       Download                    



Keep following For More Updates......


Thank You 
Feedback : vsachin094@gmail.com 



RPSC Result Update

RPSC Jr Accountant Result will come on Friday.Not announced today due to power failure and horizontal reservation...

22 Oct 2016

Cocubes Pre Assess Analytical Reasoning 2015 Asked Questions

1.Pointing to a man ,Shailesh said:”his father is the only son of my father “. How is Shailesh related to man?
a.son     b. brother   c.father   d. grandfather
Ans-Father
2.Read the following information carefully and answer the following questions.

8 friends are sitting around a round table facing the center. Tisha is the only one sitting between Harish and Tanvi.Karuna and Tanvi are not neighbors.Kavitha and Dinesh sit together. Yash is the only one sitting between Supreeth and KarunaKavitha is sitting to the left of Supreeth.
Question: who is sitting opposite to Kavitha?
a.Tisha     b.Harish   c.Dinesh    d.Tanvi
Ans-Harish

3.Below is/are the given statement/s followed by two statements numbered 1 and 2.You have to take the given statements to be true even if they seem to be at variance with commonly known facts and decide which of the following conclusions follow(s) from the given statement/s disregarding commonly known fact.
Statement(s):
1.Some clips are small
2.All small are big
Conclusions:
1.       All big are small
2.       All small are clips
Ans-None of the conclusions can be inferred

4. For  each of the  question that follows the columns A,B and C are linked through a relation, what would be  the missing number in the cell with the question mark?
A
B
C
3
4
41
1
9
52
8
2
?
a. 75               b.32       c.40        d.66
C= 7A + 5B 
?=56 + 10 = 66


A
B
C
22
3
7
24
4
8
?
8
11
A.      28    44     32    23
5. If in a code language AMARAVATI is coded as ITAVARAMA, then in the same code language JABALPUR will be coded as:    RUPLABAJ                           RULPABAJ            RUPALBAJ          RUPLABJA

Ans-RUPLABAJ

6. Find the missing term(s) in the series given  below:
0.5,2.5,7.5,?,23.5,34.5,47.

11.5                      12.5                        14.5                        13.5

Ans-14.5


7. Find the missing term(s) in the series given  below:
144,73,14,8,236,?   Ops:   120                       119                         96           118
8. Below is/are given statements  followed by conclusions in the options. You have to take the given statement s to be true even if they seem to be variant with the commonly known facts and then decide which of the given conclusions  logically follow(s) from the given statements, disregarding commonly known   facts.
statements:
most dresses in that shop are expensive.
Ops:
There are cheap dresses  also in that shop.
Some dresses  in that shop are expensive.
Handloom  dresses in that shop are cheap.
There are no cheap dresses available in that shop.

Ans- Some dresses  in that shop are expensive.

9.



                      C                                A                              D                              B

10. The following question shows a sequence of folding of a piece of paper the problem figure. The dotted lines in the last image in the problem fig. shows the manner in which the folded paper was cut.
Which fig from the answer figure1,2,3,4 would closely resemble the pattern in which the cuttings appear when the paper is unfolded.


                                             4                            2                     1                          3

10. Which of the following sentences is formed with least number of vowels?
My friend is very reliable.    My sister is very innocent.    My brother is very adamant. My father is very honest.

Ans-My father is very honest.

11. Count the number of “q” in the following string
qppqqppqqppppqqqqppqqppqqqpp

16           15           14           12

Ans-14

13. In the following string, all the ‘9’ are replaced by ‘2’. Mark the option which contains the resultant string (after the replacement)   9119292287374839272    
2112222287374832272                    2112222287374882272   
2112212287374832272                    2112232287374832272

Ans-2112222287374832272 

14.  Below is/are given statement/s followed by two conclusions numbered I and II. You have to take the given statement/s to be true even if they seem to be at variance with the commonly known facts and then decide which of the given conclusions logically follow(s) from the given statement/s, disregarding commonly known fact.
Statement(s)
Some clips are small
All small are big
Conclusions:
All big are small
All small are clips

