0% found this document useful (0 votes)
25 views111 pages

Computer Book English

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views111 pages

Computer Book English

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 111

COMPUTER

1) The code for a Web page is written using Hypertext Markup language.
2) The first computers were programmed using Machine language.
3) A file name is a unique name that you give to a file of information.
4) This can be another word for program software.
5) Any data or instruction entered into the memory of a computer is
considered as storage.
6) Which part of the computer displays the work done monitor.
7) A series of instructions that tells a computer what.
to do and how to do it is called a program.
8) Hardware is the part of a computer that one can touch and feel.
9) The role of a computer sales representative generally is to determine a
buyer's needs and match it to the correct hardware and software.
10) Supercomputers refers to the fastest, biggest and most expensive
computers
11) Executing is the process of carrying out commands
12) The rectangular area of the screen that displays a program, data, and or
information is a window
13) The process of a computer receiving information from a server on the
internet is known as downloading
14) Disk drive is the part of the computer helps to store information
15) Arithmetic operations include addition, subtraction, multiplication, and
division
16) A keyboard is the king of input device
17) An error is known as bug
18) A collection of related information sorted and dealt with as a unit is a file
19) Sending an e-mail is similar to writing a letter
20) IT stands for information technology
21) A menu contains commands that can be selected
22) Plotter, printer, monitor are the group consists of output devices
23) Edit menu is selected to cut, copy and paste
24) The most important or powerful computer in a typical network is
network server
25) The primary purpose of software is to turn data into information
26) The ability to find an individual item in a file immediately direct access is
used.
27) To make a notebook act as a desktop model, the notebook can be
connected to a docking station which is connected to a monitor and other
devices
28) You can use the tab key to move a cursor across the screen, indent a
paragraph.
29) A collection of related files is called record.
30) Storage that retains its data after the power is turned off is referred to as
non-volatile storage.
31) Internet is an example of connectivity.
32) Testing is the process of finding errors in software code.
33) A syntax contains specific rules and words that express the logical
steps of an algorithm.
34) Changing an existing document is called the editing documentation
35) Virtual memory is memory on the hard disk that the CPU uses as an
extended RAM.
36) Computers use the binary number system to store data and perform
calculations.
37) The windows key will launch the start buttons.
38) To move to the beginning of a line of text, press the home key.
39) When sending an e-mail, the subject lines describe the contents of the
message.
40) Tables, paragraphs and indexes work with when formatting text in word.
41) TB is the largest unit of storage.
42) The operating system tells the computer how to use its components.
43) When cutting and pasting, the item cut is temporarily stored in
clipboard.
44) The blinking symbol on the computer screen is called the cursor.
45) Magnetic tape is not practical for applications where data must be
quickly recalled because tape is a sequential because tape is a sequential
access medium.
46) Rows and columns are used to organize data in a spread sheet.
47) When you are working on documentation on PC, the document
temporarily stored in flash memory.
48) One megabyte equals approximately 1 million bytes.
49) Information travels between components on the motherboard through
buses.
50) RAM refers to the memory in your computer.
51) Computer connected to a LAN can share information and or share
peripheral equipment
52) Microsoft office is an application suite
53) Utilities can handle most system functions that aren't handled directly
by the operating system
54) If you receive an e-mail from someone you don't know then you should
delete it without opening it
55) A set of instructions telling the computer what to do is called program
56) LAN refers to a small single site network
57) A collection of programs that controls how your computer system runs
and processes information is called operating system.
58) Device drivers are small, special-purpose programs
59) Transformation of input into output is performed by the CPU
60) Data going into the computer is called input.
61) Binary choice offer only two options
62) To indent the first paragraph of your report, you should use tab key
63) Fields are distinct item that don't have much meaning to you in a given
context
64) A website address is a unique name that identifies a specific web site on
the web
65) Modem is an example of a telecommunications device
66) A set of computer programs used for a certain function such as word
processing is the best definition of a software package
67) You can start Microsoft word by using start button
68) A blinking symbol on the screen that shows where the next character
will appear is a cursor
69) Highlight and delete is used to remove a paragraph from a report you
had written
70) Data and time are available on the desktop at taskbar
71) A directory within a directory is called sub directory
72) Testing is the process of finding errors in software code
73) In Excel, charts are created using chart wizard option
74) Microcomputer hardware consists of three basic categories of physical
equipment system unit, input/ output, memory
75) Windows is not a common feature of software applications
76) A tool bar contains buttons and menus that provide quick access to
commonly used commands
77) For creating a document, you use new command at file menu
78) Input device is equipment used to capture information and commands
79) A programming language contains specific rules and words that
express the logical steps of an algorithm
80) One advantage of dial-up internet access is it utilizes existing telephone
security
81) Protecting data by copying it from the original source is backup
82) Network components are connected to the same cable in the star
topology
83) Two or more computers connected to each other for sharing information
form a network
84) A compute checks the database of user name and passwords for a
match before granting access
85) Computers that are portable and convenient for users who travel are
known as laptops
86) Spam is the term for unsolicited e-mail
87) Utility software type of program controls the various computer parts and
allows the user to interact with the computer
88) Each cell in a Microsoft office excel document is referred to by its cell
address, which is the cell's row and column labels
89) Eight digit binary number is called a byte
90) Office LANs that are spread geographically apart on a large scale can be
connected using a corporate WAN
91) Storage is the process of copying software programs from secondary
storage media to the hard disk
92) The code for a web page is written using Hyper Text Markup Language
93) Small application programs that run on a Web page and may ensure a
form is completed properly or provide animation are known as flash
94) In a relational database, table is a data structure that organizes the
information about a single topic into rows and columns
95) The first computers were programmed using assembly language
96) When the pointer is positioned on a hyperlink it is shaped like a hand
97) Booting process checks to ensure the components of the computer are
operating and connectedproperly
98) Checking the existing files saved on the disk the user determine what
programs are available on a computer
99) Special effect used to introduce slides in a presentation are called
animation
100) Computers send and receive data in the form of digital signals

Shortcut Keys of Computer

Shortcuts Uses of Shortcut keys

Alt + F File menu options in the current program

Alt + E Edits options in the current program

F1 Universal help (for any sort of program)

Ctrl + A Selects all text

Ctrl + X Cuts the selected item

Ctrl + Del Cut selected item

Ctrl + C Copy the selected item


Ctrl + Ins Copy the selected item

Ctrl + V Paste the selected item

Shift + Ins Paste the selected item

Home Takes the user to the start of the current line

Ctrl + Home Go to the beginning of the document

End Go to the end of the current line

Ctrl + End Go to the end of a document

Shift + Home Highlight from the prevailing position to the start of the
line

Shift + End Highlight from the prevailing position to end of the line

Ctrl + (Left Move one term to the left at a time


arrow)

Ctrl + (Right Move one term to the right at a time


arrow)

Ctrl + Plus Key Adjust the widths of all columns automatically, in


Windows Explorer

Alt + Enter Open the properties window for the selected icon or
program

Alt + Print Take a screenshot of the current page.


Screen
Ctrl + Alt + Del Reboot/Windows task manager

Ctrl + Esc These keys allow you to activate the start menu

F4 Its purpose in Windows 95 to XP is to open the locate


window

F5 Refresh the contents of your windows system

F3 Find anything from your system’s desktop

Alt + Esc Switch between desktop applications on the taskbar

F2 Rename the selected icon

Alt + Shift + Tab It allows you to switch back between ongoing


applications

Alt + Tab Switch between open applications/ programs.

Shift + Delete When you press the Shift and Delete keys together, your
program or files will be deleted permanently.

Alt + F4 It is used to close the ongoing program

Ctrl + F4 It’s used to swiftly close a document or a file that’s


currently open.

Alt + Shift + F1 When you wanna insert new worksheet use these keys
together

Shift + F3 With the help of these keys, you can open the MS-Excel
formula window
Shift + F5 When you press these keys together it will open the
search box

F11 The F11 key is used to create a chart in MS-Excel

Ctrl + Shift +; With the help of these keys, you can enter the current
time

Ctrl +; Use these keys together to enter the current date

Ctrl + K When you want to Insert a link, you can use these keys
together

Ctrl + F These keys are used to open find and replace options in
MS-Excel

Ctrl + G Use these keys together to open go-to options

Ctrl + B When you press these keys together it will bold


highlighted selection.

F2 When you want to edit the selected cell using this key

F5 With the help of this key, you can go to a specific cell

F7 With the help of this key, you can check the spell of
selected text

Ctrl + I These commands are used to Italicize highlighted


selection.

Ctrl + Space Use these keys together to select the entire column

Shift + Space Use these keys together to select the entire row
Ctrl + W Use these keys together to close the document

Ctrl + H Use these keys to open find and replace options

Ctrl + U With help of these keys, you can underline highlighted


text.

Ctrl + Y With help of these keys, you can underline highlighted


text.

Ctrl + Z With the help of these keys, you can undo the last
deleted action

Ctrl + F9 Use these keys to minimize a current window in MS-


Excel

Ctrl + F10 Use these keys to maximize the currently selected


window in MS-Excel

Ctrl + Tab With the help of these keys, you can move between two
or more open MS-Excel files

Alt + = With the help of these keys, you can initiate the formula
to add all of the above cells

Ctrl + With the use of these keys together you can insert the
value in the current cell from the above cell.

Ctrl + (Right With the help of these keys, you can jump on to the next
arrow) section of text

Ctrl + O Use these keys to open options in MS-Excel


Ctrl + N Use these keys together to open the document in MS-
Excel

Ctrl + P Use these keys together to open the print dialogue box
in MS-Excel

Ctrl + B Bold highlighted selection

Ctrl + C Copy selected text

Ctrl + X Cut selected text

Ctrl + N Open new/blank document

Ctrl + O Open options

Ctrl + P Open the print window

Ctrl + F Open find box

Ctrl + I Italicize highlighted selection

Ctrl + K Insert link

Ctrl + U Underline highlighted selection

Ctrl + V Paste

Ctrl + G Find and replace options

Ctrl + H Find and replace options

Ctrl + J Justify paragraph alignment

Ctrl + L Align selected text or line to the left


Ctrl + Q Align selected paragraph to the left

Ctrl + E Align selected text or line to the centre

Ctrl + R Align selected text or line to the right

Ctrl + M Indent the paragraph

Ctrl + T Hanging indent

Ctrl + D Font options

Ctrl + Shift + F Change the font

Ctrl + Shift + > Increase selected font +1

Ctrl + ] Increase selected font +1

Ctrl + [ Decrease selected font -1

Ctrl + Shift + * View or hide non printing characters

Ctrl + (Left Move one word to the left


arrow)

Ctrl + (Right Move one word to the right


arrow)

Ctrl + (Up arrow) Move to the beginning of the line or paragraph

Ctrl + (Down Move to the end of the paragraph


arrow)

Ctrl + Del Delete the word to the right of the cursor

Ctrl + Backspace Delete the word to the left of the cursor


Ctrl + End Move the cursor to the end of the document

Ctrl + Home Move the cursor to the beginning of the document

Ctrl + Space Reset highlighted text to the default font

Ctrl + 1 Single-space lines

Ctrl + 2 Double-space lines

Ctrl + 5 1.5-line spacing

Ctrl + Alt + 1 Change text to heading 1

Ctrl + Alt + 2 Change text to heading 2

Ctrl + Alt + 3 Change text to heading 3

Shift + F3 Change case of selected text

Shift + Insert Paste

F4 Repeat the last action performed (Word 2000+)

F7 Spell check selected text and/or document

Shift + F7 Activate the thesaurus

F12 Save as

Ctrl + S Save

Shift + F12 Save

Alt + Shift + D Insert the current date

Alt + Shift + T Insert the current time


Ctrl + W Close document

Ctrl+= Set chosen text as a subscript.

Ctrl+Shift+= Set chosen text as superscript.

Ctrl+Shift+< Reduce the font size of the selected text by one size.

CTRL + G Group things together

Ctrl+M Create a new slide just after your chosen slide.

CTRL + D Create a duplicate of your current slide.

Esc Exit the ongoing slide show and it will redirect you to
the earlier live view.

Ctrl+K When you want to enter a hyperlink use these keys


together.

Ctrl+Shift+> These commands are used to maximize the font size of


the selected text by one size.

F5 With the help of F5, you can start the presentation from
the initial slide.

Ctrl+N These commands are used in a different Powerpoint


software window, create a new, blank slide.

List of Computer Abbreviations


Sl Computer Full Form
No. Abbreviation

1 AAC Advanced Audio Coding

2 ABR Average Bit Rate

3 ADSL Asymmetric Digital Subscriber Line

4 AGP Advanced Graphics Port

5 AI Artificial Intelligence

6 AIM AOL Instant Messenger

7 ALGOL Algorithmic Language

8 ALU Arithmetic Logic Unit

9 AOL America Online

10 AMD Advanced Micro Devices

11 API Application Program Interface

12 APT Automatically Programmed Tooling

13 ARP Address Resolution Protocol

14 ARPANET Advanced Research Projects Agency Network


15 ARQ Automatic Repeat Request

16 AS Autonomous System

17 ASCII American Standard Code for Information


Interchange

18 ASP Active Server Pages

19 ASPI Advanced SCSI Programming Interface

20 ATA Advanced Technology Attachment

21 ATDT Attention Dial Tone

22 AUI Attachment Unit Interface

23 AUTOEXEC Autoexec Automatic Execution file

24 AVI Audio Video Interleave

25 BASIC Beginner’s All-purpose Symbolic Instruction


Code

26 BCC Blind Carbon Copy

27 BCD Binary Coded Decimal

28 BCR Bar Code Reader

29 BDSL Broadband DSL

30 BEDO Burst Extended Data Out (RAM)


31 BGP Border Gateway Protocol

32 BHTML Broadcast Hyper Text Markup Language

33 BIOS Basic Input Output System

34 BIPS Billion Instruction Per Second

35 BIU Bus Interface Unit

36 BMP Bitmap

37 BRD Blu-Ray Disc

38 CC Carbon Copy

39 CD Compact Disk

40 CD-R Compact Disk – Recordable

41 CDROM Compact Disk Read Only Memory

42 CDRW Compact Disk Rewritable

43 CD-WO Compact Disk – Write Once

44 CD-XA Compact Disk – Extended Architecture

45 CGI-BIN Common Gateway Interface – Binary


(programming for Web forms)

46 CIS CompuServe Information Service


47 CISC Complex Instructions Set Computers

48 CMD Command

49 CMYK Cyan-Magenta-Yellow-Black (color model)

50 CNM Circulatory Network Mode

51 COAX Coaxial Cable (for Ethernet and similar networks)

52 COBOL Common Business Oriented Language

53 COMPUTER Commonly Operated Machine Particularly Used


for Trade/Technology, Education, and Research.

54 CPI Clock / Cycle Per Instruction

55 CPU Central Processing Unit

56 CROM Computerized Range of Motion

57 CRT Cathode Ray Tube( standard type computer


monitor display

58 CSLIP Compressed Serial Line Interface Protocol


(Internet)

59 CSS Cascading Style Sheets

60 CTRL Control (computer keyboard key)

61 CUI Character User Interface


62 DAC Data Acquisition and Control

63 DAT Digital Audio Tape

64 dB Decibel

65 DBMS Data Base Management System

66 DDL Data Definition Language

67 DHTML Dynamics Hyper Text Markup Language

68 DML Data Manipulation Language

69 DNS Domain Name System

70 DOC Data Optimizing Computer

71 Doc Document

72 DOS Disk Operating System

73 DRAM Dynamic Random Access Memory

74 DVD Digital Video/Versatile Disc

75 DVDR Digital Versatile Disk Recordable

76 DVDRW Digital Versatile Disk Rewritable

77 DCE Data Communications Equipment


78 DVI Digital Visual Interface

79 DVR Digital Video Recorder

80 E-Commerce Electronic Commerce

81 EDC Electronic Digital Computer

82 EDI Electronic Data Interchange

83 EDP Electronic Data Processing

84 EEPROM Electronically Erasable Programmable Read Only


Memory

85 EFS Encrypted File System

86 EIDE Enhanced Integrated Drive Electronics

87 E-Mail Electronic Mail

88 EPROM Erasable Programmable Read Only Memory

89 EROM Erasable Read Only Memory

90 FDD Floppy Disk Drive

91 GB Giga Byte

92 GDI Graphical Device Interface

93 GUI Graphical User Interface


94 HD Hard Disk

95 HTML Hyper Text Markup Language

96 HTTP Hyper Text Transfer Protocol

97 I/O Input/Output (serial and parallel ports)

98 IC Integrated Circuit

99 IMAP Internet Message Access Protocol

100 INTEL Integrated Electronics

101 IOP Input Output Processor

102 IP Internet Protocol

103 ISDN Integrated Services Digital Network

104 ISP Internet Service Provider

105 IVR Interactive Voice Response

106 KB KILOBYTE

107 Kbps Kilobits/Kilobytes Per Second

108 LAN Local Area Network

109 LED Light Emitting Diode


110 LLL Low Level Language

111 LPT Line Printer

112 MAC Media Access Control

113 MAN Metropolitan Area Network

114 MB Motherboard/ Megabyte

115 MBASIC Microsoft BASIC (Microsoft)

116 MBPS Megabytes Per Second

117 Mbps Megabits Per Second

118 MICR Magnetic Ink Character Recognition

119 MMX Multimedia Extensions

120 MODEM Modulator Demodulator

121 MSCDEX Microsoft Compact Disc Extension

122 MS-DOS Microsoft – Disk Operating System

123 NAT Network Address Translation

124 NTP Network Time Protocol

125 OCR Optical Character Reader


126 OMR Optical Mark Reader

127 OOP Object Oriented Programming

128 OS Operating System

129 P2P Point to Point Protocol

130 PAN Personal Area Network

131 PC Personal Computer

132 PCB Printer Circuit Board

133 PCI Peripheral Component Interconnect

134 PHP Hypertext Preprocessor

135 PIXEL Picture Element

136 PNG Portable Network Graphics

137 PPP Point to Point Protocol

138 PRN Printer

139 PROM Programmable Read Only Memory

140 RAM Random Access Memory

141 RARP Reverse Address Resolution Protocol


142 RDBMS Relational Data Base Management System

143 RIP Routing Information Protocol

144 RISC Reduced Instruction Set Computer

145 ROM Read Only Memory

146 SAM Software Asset Management

147 SAN Storage Area Network

148 SCSI Small Computer System Interface

149 SDRAM Synchronous Dynamic Random Access Memory

150 SFTP Secure File Transfer Protocol

151 SGML Standard Generalized Markup Language

152 SGRAM Synchronous Graphics RAM

153 SIP Session Initiation Protocol

154 SIU Serial Interface Unit

155 SMTP Simple Mail Transfer Protocol

156 SNAP Sub Network Access Protocol

157 SNMP Simple Network Management Protocol


158 SRAM Static Random Access Memory

159 SYSOP System Operator

160 TCP Transmission Control Protocol

161 UI User Interface

162 URL Uniform Resource Locator

163 USB Universal Serial Bus

164 VCD Video Compact Disk

165 VDU Visual Display Unit

166 VIRUS Vital Information Resource Under Siege

167 VRAM Video Random Access Memory

169 VxD Virtual Extended Driver

170 WAN Wide Area Network

171 WAP Wireless Application Protocol

172 WBMP Wireless Bitmap Image

173 WIFI Wireless fidelity

174 WLAN Wireless Local Area Network


175 WML Wireless Markup Language

176 WWW World Wide Web

178 XGA Extended Graphics Array

179 XHTML Extensible Hyper Text Markup Language

180 XMF Extensible Music File

181 XML Extensible Markup Language

182 XMS Extended Memory Specification

183 FORTRAN Formula Translation

DATABASE MANAGEMENT SYSTEM

DBMS is the software that allows a computer to perform database functions


of storing, retrieving, editing, deleting and modifying data into the database.
Such as MySQL, PostgreSQL, Microsoft SQL Server, Oracle, SAP and IBM
DB2 etc.
TYPES OF MODEL IN DATABASE
● Hierarchical DBMS
● Network DBMS
● Relational DBMS
● Object-oriented DBMS
● Object Relational DBMS

ENTITY RELATIONSHIP MODEL

E-R MODEL COMPONENTS


TYPES OF KEYS IN DBMS
● Super Key- All columns define uniquely identified a record
● Candidate Key- One or more columns define uniquely identified a
record
● Primary Key- Uniquely identified a record
● Foreign Key- Hyperlink Keys
● Composite Key- Two or more columns define uniquely identified a
record
● Default Key- Defines default value
● Check Key- Defines some rule

PLATFORMS PROVIDED BY SQL

● DDL- Data Definition Language


● DML- Data Manipulation Language
● DCL- Data Control Language
● TCL- Transaction Control Language
● DQL- Data Query Language
MULTIPLE CHOICE QUESTIONS

If a relation scheme is in BSNF then it is also in


A. First normal form
B. Second normal form
C. Third normal form
D. Not in any normal form
E. All of above
Ans: C

Attribute of one table matching to the primary key of other table, is called as
A. foreign key
B. secondary key
C. candidate key
D. composite key
E. super key
Ans: A
Allocation map
A. Used to store program data
B. specifies which blocks are used by which file
C. is updated by application programs
D. allow programs to erase files
E. No program will stop permanently
Ans: B
The master list of an indexed file
A. is sorted in ascending order
B. contains only a list of keys and record numbers
C. has a number assigned to each record
D. none of above
E. all of above
Ans: C
Database management systems are used to
A. eliminate data redundancy
B. establish relationships among records in different files
C. manage file access
D. none of above
E. all of above
Ans: A
Ascending order of data hierarchy is
A. bit->byte->record->field->file->database
B. bit->byte->field->record->file->database
C. byte->bit->field->record->file->database
D. byte->bit->field->file->record->database
E. none of these
Ans: B
Which is not a logical database structure?
A. Chain
B. Tree
C. Relational
D. Network
E. Object Oriented
Ans: A
Embedded pointer provides
A. a secondary access path
B. a physical record key
C. an inverted index
D. a virtual access
E. all of above
Ans: A

Which among following contains a complete record of all activity that


affected the contents of a database during a creation period of time?
A. report writer
B. query language
C. DML
D. transaction log
E. query processor
Ans: D Transaction processing was made possible by the development
of
A. direct access storage
B. magnetic tape
C. cash register input
D. minicomputers
E. All of above
Ans: A

Physical location of a record in database is determined with the help of


A. B tree file
B. Indexed file
C. Hashed file
D. sequential file
E. Random file
Ans: C

Modify operation is likely to be done after


A. Delete
B. Lookup
C. Indexing
D. Insertion
E. Commit
Ans: B

Which among following is not a relational database?


A. dBase IV
B. 4th Dimension
C. FoxPro
D. Reflex
E. None of these
Ans: D
Related fields in a data base are grouped to form
A. data file
B. data record
C. menu
D. bank
E. tuple
Ans: B

Data item characteristics that are important in data management include


A. punctuation
B. language
C. spelling
D. width
E. data storage
Ans: D

Data dictionary tell DBMS


A. what files are in the database
B. what attributes are processed by data
C. what these files contain
D. all of above
E. none of these
Ans: D
Non procedural query language can be related with
A. Function dependency
B. B tree
C. Domain calculus
D. Relational algebraic operators
E. None of these
Ans: C

Which normal form is considered adequate for normal relational database


design
A. 2NF
B. 5NF
C. 3NF
D. 4NF
E. 1NF
Ans: C

EASY EXERCISE

● SQL stands for Structured Query Language. SQL is used to


communicate with a database.
● PL/SQL (Procedural Language/Structured Query Language) is Oracle
Corporation's procedural extension for SQL and the Oracle relational
database.
● RDBMS is the basis for SQL, and for all modern database systems like
MS SQL Server, IBM DB2, Oracle, MySQL, and Microsoft Access.
● An INSTANCE, in object-oriented programming (OOP), is a specific
realization of any object. An object may be varied in a number of ways.
Each realized variation of that object is an instance.
● CARDINALITY refers to the uniqueness of data values contained in a
column.
● High CARDINALITY means that the column contains a large
percentage of totally unique values.
● Low CARDINALITY means that the column contains a lot of “repeats”
in its data range.
● DML Compiler translates DML statements in a query language or into
low-level instruction.
● Boyce–Codd normal form (or BCNF or 3.5NF) is a normal form used in
database normalization. It is a slightly stronger version of the third
normal form (3NF).
● METADATA summarizes basic information about data, which can make
finding and working with particular instances of data easier.
● A database SCHEMA defines its entities and the relationship among
them. It contains a descriptive detail of the database.
● Normalization is a process of organizing the data in database to avoid
data redundancy, insertion anomaly, update anomaly & deletion
anomaly.
● A STORED PROCEDURE is a set of Structured Query Language (SQL)
statements with an assigned name that's stored in the database in
compiled form so that it can be shared by a number of programs.

NETWORKING AND DATA COMMUNICATION

The connections between nodes are established using either cable media or
wireless media. In computer networks, networked computing devices
exchange data with each other using a data link.
MULTIPLE CHOICE QUESTIONS

TCP/IP suite was created by


A. IEEE
B. Department of defence
C. Open source
D. Embedded system
E. None of above
Ans: B

TCP/IP reference model contains how many layers


A. 3
B. 4
C. 6
D. 7
E. 5
Ans: B

Telnet
A. allows user to connect client machine remotely
B. transferring files
C. sharing files
D. allows user to see delivery report
E. none of above
Ans: A

Which protocol deals with emails


A. FTP
B. SMTP
C. LPD
D. X window
E. HTTP
Ans: B

Which protocol deals with resolving domain names?


A. X-Window
B. SMTP
C. DNS
D. FTP
E. HTTP
Ans: C

Which protocol ensures reliable delivery?


A. TCP
B. UDP
C. FTP
D. All of above
E. None of above
Ans: A

Which protocol uses window flow system?


A. UDP
B. TCP
C. FTP
D. SMTP
E. FTP
Ans: B
ICMP works on which layer
A. Physical Layer
B. Data link Layer
C. Network layer
D. Transport Layer
Ans: C

Which protocol uses both TCP and UDP?


A. FTP
B. SMTP
C. Telnet
D. DNS
E. HTTP
Ans: D

Which layer of TCP/IP stack is equivalent to transport layer of OSI


A. Application layer
B. Host to Host layer
C. Internet
D. Session layer
E. Network access
Ans: B

Which layer will be used while transmitting data using FTP or Telnet?
A. Network
B. Application
C. Physical
D. Data link
E. Transport
Ans: B

Which company developed TCP/IP protocol for networking?


A. IBM
B. DEC
C. DARPA
D. Xerox
E. CDAC
Ans: C

Which class is given wrong here?


A. CLASS A = 1 to 126
B. CLASS B = 128 to 191
C. CLASS C = 192 to 220
D. CLASS D = 224 to 239 (Multicasting)
E. CLASS E = 240 to 255 (Research)
Ans: C

Which IP is reserved for loopback testing?


A. 192.168.0.0
B. 10.255.255.255
C. 255.0.0.0
D. 192.168.1.0
E. None of above
Ans: D *127.0.0.1 is reserved for loopback testing*

Which protocol finds the MAC address from IP ADDRESS?


