Practice It and computer - general awareness mcq Online Quiz (set-2) For All Competitive Exams

Q-1)   Pick the odd one out.

(a)

(b)

(c)

(d)

Explanation:

Read Only Memory (ROM) is a class of storage medium used in computers and other electronic devices. A hard disc drive is a data storage device. ROM is a primary storage medium while all others are secondary storage units.


Q-2)   Both the ALU and Control Section have special purpose storage locations called :

(a)

(b)

(c)

(d)

Explanation:

Both the ALU (Arithmetic Logic Unit) and Control Section have special purpose storage locations called registers.


Q-3)   How many bytes are equal to one kilobyte ?

(a)

(b)

(c)

(d)

Explanation:

The kilobyte is a multiple of the unit byte for digital information. It refers to either 1024 (210) bytes or 1000 (103 ) bytes, dependent upon context, in the fields of computer science and information technology.


Q-4)   Which of the following memory chip is programmed during the manufacturing process?

(a)

(b)

(c)

(d)

Explanation:

Read-only memory (ROM) is a class of storage medium used in computers and other electronic devices. It is programmed during manufacturing process.


Q-5)   Processor’s speed of a computer is measured in

(a)

(b)

(c)

(d)

Explanation:

million instructions per second (MIPS) is a measure of a computer’s processor speed. Many reported IPS values have represented “peak” execution rates on artificial instruction sequences with few branches, whereas realistic workloads typically lead to significantly lower IPS values.


Q-6)   Which algorithm is used to decide the path to transfer the packets from source to destination?

(a)

(b)

(c)

(d)

Explanation:

In order to transfer packets from a sending host to the destination host, the network layer must determine the path that the packets are to follow. Routing is the process by which systems decide where to send a packet.

It directs network packets from their source toward their destination through intermediate network nodes by specific packet forwarding mechanisms.


Q-7)   USB is _____ type of storage device.

(a)

(b)

(c)

(d)

Explanation:

The question has more than one option correct: secondary storage is also known as auxiliary storage or external storage. USB (memory stick) Flash Drive is a secondary data storage device that includes flash memory with an integrated USB interface.

USB flash drives are typically removable and rewritable, and physically much smaller than an optical disc. They are often used for the same purposes, for which floppy disks or CDs were used, i.e., for storage, data back-up and transfer of computer files.


Q-8)   What is the name of a memory buffer used to accommodate a speed differential ?

(a)

(b)

(c)

(d)

Explanation:

The memory buffer used to accommodate a speed differential is called cache. It is a hardware or software component that stores data so future requests for that data can be served faster. Cache serves to add fast memory between the CPU and main memory.


Q-9)   Which of the following is an example of a database manager?

(a)

(b)

(c)

(d)

Explanation:

An electric organizer is a small calculator-sized computer, often with an in-built diary application but few other functions such as an address book and calendar. It normally has a small alphanumeric keypad and an LCD screen of one, two or three lines.


Q-10)   A ‘bug’ in a programme is a

(a)

(b)

(c)

(d)

Explanation:

A software bug is an error, flaw, mistake, failure, or fault in a computer program or system that produces an incorrect or unexpected result, or causes it to behave in unintended ways.

Most bugs arise from mistakes and errors made by people in either a program's source code or its design, and a few are caused by compilers producing incorrect code.


Q-11)   A ‘Bit’ refers to

(a)

(b)

(c)

(d)

Explanation:

A bit (a contraction of binary digit) is the basic capacity of information in computing and telecommunications; a bit can have the value of either 1 or 0 (one or zero) only.

These attributes may be implemented, in a variety of systems, by means of a two-state device.


Q-12)   The period of the Second Generation Computers was

(a)

(b)

(c)

(d)

Explanation:

The period 1953-1964 is generally taken to be the period of second-generation computers.

Sometimes, 1946-1958 is supposed to be the period of first-generation computers. By 1948, the invention of the transistor greatly changed the computer's development.

The transistor replaced the large, cumbersome vacuum tube in televisions, radios and computers. As a result, the size of electronic machinery has been shrinking ever since. From 1955 onwards transistors replaced vacuum tubes in computer designs, giving rise to the "second generation" of computers.

A second generation computer, the IBM 1401, captured about one-third of the world market. IBM installed more than ten thousand 1401s between 1960 and 1964.


Q-13)   The Network is overloaded with enormous data sent by many computers within the network. The inability of the network to deliver the data is termed as __________ .

(a)

(b)

(c)

(d)

Explanation:

Network congestion in data networking and queueing theory is the reduced quality of service that occurs when a network node is carrying more data than it can handle.

Typical effects include queueing delay, packet loss or the blocking of new connections. Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity.


Q-14)   What is USB ?

(a)

(b)

(c)

(d)

Explanation:

Universal Serial Bus (USB) is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication and power supply between computers and electronic devices. USB was designed to standardize the connection of computer peripherals to personal computers, both to communicate and to supply electric power.


Q-15)   In a computer, what does RAM stand for ?

(a)

(b)

(c)

(d)

Explanation:

Random-access memory (RAM) is a form of computer data storage. A random-access device allows stored data to be accessed in very nearly the same amount of time for any storage location, so data can be accessed quickly in any random order. In contrast, other data storage media read and write data only in a predetermined order.


Q-16)   Processors contain a control unit and a/an:

(a)

(b)

(c)

(d)

Explanation:

Principal components of a processor (CPU) include the arithmetic logic unit (ALU) that performs arithmetic and logic operations, processor registers that supply operands to the ALU and store the results of ALU operations, and a control unit that fetches instructions from memory and “executes” them by directing the coordinated operations of the ALU, registers and other components.


Q-17)   Correct expansion of the term ‘http’ in Internet address is

(a)

(b)

(c)

(d)

Explanation:

The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. HTTP is the protocol to exchange or transfer hypertext.


Q-18)   Where is the proposed Microsoft Software Development Centre in India to come up?

(a)

(b)

(c)

(d)

Explanation:

Located in Hyderabad, the Microsoft India Development Center (MSIDC) is Microsoft’s largest software development center outside of their headquarters in Redmond, Washington. The MSIDC teams focus on strategic and IP sensitive software product development.


Q-19)   Which of the following is used to protect objects in computer system, in the absence of more complete protection schemes?

(a)

(b)

(c)

(d)

Explanation:

Passwords are often used to protect objects in the computer system, in the absence of more complete protection schemes. They can be considered a special case of either keys or capabilities. Passwords are the most common approach to authenticating a user identity.


Q-20)   An attribute that uniquely identifies the rows of a table is known as the ....... key.

(a)

(b)

(c)

(d)

Explanation:

An attribute that uniquely identifies the rows of a table is known as the primary key.