Options:
Only conclusion I follows
Only conclusion II follows
Neither conclusion I nor conclusion II follows
Both conclusion I and conclusion II follows

Ans-Neither conclusion I nor conclusion II follows

15. For the statement(s) given below, two conclusions numbered I and II are provided. You have to take the given statement(s) to be true even if seemed to be at variance with the commonly known facts and then decide which of the given conclusions logically follow(s) from the given statement(s), disregarding commonly known fact
Statement(s):
Some students have pencils
Most children have pencils
Conclusions:
Most  students are not children
Few children are students
Options:
Only conclusion I follows
Only conclusion II follows
Neither conclusion I nor conclusion II follows
Both conclusion I and conclusion II follows

Ans-Neither conclusion I nor conclusion II follows

17. If A means +, B means _, C means X, D means  /, E means square off , F means Square root of; then determine the value of the following an expression.
F(E3 A E4) B F(E13 B E12)
25           5              0              15

Ans:0








18. All the following will make a candidate eligible to get a technical job, except:
The one who is interested in CAT             The one who has cleared telephonic interview
The one who is interested in GATE          The one who has cleared written test

Ans-The one who is interested in CAT   

19. In which of the following cases, job will not be offered to a candidate?
When percentage of the candidate is greater than 60%          When the percentage of the candidate is less than 60%
When the candidate has cleared the written test             When candidate has cleared the telephonic interview

Ans-When the percentage of the candidate is less than 60%

20. What are the minimum number of stages by which a candidate will get offered?

4              5              6              3

21. For the given flow chart, in which of the following cases will the recruitment process fail?
If the candidate is not able to clear the written test         If the candidate is interested in GATE
If the candidate is interested in CAT and GATE                   If the candidate is interested in CAT

Thank you
Kindly Share..........

20 Oct 2016

Cocubes Computer Fundamental Questions Asked in 2015

                              COMPUTER FUNDAMENTALS


1. Consider following given code and predict its output.
           main()
          {
                    int num[ ] = {1,4,8,12,16};
                          int *a,*b;
                          int i;
                          a=num;
                           b=num+2;
                            i=*a+1;
                           printf("%d,%d,%d\n",i,*a,*b);
          }
ops:  A. 2,1,8   B.  4,1,8      C.  4,4,8    D.   2,4,8
Ans: 2,1,8

2. Suppose f(A,B)=A'+B. Simplified expression for function f(f(x+y,y),z) is :
ops :    A. x'+z   B. xyz   C. xy'+z   D.  None of the mention options
Answer:  xy'+z  
3. The number of control lines for a 8-to-1 multiplexer is:      ops :  A. 3   B. 4   C. 2   D. 5
Ans: 3

4. Stack is useful for implementing:     A. recursion   B.  depth first search   C. both (A) & (B)    D. breadth first search
Ans: Both(A) & (B)

5. HUB is a _______ device and switch is a ________ device.
ops : A. multicast,unicast   B. multicast,broadcast        C. broadcast,unicast  D. broadcast,multicast
Ans: C. broadcast,unicast 
6.what is the binary equivalent of the number 368?    a.111100000            b.111010000 c.101110000 d.110110000
Ans: c.101110000
7.what will be the output of the follwing loop?
#include
main()
{
While(Printf(“%d”,    printf(“az”)))
Printf(“by”);
}
a.none of these    b.it gives syntax error      c.it will print azbyazbyazbyazby…      d.it will print azbybyby… 
Ans: c.it will print azbyazbyazbyazby…     

8.which of the following combinations of the variables x,y,z makes the variable ‘a’ get the value 4
In the following expression?
A=(x>y)?((x>z)?x:z):( (y>z)?y:z)
a.x=3;y=4;z=2       b.x=6;y=5;z=3        c.x=5;y=4;y=5      d.x=6;y=3;z=5
Ans:  a.x=3;y=4;z=2      

9.press the enter key in all of the circumstances except…………
a.to insert a blank line into a document    b.to begin a new paragraph
c.when the insertion point reaches the right margin   d.in response to certain word commands
Ans: c.when the insertion point reaches the right margin  



10.what will be the output of the following c code?
#include
Int main()
{
Int a =0,b=1,c=2;
*(  (  a+1==1) ?  &b  :  &a)= a?   b  :  c;
Printf(“%d, %d, %d \n” a , b, c ;)
return 0;
}  options: a. 0,1,2   b. 2,2,2   c. 0,2,2   d. 1,1,2

11.The following fragment of c program will print?
char c[  ] = “DATA1234”
char * P = C;
printf (“%S” P+P[3]-P[1]);
a.DATA1234    b.234    c.1234    d.A1234
Ans: DATA1234   

12. What is Extended ASCII table
Ans: The Extended ASCII Character Set also consists of 128 decimal numbers and ranges from 128 through 255 (using the full 8-bits of the byte) 

13. Mozilla Firefox is a/an
Ans: web browser.

14.  ------------ helps in capturing the data and entering into computer system.
Ans: Input devices

15. Secret key encryption is also know as ----------
Ans: Private Key Encryption or Symmetric Key Encryption.

16. A class defined with in another class is named as
a)inheritance     b)nested    c)container class    d)encapsulation
Ans: b)nested   

18. what  is simplest way of implementing a graph in c or c++
         a)associative lists     b)both adjacency matrix and assosiative list             c)none of these
       d)adjacency matrix 

19. Which of the OSI model is responsible for compression and decompression
          a)presentation layer     b)transport layer    c)application layer              d)session layer
Ans: presentation layer    
20. Upon mixing two independent one-many relationships__________dependency arises.
          a)transitive            b)multivalued             c)functional              d)partial
Ans: Multivalued
    21. If L is left node, M is middle node, R is right node then an L-M-R traversal can be termed as_____
           A) post order      b) in order                 c) preorder               d) this is invalid order
   Ans: In order
If M-L-R then Preorder
If L-R-M then post order
    22. which of the OSI model layer is also known as end-to-end layer
           a) session layer              b) presentation layer   c) Transport layer               d) Network layer
   Ans: Transport Layer

23.  Which of  the OSI model layer is responsible for both encryption and decryption
          a) Presentation layer               b)Network layer               c) session layer              d) transport layer
Ans: Presentation Layer
24.  Identify the point that is not true with respect to stack
           a) not possible to insert or remove elements anywhere except the top of stack
           b) Stack supports LIFO(last in first out) for deleting elements
           c) None of these
           d) stack is dynamic set where elements are removed in reverse order of insertion
    
25. When word flag a possible spelling or grammar error, it also changes mark on the spelling and grammar status icon to _____________
         a) red x                 b) red check mark                c) green check mark                d) green x
Ans: Red X

26. Identify the point that is NOT true with respect to a qeue?
a.deletion from the queue happens only at the tail of the queue.
b.Queue supports FIFO(First In First Out)order of removal of elements.
c.none of these
d.Insertion in queue happens only at the head of the queue.

28. Periodic collection of all the free memory space sto form contiguous block of free space by an operating system is called:
a.garbage collection                 b.Dynamic memory allocation    c.collison               d.concatenation

29. In C psroramming array index stars from:    
a.0 or 1        b.0          c.1           d.none of these
Ans: 0

30. java source code is compiled into_________.
a.byte code       b.word code      c.bit code     d.objective code
Ans: Byte Code

31. the output quality of a printer is measured by:
a.Dots printed per unit time     b.Dot per centimeter    c.Dot per sq.inch    d.Dot per inch
Ans: Dot per sq.inch

32.The number of full and half adders required to add 16-bit numbers is:
a.16 half-adders,0 full-adders
b.8 half –adders,8 full-adders
c.4 half-adders,12 full-adders
d.1 half-adder,15 full-adders
Ans: d.1 half-adder,15 full-adders