A. SMTP
B. ICMP
C. ARP
D. RARP
E. RAID
Ans: C

EASY EXERCISE
● IP address or IPv4 is 32 bit/4 byte/8 nibble long in length.
● IPv6 address is 128 is 128 bit/16 byte/32 nibble in length.
● IP transport data in packets called datagram
● The address resolution protocol (ARP) is used to associate a logical
address with physical address.
● Each device on a link is identified by physical address which is imprinted
on network interface card.
● ARP is used to find physical address of the node when its internet
address is known.
● The reverse address resolution RARP is used to find internet address
when physical address is known.
● Internet control message protocol ICMP is used by host and gateways to
send notification of datagram problem back to senders.
● Line coding is the process of converting digital data to digital signal.
● Wavelength division multiplexing WDM is an analog multiplexing
technique to combine optical signal.
● Time division multiplexing TDM is a digital multiplexing technique.
● A virtual circuit network is a cross between a circuit switched network
and datagram network.
● Fast Ethernet has a data rate of 100 mbps.
● A Bluetooth network is called piconet.multiple piconet form a network
called scatter net.
● IPSec IP security operates on transport mode or tunnel mode.
● Digital signature needs an asymmetric key system.

DATA STRUCTURE, PROGRAMMING LANGUAGES, OOPS


SORTING CASE TABLE

WORST AVERAGE BEST CASE


CASE CASE

BUBBLE SORT O(n2) O(n2) O(n)

INSERTION SORT O(n2) O(n2) O(n)

MERGE SORT O(n log n) O(n log n) O(n log n)

HEAP SORT O(n log n) O(n log n) O(n log n)

QUICK SORT O(n2) O(n log n) O(n log n)


CONCEPT OF OOPS

MULTIPLE CHOICE QUESTIONS


Preorder is
A. depth first order
B. breadth first order
C. topological order
D. linear order
E. All of above
Ans: A

Information about an array used in a program will be stored in


A. symbol table
B. activation record
C. dope vector
D. system table
E. none of these
Ans: C

++i is equivalent to
A. i = i + 2
B. i = i + 1
C. i = i + i
D. i = i – 1
E. i = i + 0
Ans: B

Repeated execution of simple computation may cause compounding of


A. round off errors
B. syntax errors
C. run time errors
D. logic errors
E. compile time errors
Ans: A

Deletion from one end and insertion from other end is


A. stack
B. branch
C. tree
D. queue
E. array
Ans: D

Which statement we should ignore in structure programming


A. WHILE-DO
B. GO-TO
C. IT-ELSE
D. SWITCH
E. NESTING
Ans: B

In C how many parameters can passed to a function


A. 2
B. 5
C. 10
D. 12
E. as many as defined in function definition
Ans: E

Minimum number of stacks of size n required to implement a queue of size


n
A. One
B. Two
C. Three
D. Four
E. Ten
Ans: B

Which is problem oriented language


A. BASIC
B. PL/I
C. FORTRAN
D. COBOL
E. none of above
Ans: E
Sort which compares adjacent elements in a list and switches where
necessary is
A. Insertion sort
B. Heap sort
C. Quick sort
D. Bubble sort
E. Merge sort
Ans: D Recursive problems are implemented by
A. queues
B. stacks
C. linked lists
D. strings
E. array
Ans: B

Recursive problems are implemented by


A. queues
B. stacks
C. linked lists
D. strings
E. array
Ans: B

A linear list from which elements can be added or removed from either end
is called
A. stack
B. queue
C. deque
D. tree
E. heap
Ans: C

Which is ALGOL based simulation language


A. FORTRAN
B. SIMSCRIPT
C. GASP IV
D. ALGOL
E. none of above
Ans: B

How many divisions are there in COBOL language


A. Two
B. Three
C. Four
D. Five
E. One
Ans: C

O log(n) can be connected with


A. Selection sort
B. Insertion sort
C. Binary sort
D. Merge sort
E. Heap sort
Ans: C

Which of the languages is often translated to the pseudo code


A. PASCAL
B. FORTRAN
C. PL/I
D. BASIC
E. C++
Ans: A

Merge sort uses


A. Divide and conquer strategy
B. Backtracking approach
C. Heuristic search
D. Greedy approach
E. Paging approach
Ans: A

Which is having highest precedence in C


A. relational operators
B. equality operator
C. logical operator
D. arithmetic operator
E. syntax operator
Ans: D

Which sorting method is slowest


A. Quick sort
B. Heap sort
C. Shell sort
D. Bubble sort
E. Merge sort
Ans: D

EASY EXERCISE

● A binary search tree whose left sub tree and right sub tree differ in
height by at most 1 unit is called AVL Tree.
● A Java applet is a small dynamic Java program that can be transferred
via the Internet and run by a Java-compatible Web browser. The time
during which a variable retains its value is known as its lifetime
variable. An assembler is a program that takes basic computer
instructions and converts them into a pattern of bits that the
computer's processor can use to perform its basic operations.
● A high-level language is a programming language such as C,
FORTRAN, or Pascal that enables a programmer to write programs that
are more or less independent of a particular type of computer.

● Runtime error that occurs during the execution of a program. In


contrast, compile-time errors occur while a program is being compiled.
● Object-oriented programming (OOP) is a programming paradigm based
on the concept of "objects", which may contain data, in the form of
fields, often known as attributes; and code, in the form of procedures,
often known as methods.
● Function overloading, a software engineering process whereby
multiple functions of different types are defined with the same name.
● In object-oriented programming, inheritance is when an object or class
is based on another object or class using the same implementation or
specifying a new implementation to maintain the same behavior.

COMPUTER ARCHITECTURE & MICROPROCESSOR

Computer architecture is a set of rules and methods that describe the


functionality, organization, and implementation of computer systems. The
first documented computer architecture was in the correspondence
between Charles Babbage and Ada Lovelace, describing the analytical
engine.
MICROPROCESSOR ARCHITECTURE
INSTRUCTION CYCLE

SOFTWARE INTERRUPT

When a Process is executed by the CPU and when a user Request for
another Process then this will create disturbance for the Running Process.
This is also called as the Interrupt.
Interrupts can be generated by User, Some Error Conditions and also by
Software’s and the hardware’s. But CPU will handle all the Interrupts very
carefully because when Interrupts are generated then the CPU must handle
all the Interrupts Very carefully means the CPU will also Provides Response
to the Various Interrupts those are generated. So that When an interrupt has
Occurred then the CPU will handle by using the Fetch, decode and Execute
Operations.

Types of Interrupts
Generally there are three types o Interrupts those are Occurred For
Example

1) Internal Interrupt
2) Software Interrupt
3) External Interrupt

MULTIPLE CHOICE QUESTIONS

The main virtue for using single Bus structure is


A. Fast data transfers
B. Cost effective connectivity and speed
C. Cost effective connectivity and ease of attaching peripheral devices
D. None of these
E. All of above
ANS: C

______ are used to overcome the difference in data transfer speeds of


various devices .
A. Speed enhancing circuitory
B. Bridge circuits
C. Multiple Buses
D. Buffer registers
E.Memory registers
Ans:D

To extend the connectivity of the processor bus we use ______ .


A. PCI bus
B. SCSI bus
C. Controllers
D. Multiple bus
E.Serial bus
Ans:A
IBM developed a bus standard for their line of computers ‘PC AT’ called
_____
A.IB bus
B.M-bus
C. ISA
D.None of these
E.All of above
Ans:C

The bus used to connect the monitor to the CPU is ______ .


A.PCI bus
B.SCSI bus
C.Memory bus
D.Ram bus
E. CPU bus

Ans:B

ANSI stands for,


A. American National Standards Institute
B. American National Standard Interface
C. American Network Standard Interfacing
D. American Network Security Interrupt
E.None of these
Ans:A

_____ register Connected to the Processor bus is a single-way transfer


capable .
A.PC
B. IR
C.Temp
D. Z
E.AI
Ans:D
In multiple Bus organization, the registers are collectively placed and
referred as ______ .
A. Set registers
B. Map file
C. Register Block
D. Map registers
E. Register file
Ans:E

The main advantage of multiple bus organization over single bus is,
A. Reduction in the number of cycles for execution
B. Increase in size of the registers
C. Better Connectivity
D.None of these
E.Only A and B
Ans:A

The ISA standard Buses are used to connect,


A. RAM and processor
B. CPU and processor
C. ROM and Processor
D. CD/DVD drives and Processor
E. Hard disk and Processor

Ans:E
The decoded instruction is stored in ______ .
A. IR
B. PC
C. Registers
D. MDR
E. None of these
Ans:A

The instruction -> Add LOCA,R0 does,


A. Adds the value of LOCA to R0 and stores in the temp register
B. Adds the value of R0 to the address of LOCA
C. Adds the values of both LOCA and R0 and stores it in R0
D. Adds the value of LOCA with a value in accumulator and stores it in R0
E. None of these
Ans:C

Which registers can interact with the secondary storage?


A. MAR
B. PC
C. IR
D. R0
E. R1
Ans:A
During the execution of a program which gets initialized first?
A. MDR
B. IR
C. SYS
D. MAR
E. PC
Ans:E

Which of the register/s of the processor is/are connected to Memory Bus?


