Friday 18 October 2013

Computer Awareness-65

     1.     When an organization gives contract for development of software; it has to give data to the service provider. In Such cases, the ownership of data should be____
a.       Transferred to the service provider
b.      With the client/organization that outsource services
c.       Shared by both parties
d.      Not transferred
     2.     A modem performs_________
a.       Modulation
b.      Demodulation
c.       Data compression
d.      All of these
     3.     Which of the following is NOT done by modem?
a.       Transmission Speed
b.      Data Accuracy
c.       Error detection and Correction
d.      Data Compression

     4.     A program coded in programming language is____________ .
a.       Target code
b.      Source code
c.       Block
d.      None of these
     5.      “Platform” in computer world means___________.
a.       Computer hardware used
b.      Operating Systems used
c.       Both of these
d.       None of these
     6.     Which of these biometric tools use thermal sensors along with infrared rays for identification?
a.       Key stroke dynamics
b.      Iris\ Retinal scan
c.       Speech recognition
d.      Fingerprint scanning
     7.     What is incorrect about software?
a.       It can manipulate computer
b.      It has programs, instructions
c.       It can be touched
d.      It can’t be touched
     8.     In liner linked list each node is divided into how many parts?
a.      
b.      4
c.      
d.      2
     9.     In liner linked list first part contains the information of the element and second                        called________ contains the address of the node in the list?
a.        The linked field or next pointer field 
b.      The previous pointer field
c.       The information of the element 
d.      None of these
     10. In doubly linked list each node is divided in to how many parts?
a.        
b.      3
c.      
d.      6
     11.     LIFO stands for:
a.       Left-in-first-off 
b.      Long- inbox- from- on
c.       Last-in-first-out 
d.      Last-in-from-open
     12. What is a stack?
a.       LIFO 
b.      FILO
c.       LOFT 
d.      FOLI
     13. FIFO stands for:
a.       First-in-first-out 
b.      First-inner-from-out
c.       First-inter-for-offer 
d.      First-in-first-out
     14.  A data structure that represents hierarchical relationship between various elements is                called?
a.       Trees 
b.      Queues
c.       Heaps 
d.      Shape
     15.  How many children are there in a binary tree?
a.      
b.      2
c.      
d.      5
     16. Finding the location of a given element is called:
a.       Sorting 
b.      Deletion
c.       Searching 
d.      In serration
     17. Combining the elements of two similar sorted structures in to a single structure are                        called:
a.       Traversal 
b.      Heaps
c.       Sorting 
d.      Merging
     18. Manual data can be put into computer by________
a.       Keyboard 
b.      MICR
c.       OCR 
d.      Scanner
     19. The_______ provides the go-ahead approval for the development of projects
a.       The project head 
b.      The user department head
c.       The senior management 
d.      All of the above
     20. Which not the following does not fall under the category of operations to be performed during development of software
a.       Personnel security 
b.      Logical access control
c.       Physical protection 

d.      Environmental protection    

No comments: