JR INSTRUCTOR-INFORMATION TECHNOLOGY -
INDUSTRIAL TRAINING -2014
1, Firefox, Opera, chrome, safari and Explorer are types of what’?
(A) Web browser
(B) Server
(C) Client (D) OS
Ans:
Web Browser
2. World Computer Security day :
{A) November 30
B) December 1 5
C) September 11
D) November 4
Ans:November 30
3 Along with whom did Bill Gates found Microsoft?
{A)
Charles Babbage {B)
Paul Allen
{C)
Dennis Ritchie {D)
Steve Jobs
Ans: Paul Allen
4. The Gateway Internet Acces8 Services GIAS) of India is situated in :
|
(A) |
Delhi |
(B) |
Mumbai |
|
(C) |
Chandigarh |
(D) |
Madurai |
Ans : Mumbai
C)ROM
D)RAM
Ans: ROM (read only memory)
6 Which of’ the following has decided to dins Satya Elementary so home from underprivileged children in rural India?
7. Which of the following is not a type of Database Management system?
(A) Hierarchical (B) network
(C) Relational
(D) sequential
sequential is not a type of database.
Type of database are:-
1) Hierarchical database:-
A hierarchical database model is a data model in which
the data are organized into a tree-like structure. The data are stored as
records which are connected to one another through links.
2) Network database:-
A network database is a type of database model
wherein multiple member records or files can be linked to multiple owner files
and vice versa.
3) Relational database:-
A relational database is a
digital database based on the relational model of data, as
proposed by E. F. Codd in 1970. A software system used to maintain relational
databases is a relational database management system.
|
To know more about database
model Please click here |
|
|
|
|
8. In what manner coding and testing are done'? (A) top-down (B) bottom up
(C) Cross sectional
(D) Adhoc Ans . Top -down 9. The variables which can be accessed by all modules in a program are known as?.
Ans: Global Variables 10. The number of Functional keys in key board : (A) 13 (B) 9 (C) 12
(D) 10 Ans: 12
A) 1
B) 2
Ans: 10 12. Which of the following computer language is used for artificial intelligence?
|
||||||||||||||||||
13. Which logic gate. is similar to the function of two parallel switched?
A. NAND
B. AND
C. OR
D. NOR
Ans : AND
A. bit - byte — record - field - database — file.
B. bit - byte — field - record - file--database.
C. bit - byte — file- field - record --database.
D. bit - file- field - record -byte-database.
Ans : bit - byte — field - record - file--database.
Option B
15. Fork is a
A.
the
dispatching task
B.
the creation of a new job
C. the creation .of a-.new process
D. increasing the priority of a task
Ans: the creation .of a-.new process
Option C
A. 16. The time required for fetching and execution of one simple task is :
A. Delay time
B. CPU Cycle
C. Real time
D. Seek time
The time required for the fetching and execution of one simple machine instruction is CPU cycle time.
17.Types of validation testing are
A. Alpha and Beta Testing
B. Top down and Bottom up testing
C. Both A and B
D. Recovery and integrated testing
18. Which of the. Following commands is used to display your working directory?
A.
prompt $p8$g
B. dir
C. pwd
D.
path
Ans: path
19. Example of SDI Application
A.
MS Paint
B. MS Excel
C.
Word pad
D.
None of the above
20 Tool bar displays:
A.
One single menu item
B.
Collection of button
C.
Collection of menu
item
D. None of the above
21 Data warehouse are intended as
A.
Static data
collection
B.
Database
C.
Large collection of
Data
D.
Storage of records
22. A single packet on a data link is known as
A.
path
B. frame
C. group
D. block
Ans:A single packet on a data link is known as Frame.
23.The access method used for cassette tape is
A. Direct
B. Random
C. Sequential
D. All the above
Ans: Sequential
24.Which of the following TCP/lP protocol is used for transferring files from one machine to another
A. RARP
B. ARP
C. HTTP
D. FTP
Ans:File Transfer Protocol (FTP)
A. Interrupts
B. Cache
C. DMA
D. Polling
Ans. Cache Memory
26. Which of the following uses least power
A. ECL
B. CMOS Chip
C. TTL
D. None of these
Ans: TTL (Doubt Please comment if it is wrong)
27. A logic gate is a electronic circuit which:
A. Alternate between 0 and 1 value
B. Works on binary algebra
C. Allows electron flow only in one direction
D. Makes logic decisions
Ans: Makes logic decisions
28.The Data Flow Diagram shows
A. The areas where they are stored
B. The Processes
C. The Flow of data
D. All of the above
Ans: All of the above
29. A flip flop can store
A. 1 bit of data
B. 2 bit of data
C. 3 bit of data
D. 4 bit of data
Ans: 1 bit of data
30. Out of LED and LCD which display consumes the least power?
A. LCD
B. LED
C. Both consumes same power
D. None of these
Ans . LCD
31. ASCII Stands for (repeating question)
A. American standard code for information interchange
B. All purpose scientific code for
information interchange
C. American Security code for information
interchange
D. American Scientific code for information
interchange
Ans:American Standard Code for Information Interchange(0-127)
32. Which of the following is not a transmission medium
A. Coaxial cable
B. Telephone lines
C. Modem
D. Microwave systems
Ans: Modem
33. Which of the following still used for adding numbers
A. EDSAC
B. ENIAC
C. UNIVAC
D. Abacus
Ans: Abacus
34. The average time necessary for the correct sector of a disk to arrive at read write head is
A. Downtime
B. Rotational delay
C. Seek time
D. Access time
Rotational delay : A rotational delay is the amount of time between information requests and how long it takes the hard drive to move to the sector where the requested data is located. In other words, it is a time measurement, in milliseconds (ms), of how long before a rotating drive can transfer data.
35. What type of computer programming is used for airplane ticketing system
A. Multi Programming
B. Real time programming
C. Time sharing
D. Batch Programming
Ans: Real time programming
36. Communication between computers is always
A. Serial
B. Parallel
C. Series parallel
D. Direct
Ans: Serial
37. The string containing certain required formatting information is called
A. Character array
B. Argument
C. Control string
D. Character string
Ans: Control String
38. SNMP Protocol is used for
A. Email
B. Network Management
C. Messaging
D. File Transfer
Ans: Network Management
39. Which algorithm techniques are used in merge sort algorithm (Repeated)
A. Dynamic Programming
B. Back tracking
C. Divide and Conquer
D. Greedy method
40. The operation which is commutative but not associative is (Repeated)
A. AND
B. EX-OR
C. OR
D. NAND
Ans: NAND
the flow of data
B. the processes
C. the areas where they are stored.
D. All of the above
Comments
Post a Comment