A. PC
B. MAR
C. IR
D.Both a and b
E.AI
Ans:B

ISP stands for,


A. Instruction Set Processor
B. Information Standard Processing
C. Interchange Standard Protocol
D. Interrupt Service Procedure
E.None of these
Ans:A

The internal Components of the processor are connected by _______


.
A. Processor intra-connectivity circuitry
B. Processor bus
C. Memory bus
D. Ram bus
E.Address bus

Ans:B

______ is used to choose between incrementing the PC or performing ALU


operations.
A. Conditional codes
B. Multiplexer
C. Control unit
D. Bus
E. None of these

Ans:B

The registers, ALU and the interconnection between them are collectively
called as _____ .
A. Process route
B. Information trail
C. Information path
D. Sequence path
E. Data Path

Ans:E
_______ is used to store data in registers.
A. D flip flop
B. JK flip flop
C. RS flip flop
D. none of these
E. Both B and C
Ans:A

EASY EXERCISE

● The Intel 4004 is generally regarded as the first commercially available


microprocessor.
● An interrupt is a signal to the processor emitted by hardware or
software indicating an event that needs immediate attention.
● A pipeline is a set of data processing elements connected in series,
where the output of one element is the input of the next one.
● HTTP pipelining, where multiple requests are sent without waiting for
the result of the first request.
● A linear pipeline processor is a series of processing stages and
memory access.
● A non linear pipelining (also called dynamic pipeline) can be
configured to perform various functions at different times. In a
dynamic pipeline there is also feed forward or feedback connection.
Non-linear pipeline also allows very long instruction words.
● The microprocessor is a multipurpose, clock driven, register based,
programmable electronic device which accepts digital or binary data
as input, processes it according to instructions stored in its memory,
and provides results as output.
● A digital signal processor (DSP) is specialized for signal processing.
● A microprocessor control program (embedded software) can be easily
tailored to different needs of a product line, allowing upgrades in
performance with minimal redesign of the product.
● The Intel 8080 was the second 8-bit microprocessor designed and
manufactured by Intel and was released in April 1974. It was an
extended and enhanced variant of the earlier 8008 design, although
without binary compatibility.

OPERATING SYSTEM

An operating system (OS) is system software that manages computer


hardware and software resources and provides common services for
computer programs. Time-sharing operating systems schedule tasks for
efficient use of the system and may also include accounting software for
cost allocation of processor time, mass storage, printing, and other
resources.
TYPES OF OPERATING SYSTEMS

Single- and multi-tasking


A single-tasking system can only run one program at a time, while a multi-
tasking operating system allows more than one program to be running in
concurrency.

Single- and multi-user


Single-user operating systems have no facilities to distinguish users, but
may allow multiple programs to run in tandem.

Distributed
A distributed operating system manages a group of distinct computers and
makes them appear to be a single computer.

Templated
In an OS, distributed and cloud computing context, templating refers to
creating a single virtual machine image as a guest operating system, then
saving it as a tool for multiple running virtual machines.

Embedded
Embedded operating systems are designed to be used in embedded
computer systems. They are designed to operate on small machines like
PDAs with less autonomy.

Real-time
A real-time operating system is an operating system that guarantees to
process events or data by a specific moment in time.

Library
A library operating system is one in which the services that a typical
operating system provides, such as networking, are provided in the form of
libraries.

COMPILER
PROCESS STATE DIAGRAM

MULTIPLE OBJECTIVE CHOICE QUESTIONS


Which scheduling policy is best suited for time-sharing operating systems
A. Shortest job first
B. Round robin
C. First come first serve
D. Elevator
E. First come last serve
ANS: B

Memory protection is normally done by


A. the processor and the associated hardware
B. the operating system
C. the compiler
D. the user program
E. all of above
ANS: A

Which among following scheduling algorithms give minimum average


waiting time
A. FCFS
B. SJF
C. Round robin
D. On priority
E. LIFO
ANS: B

Dirty bit is used to show


A. Page with corrupted data
B. Wrong page in memory
C. Page that is modified after being loaded in the cache memory
D. page that is less frequently accessed
E. All of above
ANS: C

In real time OS, which is most suitable scheduling scheme


A. round robin
B. FCFS
C. Linear scheduling
D. random scheduling
E. pre-emptive scheduling
ANS: E
Size of virtual memory depends on
A. size of data bus
B. size of address bus
C. size of main memory
D. all of above
E. none of above
ANS: B

Semaphores are used to solve the problem of


A. race condition
B. process synchronization
C. mutual exclusion
D. belady problem
E. errors
ANS: C

For multiprogramming operating system


A. special support from processor is essential
B. special support from processor is not essential
C. cache memory is essential
D. both A and B
E. none of above
ANS: B

In which scheduling policies, context switching never takes place


A. FCFS
B. round robin
C. Shortest job first
D. Pre-emptive
E. Post-emptive
ANS: A

Which is single user operating system


A. MS-DOS
B. UNIX
C. XENIX
D. LINUX
E. None of these
ANS: A

A thread is
A. lightweight process where the context switching is high
B. used to speed up paging
C. used in dead locks
D. used in mapping
E. lightweight process where the context switching is low
ANS: E Reference bit is used for
A. Implementing LRU page replacement algorithm
B. Implementing NRU algorithm
C. To check the page table entry in the cache memory
D. To troubleshoot
E. none of above
ANS: B

Which operating system reacts in the actual time


A. Batch system
B. Quick response system
C. Real time system
D. Time sharing system
E. All of above
ANS: C

Macintosh computer uses


A. System 7.0
B. AU/X
C. Xenix
D. Unix
E. none of above
ANS: B
Problem of thrashing is affected significantly by
A. program structure
B. program size
C. primary storage size
D. program counter
E. all of above
ANS: A
Which technique is used by operating systems to execute several programs
concurrently by switching back and forth
A. Partitioning
B. Multitasking
C. Windowing
D. Paging
E. Multiprocessing
ANS: C

Dispatcher function is to
A. put tasks in I/O wait
B. schedule tasks in processor
C. change task priorities
D. push and pop
E. All of above
ANS: A

The part of machine level instruction, which tells the central processor what
has to be done, is
A. Operation code
B. Address
C. Locator
D. Flip-Flop
E. Registers
ANS: A
What is the name given to the values that are automatically provided by
software to reduce keystrokes and improve a computer user's productivity?
A. Defined values
B. Fixed values
C. Default values
D. String values
E. None of the above
ANS: C

Multiprogramming systems
A. Are easier to develop than single programming systems
B. Execute each job faster
C. Execute more jobs in the same time
D. Are used only on large main frame computers
E. None of above
ANS: C

EASY EXERCISE

● A process in an operating system is represented by a data structure


known as a process control block (PCB) or process descriptor.
● The current state of the process i.e., whether it is ready, running,
waiting, or whatever.
● Multiple threads can exist within one process, executing concurrently
and sharing resources such as memory.
● Throughput: Number of processes completed per unit time.
● Turnaround time: The interval from time of submission of the process
to the time of completion of the process.
● Waiting time: The sum of the periods spent waiting in the ready queue.
● Response time: The time of submission to the time the first response
is produced.
● Round robin scheduling similar to first come first serve scheduling
algorithm.
● A deadlock is a situation in which two computer programs sharing the
same resource are effectively preventing each other from accessing
the resource, resulting in both programs ceasing to function.
● A semaphore, in its most basic form, is a protected integer variable
that can facilitate and restrict access to shared resources in a multi-
processing environment.
● Deadlock prevention algorithms are used in concurrent programming
when multiple processes must acquire more than one shared resource.

NETWORK SECURITY & MALWARE

“A access and also ensure that employees have adequate access to the
network and resources specialized field in computer networking that
involves securing a computer network infrastructure. Network security is
typically handled by a network administrator or system administrator who
implements the security policy, network software and hardware needed to
protect a network and the resources accessed through the network from
unauthorized to work.”
Malware, short for malicious software, is any software used to disrupt
computer or mobile operations, gather sensitive information, gain access to
private computer systems, or display unwanted advertising. Malware is a
category of malicious code that includes viruses, worms, and Trojan
horses.
Adware: The least dangerous and most lucrative Malware. Adware displays
ads on your computer.

Spyware:. Spyware is software that spies on you, tracking your internet


activities in order to send advertising (Adware) back to your system.

Virus: A virus is a contagious program or code that attaches itself to


another piece of software, and then reproduces itself when that software is
run. Most often this is spread by sharing software or files between
computers.

Worm: A program that replicates itself and destroys data and files on the
computer. Worms work to “eat” the system operating files and data files
until the drive is empty.
Trojan: The most dangerous Malware. Trojans are written with the purpose
of discovering your financial information, taking over your computer’s
system resources, and in larger systems creating a “denial-of-service
attack”

Denial-of-service attack: an attempt to make a machine or network resource


unavailable to those attempting to reach it. Example: AOL, Yahoo or your
business network becoming unavailable.

Root kit: This one is likened to the burglar hiding in the attic, waiting to take
from you while you are not home. It is the hardest of all Malware to detect
and therefore to remove; many experts recommend completely wiping your
hard drive and reinstalling everything from scratch. It is designed to permit
the other information gathering Malware in to get the identity information
from your computer without you realizing anything is going on.

Backdoors: Backdoors are much the same as Trojans or worms, except that
they open a “backdoor” onto a computer, providing a network connection
for hackers or other Malware to enter or for viruses or SPAM to be sent.

Key loggers: Records everything you type on your PC in order to glean your
log-in names, passwords, and other sensitive information, and send it on to
the source of the key logging program. Many times key loggers are used by
corporations and parents to acquire computer usage information.
Rogue security software: This one deceives or misleads users. It pretends
to be a good program to remove Malware infections, but all the while it is
the Malware. Often it will turn off the real Anti-Virus software. The next
image shows the typical screen for this Malware program, Antivirus 2010

Ransom ware: If you see this screen that warns you that you have been
locked out of your computer until you pay for your cybercrimes. Your
system is severely infected with a form of Malware called Ransom ware. It is
not a real notification from the FBI, but, rather an infection of the system
itself. Even if you pay to unlock the system, the system is unlocked, but you
are not free of it locking you out again. The request for money, usually in
the hundreds of dollars is completely fake.