33. To select a group of words,________.
a.right-click the first and last characters of the group to be selected
b.double-click anywhere within the group to be selected
c.click the group button on the formatting toolbar
d.drag the mouse pointer through the characters to be selected
Ans: d.drag the mouse pointer through the characters to be selected

34.what will be the output of following C code?
                1.  struct abc
                2.  {
                3.            int b=6;
                4.            char c;
                5.  }
                6.  structure;
                7.  int main()
                8.  {
                9.            int i=sizeof(structure);
                10.          printf(“%d”,i);
                11. }
a.4          b.1          c.2          d.6
Ans: 6



Thank You .....Kindly like and share,.....

18 Oct 2016

Roots of English – I

Hello, Friends....

We are going to provide notes for English Language Preparation for Placement Tests and All other Exams Preparation.

Download Notes from below Link :

Download Now 

For more update and online quizzes.....

Flow us on FB and Join FB group now...

Like FB Page

Join FB Group

16 Oct 2016

FB Quiz Solution 15-10

Join our FB Group for Daily Quizzes. ................... 


Answers with Explanation:

Quiz: 15/10/2016      

Computer Fundamentals 


Thank You.....

14 Oct 2016

FB Quiz Solution 14-10

Join our FB Group for Daily Quizzes. ................... 


Answers with Explanation:

Quiz: 14/10/2016      
Technical - ECE/EEE


Thank You.....

13 Oct 2016

Daily FB Quiz

Join our FB Group for Daily Quizzes. ................... 


Answers with Explanation:

Quiz: 13/10/2016      
 
Technical - ECE/EEE/ECT/EE


Thank You.....

12 Oct 2016

DMRC Previous Year Papers for All Posts

Download DMRC JE/CRA/ST/SC/Maintainer/Asst. Engg. etc Papers and Sample Papers for 2017.


Click on link below :


Download

Join and Like FB Group or Page for more Update.....

Join FB Group Now

Like Us on FB

Thank You.

5 Oct 2016

Computer General Knowledge For Upcoming Exams: Computer QUIZ

Computer General Knowledge For Upcoming Exams: Computer QUIZ


1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B

2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C

6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A

9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D

12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D

13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B

14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B


16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C

17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D

19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C


20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B

21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C

22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C

23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A


24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C

25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D

26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A

27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B

28. The ____________, also called the “brains†of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D

29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B

30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A

31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B

32. System software is the set of programs that enables your computers hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D

33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C

35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B

38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D

39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A

40. ____________ is the science revolving around the use of nano structures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A

41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D

42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A

43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B

44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B

46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A

49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D

50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A

Fill in the Blanks:

51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation. Answer: Mac

52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.
Answer: operating system

53. The type of operating system software you use depends on your computers.____________.
Answer: platform

54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.
Answer: Application

55. ____________are the fastest and most expensive computers.Answer: Supercomputers

56. A ____________ is approximately 1,000 bytes.Answer: kilobyte

57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.Answer: instructions

58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.Answer: stores

59. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1

60. A string of ____________ 0s and 1s is called a byte.Answer: eight (8)

61. The devices you use to enter data into a computer system are known as ____________ devices.Answer: input

62. The devices on a computer system that let you see the processed information are known as ____________ devices.Answer: output

63. ____________ is the set of computer instructions or programs that enable the hardware to perform different tasks.Answer: Software

64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).Answer: Internet

65. ____________ are computers that excel at executing many different computer programs at the same time.Answer: Mainframes

66. ____________is the application of computer systems and techniques to gather legal evidence.Answer: Computer forensics

67. ____________ is the science that attempts to create machines that will emulate the human thought process.Answer: Artificial intelligence (AI)

68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.Answer: Microsoft Windows

69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.Answer: data mining

70. Hard disk drives and CD drives are examples of ____________ devices.Answer: storage

71. You would use ____________ software to create spreadsheets, type documents, and edit photos.Answer: application

72. ____________ are computers that support hundreds or thousands of users simultaneously.Answer: Mainframes

73. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.Answer: Identity theft

74. Surgeons are using ____________ to guide robots to perform delicate surgery.Answer: computers

75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.Answer: simulators

True and False

76. Currently, the performance of tasks by robots is based on pre  programmed algorithms.Answer: True

77. Data can be a number, a word, a picture, or a sound.Answer: True

78. Strictly defined, a computer is a data processing device.
Answer: True

79. The discrepancy between the “haves†and “have-nots†with regard to computer technology is commonly referred to as the digital society.Answer: False (digital divide)

80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that pose threats to computer security.
Answer: True

81. Trend-spotting programs, developed for business, have been used to predict criminal activity.
Answer: True

82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.
Answer: False

83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True

84. Output devices store instructions or data that the CPU processes.
Answer: False (memory)

85. The CPU and memory are located on a special circuit board in the system unit called the motherboard.Answer: True

86. Nanostructures represent the smallest human-made structures that can be built.
Answer: True

87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible,whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).
Answer: True

88. Being computer fluent means that you should be able to build a computer yourself.
Answer: False

89. Embedded computers are self-contained computer devices that have their own programming and do not receive input.
Answer: True

90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.
Answer: False (network adapter)

91. With a wireless network, it is easier to relocate devices.
Answer: True

92. The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)


Matching:

93. Match the following terms with their approximate size:
I. kilobyte A. one million bytes
II. byte B. eight bits
III. gigabyte C. one thousand bytes
IV. megabyte D. one billion bytes
V. terabyte E. one trillion bytes
Answer: C, B, D, A, E

94. Match the following terms with their meanings:
I. printer A. storage device
II. scanner B. output device
III. RAM C. input device
IV. CPU D. a type of memory
V. CD drive E. processor
Answer: B, C, D, E, A

95. Match the following terms with their meanings:
I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly
II. supercomputer B. a computer that provides resources to other computers connected to a network
III. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as temperature control
V. server E. a small mobile computing device
Answer: C, A, D, E, B

96. Match the following terms with their meanings:
I. software A. transforming data into information
II. hardware B. data that has been organized or presented in a meaningful fashion
III. operating system C. any part of the computer that you can physically touch
IV. processing D. a set of computer programs that enables hardware to perform different tasks
V. information E. the most common type of system software, it controls the way in which the computer system functions
Answer: D, C, E, A, B

97. Match the following terms with their meanings:
I. system software A. the set of programs that enables computer hardware devices and application software to work together
II. application software B. the kind of operating system software you will use depends on this
III. platform C. operating system software generally used on PCs
IV. Microsoft Windows D. a set of programs used to accomplish a specific task
V. Mac OS E. operating system software used on the Apple Macintosh
Answer: A, D, B, C, E

98. Match the following terms with their meanings:
I. data A. the main circuit board in the system unit
II. memory B. the representation of a fact or idea (unprocessed information)
III. output C. processed data or information
IV. storage D. holds instructions or data that the CPU processes
V. motherboard E. data or information that can be accessed again
Answer: B, D, C, E, A

99. Match the following terms with their meanings:
I. bit A. the science revolving around the use of nanostructures to build devices on an extremely small scale
II. binary language B. the case that contains the system components
III. instructions C. consists of 0s and 1s
IV. system unit D. short for binary digit
V. nanotechnology E. steps and tasks necessary to process data into usable information
Answer: D, C, E, B, A


100. Match the following fields to the related computer technology:
I. medicine A. Internet research and virtual tours
II. business B. data mining
III. law enforcement C. robotics and simulation
IV. education D. computer forensics
V. archeology E. digital recreations of ruins
Answer: C, B, D, A, E

Thank You.....

Share to all and must like ...

Featured post

DMRC Previous Year Papers for All Posts

Download DMRC JE/CRA/ST/SC/Maintainer/Asst. Engg. etc Papers and Sample Papers for 2017. Click on link below : Download Join and L...