Browser Hijacker: When your homepage changes to one that looks like
those in the images inserted next, you may have been infected with one
form or another of a Browser Hijacker. This dangerous Malware will redirect
your normal search activity and give you the results the developers want
you to see. Its intention is to make money off your web surfing.

TYPES OF HACKERS

MULTIPLE OBJECTIVE CHOICE QUESTIONS


What is anti-virus?

A. It is a computer
B. It is a program code
C. It is a company name
D. It is an application
E. All of above
ANS: B

Dirty bit is used to show the

A. age with corrupted data


B. The wrong page in the memory
C. Page that is modified after being loaded into cache memory
D. Page that is less frequently accessed.
E. None of above
ANS: C
…………….. are used in denial of service attacks, typically against targeted
web sites.

A. Worm
B. Zombie
C. Virus
D. Trojan horse
E. None of above
ANS: B

A ………………… attaches itself to executable files and replicates, when the


infected program is executed, by finding other executable files to infect.

A. Stealth virus
B. Polymorphic Virus
C. Parasitic Virus
D. Macro Virus
E. All of above
ANS: C

…………………….. is a form of virus explicitly designed to hide itself from


detection by antivirus software.

A. Stealth virus
B. Polymorphic Virus
C. Parasitic Virus
D. Macro Virus
E. None of these
ANS: A

A …………………….. creates copies during replication that are functionally


equivalent but have distinctly different bit patterns.

A. Boot Sector Virus


B. Polymorphic Virus
C. Parasitic Virus
D. Macro Virus
E. All of above
ANS: B

A portion of the Polymorphic virus, generally called a …………………….. ,


creates, a random encryption, key to encrypt the remainder of the virus.

A. Mutual engine
B. Mutation engine
C. Multiple engines
D. Polymorphic engine
E. None of above
ANS: B

A ……………… is a program that secretly takes over another Internet-


attached computer and then uses that computer to launch attacks.

A. Worm
B. Zombie
C. Virus
D. Trap doors
E. All of above
ANS: B
Which of the following is most likely to come with other malware?

A. Trojan
B.Worm
C.Virus
D.Spyware
E.Adware
ANS: A

Which of the following is most likely to install a "backdoor" internet


connection?
A. Trojan
B.Worm
C.Virus
D.Spyware
E.Adware
ANS: B What is the name of the viruses that fool a user into downloading
and/or executing them by pretending to be useful applications?

A. Cracker
B. Worm
C. Trojan horses
D. Key logger
E.All of above
ANS: C

The virus that spread in application software is called as

A. Boot virus
B. Macro virus
C. File virus
D. Anti virus
E.All of above
ANS: B
How does a Le-Hard virus come into existence?

A. Hardware
B. Software
C. FRIDAY 13
D. Command.Com
E.All of above
ANS: D

What is the virus that spread in computer?

A. It is hardware
B. It is system software
C. It is a computer program
D. It is a windows tool
E. All of above
ANS: C

What kind of attempts is made by individuals to obtain confidential


information from a person by falsifying their identity?

A. Computer viruses
B. Spyware scams
C. Phishing scams
D. None of the above
E. All of above
ANS: C

When does the time bomb occur?

A. During a particular logic and data


B. During a particular time
C. During a particular data or
time
D. None of the above
E. All of above
ANS: C

Delayed payload of some viruses is also called as

A. Time Bomb
B. Logic Bomb
C. Anti-virus
D. None of the above
E. All of above
ANS: B

What is the first boot sector virus?

A. Brain
B. Mind
C. ELK cloner
D. None of the above.
E. All of above
ANS: A

What is the name of first computer virus?

A. The Famous
B. HARLIE
C. PARAM
D. Creeper
E. All of above
ANS: D
The difference between a virus and a self-replicating program which is like a
virus is that rather than creating copies of itself on only one system it
propagate through computer
network. What is the self replicating program called?

A. Key logger
B. Cracker
C. Worm
D. All of the above
E. None of these
ANS: C

EASY EXERCISE

● MAC (Machine Access Control) address: A MAC address is a unique


serial number assigned to every network interface on every device.
Mac address is like your physical mail box, only your postal carrier
(network router) can identify it and you can change it by getting a new
mailbox (network card) at any time and slapping your name (IP
address) on it.
● Open Source Foot printing: It will look for the contact information of
administrators that will be used in guessing the password in Social
engineering.
● Network Enumeration: The hacker tries to identify the domain names
and the network blocks of the target network.
● Scanning: Once the network is known, the second step is to spy the
active IP addresses on the network. For identifying active IP
addresses (ICMP) Internet Control Message Protocol is an active IP
addresses.
● Stack Fingerprinting: Once the hosts and port have been mapped by
scanning the network, the final foot printing step can be performed.
● DOS (Denial of service) attack: Denial of Service is a malicious attack
on network that is done by flooding the network with useless traffic.
Although, DOS does not cause any theft of information or security
breach, it can cost the website owner a great deal of money and time.
● A Botnet is a term used to describe multiple computers infected by a
similar malware bot, all controlled by the same operator.
● Logic bombs A destructive program which is triggered by a date, time,
or event, and when triggered, it destroys data and/or other programs.
● Locky is ransom ware malware released in 2016. It is delivered by
email with an attached Microsoft Word document that contains
malicious macros.
● Email spoofing is the forgery of an email header so that the message
appears to have originated from someone or somewhere other than the
actual source. Email spoofing is a tactic used in phishing and spam
campaigns because people are more likely to open an email when they
think it has been sent by a legitimate source.

WEB TECHNOLOGIES & SOFTWARE ENGINEERING

Web technology is the establishment and use of mechanisms that make it


possible for different computers to communicate and share resources. Web
technologies are infrastructural building blocks of any effective computer
network: Local Area Network (LAN), Metropolitan Area Network (MAN) or a
Wide Area Network (WAN), such as the Internet. Communication on a
computer could never be as effective as they are without the plethora of
web technologies in existence.

HTTP STATUS CODES

HTTP ERROR 500 (INTERNAL SERVER ERROR)


HTTP ERROR 404 (NOT FOUND)
HTTP ERROR 403 (FORBIDDEN)
HTTP ERROR 400 (BAD REQUEST)
HTTP ERROR 401 (UNAUTHORIZED)

SOFTWARE ENGINEERING

Software engineering is a field of engineering, for designing and writing


programs for computers or other electronic devices. A software engineer, or
programmer, writes software (or changes existing software) and compiles
software using methods that make it better quality. Better quality software
is easier to use, and the code is easier to understand, to maintain, and to
add new features. Becoming a software engineer requires university level
classes and practice writing code.

HISTORY OF INTERNET
DIFFERENCE AMONG BLACK, WHITE & GRAY BOX TESTING

ARPANET

On a cold war kind of day in 1969 work began on Arpanet, the grandfather to
the Internet. Designed as a computer version of the nuclear bomb shelter,
Arpanet protected the flow of information between military installations by
creating a network of geographically separated computers that could
exchange information via a newly developed technology called NCP or
Network Control Protocol.

MULTIPLE CHOICE QUESTIONS

What is internet?

A. a single network
B. a vast collection of different networks
C. interconnection of local area networks
D. a duplex network
E. none of the mentioned
Ans:B

To join the internet, the computer has to be connected to a


A. internet architecture board
B. internet society
C. internet service provider
D. internet router
E. none of the mentioned
Ans:C

Internet access by transmitting digital data over the wires of a local


telephone network is provided by
A. leased line
B. digital subscriber line
C. digital signal line
D. ISDN
E. none of the mentioned
Ans:B

ISP exchanges internet traffic between their networks by


A. internet exchange point
B. subscriber end point
C. ISP end point
D. P2P point
E. none of the mentioned
Ans:A

Which one of the following protocol is not used in internet?


A. HTTP
B. DHCP
C. DNS
D. FTP
E. none of the mentioned
Ans:E

IPv6 addressed have a size of


A. 32 bits
B. 64 bits
C. 128 bits
D. 265 bits
E. 255 bits
Ans:C

Internet works on
A. packet switching
B. circuit switching
C. network switching
D. both (a) and (b)
E. none of the mentioned
Ans:A
Which one of the following is not an application layer protocol used in
internet?
A. remote procedure call
B. internet relay chat
C. resource reservation protocol
D. UDP
E. none of the mentioned
Ans:C
Which protocol assigns IP address to the client connected in the internet?
A. DHCP
B. IP
C. RPC
D. DSL
E. none of the mentioned
Ans:A
Which one of the following is not used in media access control?
A. Ethernet
B. digital subscriber line
C. fiber distributed data interface
D. ISDN
E. none of the mentioned
Ans:E Build & Fix Model is suitable for programming exercises of
___________ LOC (Line of Code).

A. 100-200
B. 200-400
C. 400-1000
D. above 1000
E. above 10000
Ans:A

RAD stands for


A. Relative Application Development
B. Rapid Application Development
C. Rapid Application Document
D. Rapid Action Development
Ans:B

Which one of the following models is not suitable for accommodating any
change?
A. Build & Fix Model
B. Prototyping Model
C. RAD Model
D. Waterfall Model
E. Hierarchical Model
Ans:D

Which is not one of the types of prototype of Prototyping Model?


A. Horizontal Prototype
B. Vertical Prototype
C. Diagonal Prototype
D. Domain Prototype
E. None of these
Ans:C

Which one of the following is not a phase of Prototyping Model?


A. Quick Design
B. Coding
C. Prototype Refinement
D. Engineer Product
E. None of these
Ans:B

Which of the following statements regarding Build & Fix Model is wrong?
A. No room for structured design
B. Code soon becomes unfix- able & unchangeable
C. Maintenance is practically not possible
D. It scales up well to large projects
E. All of above
Ans:D

RAD Model has


A. 2 phases
B. 3 phase
C. 5 phases
D. 6 phases
E. 7 phases
Ans:C
What is the major drawback of using RAD Model?
A. Highly specialized & skilled developers/designers are required.
B. Increases re-usability of components.
C. Encourages customer/client feedback.
D. Both a & c.
E. None of these
Ans:D

SDLC stands for


A. Software Development Life Cycle
B. System Development Life cycle
C. Software Design Life Cycle
D. System Design Life Cycle
E. All of above
Ans:A

Which model can be selected if user is involved in all the phases of SDLC?
A. Waterfall Model
B. Prototyping Model
C. RAD Model
D. both b & c
E. None of above
Ans:C

EASY EXERCISE

● The World Wide Web (abbreviated WWW or the Web) is an information


space where documents and other web resources are identified by
Uniform Resource Locators (URLs), interlinked by hypertext links, and
can be accessed via the Internet. English scientist Tim Berners-Lee
invented the World Wide Web in 1989.
● Hypertext Transfer Protocol (HTTP) is an application protocol for
distributed, collaborative, hypermedia information systems.
● Telnet is an application layer protocol used on the Internet or local
area networks to provide a bidirectional interactive text-oriented
communication facility using a virtual terminal connection.
● Domain Name System (DNS) is a hierarchical decentralized naming
system for computers, services, or any resource connected to the
Internet or a private network.
● Internet Protocol version 4 (IPv4) is the fourth version of the Internet
Protocol (IP). It is one of the core protocols of standards-based
internetworking methods in the Internet.
● Internet Protocol version 6 (IPv6) is the most recent version of the
Internet Protocol (IP), the communications protocol that provides an
identification and location system for computers on networks and
routes traffic across the Internet. IPv6 was developed by the Internet
Engineering Task Force (IETF) to deal with the long-anticipated
problem of IPv4 address exhaustion.
● Simple Mail Transfer Protocol (SMTP) is an Internet standard for
electronic mail (email) transmission.
● Digital subscriber line is used to transmit digital data over telephone
lines.
● Search engine optimization (SEO) is the process of affecting the
visibility of a website or a web page in a web search engine's unpaid
results—often referred to as "natural", "organic", or "earned" results.
● An extranet is a website that allows controlled access to partners,
vendors and suppliers or an authorized set of customers – normally to
a subset of the information accessible from an organization's intranet.

DIGITAL ELECTRONICS & INFORMATION SYSTEM


PIPELINING

A pipeline is a set of data processing elements connected in series, where


the output of one element is the input of the next one. The elements of a
pipeline are often executed in parallel or in time-sliced fashion; in that case,
some amount of buffer storage is often inserted between elements.
INFORMATION SYSTEM
An information system is any organized system for the collection,
organization, storage and communication of information. More specifically,
it is the study of complementary networks that people and organizations
use to collect, filter, and process, create and distribute data.

MEMORY MAPPING

A memory-mapped file is a segment of virtual memory that has been


assigned a direct byte-for-byte correlation with some portion of a file or file-
like resource. This resource is typically a file that is physically present on-
disk, but can also be a device, shared memory object, or other resource that
the operating system can reference through a file descriptor. Once present,
this correlation between the file and the memory space permits applications
to treat the mapped portion as if it were primary memory.

MULTIPLE CHOICE QUESTIONS

The Schmitt trigger may be used to?


A. change voltage to corresponding frequency
B. Change frequency to voltage
C. Square slowly varying input
D. Change frequently location
E. None of above
Ans: C

Which of the following is minimum error code?


A. Octal code
B. Grey code
C. Binary code
D. Red code
E. Excess 3 code
Ans: B

Popular application flip-flop are ?


A. Counters
B. Shift registers
C. Transfer registers
D. All of above
E. PCB

Ans: D

SR Flip flop can be converted to T-type flip-flop if ?


A. S is connected to Q
B. R is connected to Q
C. Both S and R are short end
D. Both A and B
E. S and R are connected to Q and Q' respectively

Ans: D

Register is a ?
A. Set of capacitor used to register input instructions in a digital
computer
B. Set of paper tapes and cards put in a file
C. Temporary storage unit within the CPU having dedicated or general
purpose use
D. Part of the auxiliary memory
E. Part of main memory
Ans: C
For which of the following flip-flop the output clearly defined for all
combinations of two inputs?
A. Q type flip-flop
B. R S type flip-flop
C. J K flip-flop
D. T flip-flop
E. S flip-flop
Ans: C

A simple flip-flop
A. is 2 bit memory
B. is 1 bit memory
C. is a four state device
D. is a two state device
E. has nothing to do with memory
Ans: B

An SR flip flop cannot accept the following input entry


A. Both input zero
B. zero at R and one at S
C. zero at S and one at R
D. zero and one
E. Both inputs one
Ans: E

The main difference between JK and RS flip-flop is that?


A. JK flip-flop does not need a clock pulse
B. there is feedback in JK flip-flop
C. JK flip-flop accepts both inputs as 1
D. JK flip-flop is acronym of junction cathode multivibrator
E. All of above
Ans: C

Radix of binary number system is _____?


A. 0
B. 1
C. 2
D. 3
E. A & B
Ans: C
Any number with an exponent of zero is equal to:
A. zero
B. one
C. that number
D. five
E. ten
Ans: B

What is a digital-to-analog converter?


A. It allows the use of cheaper analog techniques, which are always
simpler.
B. It takes the digital information from an audio CD and converts it to a
usable form.
C. It converts direct current to alternating current.
D. It stores digital data on a hard drive.
Ans: B
The output of an AND gate is LOW ________.
A. when any input is LOW
B. all the time
C. when all inputs are HIGH
D. when any input is HIGH
E. when a input is constant
Ans: A
The output of an OR gate is LOW when
A. all inputs are LOW
B. any input is LOW
C. any input is HIGH
D. all inputs are HIGH
E. all inputs are CONSTANT
Ans: A

When used with an IC, what does the term "QUAD" indicates?
A. 4 circuits
B. 2 circuits
C. 8 circuits
D. 6 circuits
E. 16 circuits
Ans: A

How many pins does the 4049 IC have?


A. 20
B. 16
C. 14
D. 18
E. 56
Ans: B

The Boolean expression for a 3-input AND gate is ________.


A. X = AB
B. X = ABC
C. X = A + B + C
D. X = AB + C
E. X = AB-BC+ABC
Ans: B
What is the Boolean expression for a three-input AND gate?
A. X = A + B + C
B. X = A · B · C
C. A �?? B �?? C
D. A BB C
E. A – B - C
Ans: B

What is the Boolean expression for a three-input AND gate?


A. X = A + B + C
B. X = A · B · C
C. A · B · C
D. A BB C
E. A*B*C
Ans: B

The systematic reduction of logic circuits is accomplished by:


A. symbolic reduction
B. using symbolic code
C. using Boolean algebra
D. TTL logic
E. using a truth table
Ans: C

EASY EXERCISE

● An encoder is a device, circuit, transducer, software program,


algorithm or person that converts information from one format or code
to another, for the purposes of standardization, speed or
compressions.
● Decoder is a combinational logic circuit that converts a binary integer
value to an associated pattern of output bits.
● An instruction cycle is the basic operational process of a computer. It
is the process by which a computer retrieves a program instruction
from its memory, determines what actions the instruction dictates, and
carries out those actions.
● Paging is a memory management scheme by which a computer stores
and retrieves data from secondary storage for use in main memory.
● Cache memory, also called CPU memory, is random access memory
(RAM) that a computer microprocessor can access more quickly than it
can access regular RAM.
● Associative memory in computer organization is when memory is
accessed through content rather than through a specific address.
● Logic gate is an elementary building block of a digital circuit. Most
logic gates have two inputs and one output. At any given moment,
every terminal is in one of the two binary conditions low (0) or high (1),
represented by different voltage levels.
● An Adder, also called summer, is a digital circuit that performs
addition of numbers. In many computers and other kinds of
processors, adders are used not only in the arithmetic logic units, but
also in other parts of the processor, where they are used to calculate
addresses, table indices, increment and decrement operators, and
similar operations.
● A flip-flop or latch is a circuit that has two stable states and can be
used to store state information. A flip-flop is a bitable multivibrator.
● JK flip Flop is the most widely used of all the flip-flop designs and is
considered to be a universal flip-flop circuit.

HARDWARE- SOFTWARE & MEMORY UNIT

Computer hardware is the collection of physical components that constitute


a computer system. Computer hardware is the physical parts or
components of a computer, such as monitor, keyboard, computer data
storage, hard disk drive (HDD), graphic card, sound card, memory (RAM),
motherboard, and so on, all of which are tangible physical objects.
Computer software is that part of a computer system that consists of
encoded information or computer instructions, in contrast to the physical
hardware from which the system is built.
Computer memory is any physical device capable of storing information
temporarily or permanently. For example, Random Access Memory (RAM),
is a volatile memory that stores information on an integrated circuit used by
the operating system, software, and hardware.

TYPES OF SOFTWARE
MEMORY UNIT
MULTIPLE CHOICE QUESTIONS
Where does a computer add and compare data ?
A. Hard disk
B. Floppy disk
C. CPU chip
D. LSI chip
E. Memory chip
Ans: C

Which generation of computers is converted by the period 1964-1977 ?


A. First
B. Second
C. Third
D. Forth
E. FIFTH
Ans: C

The word "Computer" usually refers to the Central processing unit plus?
A. External memory
B. Internal memory
C. Input devices
D. Output devices
E. Peripheral devices
Ans: B

Which of the following belongs to the first generation of computer ?


A. ENIAC
B. IBM 1401
C. IBM 8090
D. UNIVAC
E. EDVAC
Ans: D

What hardware was used by first generation computer ?


A. Transistors
B. Values
C. VLSI
D. ICs
E. LSI
Ans: B

A typical modern computer uses ?


A. LSI chips
B. Vacuum tubes
C. Values
D. Variable
E. All of above
Ans: A

Which device can produce the final product of machine processing into a
form usable by humans?
A. Storage
B. Input devices
C. Output devices
D. Control
E. Process
Ans: C

Which can read data convert them to a form that computer can use?
A. Logic
B. Storage
C. Control
D. Input device
E. Output device
Ans: D

Which is not true for primary storage ?


A. Information must be transferred to primary storage
B. It is relatively more expensive
C. It allows very fast access to data
D. It is part of processor
E. It is part of control unit

Ans: D

The part of machine level instruction, which tells the central processor what
has to be done, is
A. JK flip flop
B. Address
C. Locator
D. Flip-Flop
E. Operation code

Ans: E Process is:


A. contents of main memory
B. a job in secondary memory
C. a program in execution
D. process state
E. program in High level language kept on disk

Ans: C

In a disk, each block of data is written into -


A. Zero sector
B. one sector
C. three sector
D. Two sectors
E. Two or more sectors

Ans: E
Which of the following are normally used to initialize a computer system's
hardware?
A. Bootstrap memory
B. Random access memory
C. External mass memory
D. Static memory
E. Dynamic memory

Ans: A

The most frequently used instructions of a computer program are likely to


be fetched from:
A. RAM
B. cache memory
C. the hard disk
D. registers
E. ROM

Ans: B

CD-ROM stands for


A. Compactable Read Only Memory
B. Compact Data Read Only Memory
C. Compactable Disk Read Only Memory
D. Compact Disk Read Only Memory
E. Capable Data Read Only Memory

Ans: D

ALU is
A. Arithmetic Logic Unit
B. Array Logic Unit
C. Application Logic Unit
D. Access logic unit
E. none
Ans: A

VGA is
A. Video Graphics Array
B. Visual Graphics Array
C. Volatile Graphics Array
D. None of above
E. All of above

Ans: A

The ALU of a computer responds to the commands coming from


A. Primary memory
B. Control Memory
C. External memory
D. cache memory
E. Associate memory

Ans: B

The act of retrieving existing data from memory is called


A. Read out
B. Read form
C. Read
D. Write
E. ALL

Ans: E

All modern computer operate on


A. Data
B. Floopy
C. Information
D. Database
E. none
Ans: A

EASY EXERCISE

● Impact printer refers to a class of printers that work by banging a head


or needle against an ink ribbon to make a mark on the paper.
● A printer that prints without banging a ribbon onto paper. Laser, LED,
inkjet, solid ink, thermal wax transfer and dye sublimation printers are
examples of non-impact printers.
● Virtual memory is a feature of an operating system (OS) that allows a
computer to compensate for shortages of physical memory by
temporarily transferring pages of data from random access memory
(RAM) to disk storage.
● A touch screen is a computer display screen that is also an input
device.
● Printer used in ATM machine- Thermal Printer
● Graphical user interface is a type of user interface that allows users to
interact with electronic devices through graphical icons and visual
indicators such as secondary notation, instead of text-based user
interfaces, typed command labels or text navigation.
● Flash memory is a memory storage device for computers and
electronics. It is most often used in devices like digital cameras, USB
flash drives, and video games. It is quite similar to EEPROM.
● EPROM (erasable programmable read-only memory) is programmable
read-only memory (programmable ROM) that can be erased and re-
used.
● The term dynamic indicates that the memory must be constantly
refreshed or it will lose its contents. RAM (random-access memory) is
sometimes referred to as DRAM to distinguish it from static RAM.
● Blue ray Disc- The format offers more than five times the storage
capacity of traditional DVDs and can hold up to 25GB on a single-layer
disc and 50GB on a dual-layer disc.

LATEST TECHNOLOGIES & MISCELLANEOUS

What is a Vulnerability Assessment?

Defined, a vulnerability assessment is the process of identifying and


quantifying security vulnerabilities in an environment. It is an in-depth
evaluation of your information security posture, indicating weaknesses as
well as providing the appropriate mitigation procedures required to either
eliminate those weaknesses or reduce them to an acceptable level of risk.

What is a Penetration Test?


A penetration test simulates the actions of an external and/or internal cyber
attacker that aims to breach the information security of the organization.
Using many tools and techniques, the penetration tester (ethical hacker)
attempts to exploit critical systems and gain access to sensitive data.

VoLTE (Voice over long term evolution)


Voice over Long-Term Evolution (VoLTE) is a standard for high-speed
wireless communication for mobile phones and data terminals. It is based
on the IP Multimedia Subsystem (IMS) network, with specific profiles for
control and media planes of voice service on LTE defined by GSMA in PRD
IR.92.

BITCOINS

Bit coin is a new currency that was created in 2009 by an unknown person
using the alias Satoshi Nakamoto. Transactions are made with no middle
men – meaning, no banks! There are no transaction fees and no need to
give your real name. More merchants are beginning to accept them: You
can buy webhosting services, pizza or even manicures.

CRYPTOGRAPHY
Cryptography is a method of storing and transmitting data in a particular
form so that only those for whom it is intended can read and process it.

MULTIPLE CHOICE QUESTIONS


Information on a computer is stored as--
A. analog data
B. digital data
C. modem data
D. watts data
E. hybrid data
Ans: B

A proxy server is used for which of the following?


A. to provide security against unauthorized
B. to provide TCP/ip
C. ton process client requests for web pages
D. all of above
E. none of these
Ans: A

Which device is used to access your computer by other computer or for


talking over phone?
A. RAM
B. Modem
C. ROM
D. EPROM
E. SRAM
Ans: A

A directory within a directory is called a---


A. mini-Directory
B. Sub-Directory
C. Junior Directory
D. Master directory
E. none of these
Ans: B

---- is the act of copying or downloading a program from a network &


making multiple copies of it.
A. Network piracy
B. software piracy
C. plagiarism
D. site license piracy
E. none of these
Ans: B
what kind of scheme is the http protocol ?
A. get/put
B. store/forward
C. request/response
D. queuing
E. defueling
Ans: C Web storefronts are virtual stores for ------ electronic commerce.
A. b2c
B. b2b
C. b2e
D. g2c
E. c2b
Ans: A

The capability of a computer to perform more than one task at the same
time is called----
A. multitasking
B. batch processing
C. real-time processing

D. multiprocessing
E. framing
Ans: A

The altering of data so that it is not usable unless the changes are undone
is called----
A. biometrics
B. compression
C. encryption
D. decryption
E. none of these
Ans: C

---- can check the physical address of source & destination contained in the
frame.
A. Bridge
B. Router
C. Hub
D. Gateway
E. Repeater
Ans: A
The microcomputer, Intel MCS-80 is based on the widely used Intel
A. 8080 microprocessor
B. 0808 microprocessor
C. 8085 microprocessor
D. 8086 microprocessor
E. 8082 microprocessor

Ans: A

EASY EXERCISE

● The first IBM PC virus in the world was a boot sector virus dubbed
“Brain”, created in 1986, reportedly to deter unauthorized copying of
the software had written.
● A filename extension is an identifier specified as a suffix to the name
of a computer file. The extension indicates a characteristic of the file
contents or its intended use.
● A Denial of Service (DoS) attack is different from a DDoS attack. The
DoS attack typically uses one computer and one Internet connection to
flood a targeted system or resource. The DDoS attack uses multiple
computers and Internet connections to flood the targeted resource.
DDoS attacks are often global attacks, distributed via botnets.
● Traffic attacks: Traffic flooding attacks send a huge volume of TCP,
UDP and ICPM packets to the target. Legitimate requests get lost and
these attacks may be accompanied by malware exploitation.
● Bandwidth attacks: This DDos attack overloads the target with massive
amounts of junk data. This results in a loss of network bandwidth and
equipment resources and can lead to a complete denial of service.
● Application attacks: Application-layer data messages can deplete
resources in the application layer, leaving the target's system services
unavailable.
● VOIP is an acronym for Voice Over Internet Protocol, or in more
common terms phone service over the Internet. If you have a
reasonable quality Internet connection you can get phone service
delivered through your Internet connection instead of from your local
phone company.

VPN (Virtual Private Network)

A virtual private network (VPN) is a technology that creates an encrypted


connection over a less secure network.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy