computer aptitude test question

  • Upload
    bittu

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

  • 7/27/2019 computer aptitude test question

    1/9

    Mast ers of Comput er Appl i cat i on ( MCA) Ent r ance 2012Comput er Knowl edge Paper I I

    1. Progr ams f r om t he same devel oper , sol d bundl ed t ogether , t hatpr ovi de bet t er i nt egr at i on and share common f eat ur es , t ool bars and menus

    ar e known as . . . .( A) sof t war e sui t es( B) i nt egr at ed sof t war e packages( C) sof t ware pr ocessi ng packages( D) personal i nf ormat i on managers( E) none of t heseAns : ( A)

    2. A data warehouse i s whi ch of t he f ol l owi ng ?( A) Can be updat ed by t he end users( B) Cont ai ns numerous nami ng convent i ons and f ormat s( C) Or gani zed around i mport ant subj ect areas( D) Cont ai ns onl y cur r ent dat a

    ( E) None of t heseAns : ( C)

    3. ___ ___ ___ ___ __ ser ver s st or e and manages f i l es f or net wor k user s.( A) Aut hent i cat i on( B) Mai n( C) Web(D) Fi l e( E) None of t heseAns : ( D)

    4. Al l of t he f ol l owi ng ar e exampl es of r eal secur i t y and pr i vacy r i sksExcept _____

    ( A) hacker s( B) spam( C) vi r uses( D) i dent i f y t hef t( E) None of t heseAns : ( B)

    5. ___ ___ ___ __ t er mi nal s ( f or mer l y known as cash r egi st er s) ar e of t enconnect ed t o compl ex i nventory and sal es comput er syst ems .( A) Dat a( B) Sal es( C) Query( D) ( Poi nt - of - sal e ( POS)

    ( E) None of t heseAns : ( B)

    6. The OSI model i s di vi ded i nt o ___ ___ _ pr ocesses cal l ed l ayer s.(A) f i ve(B) s i x( C) seven( D) ei ght( E) None of t hese

  • 7/27/2019 computer aptitude test question

    2/9

    Ans : ( C)

    7. Syst em sof t war e i s t he set of pr ogr ams t hat enabl es your comput er' shardware devi ces and __ __ __ sof t ware t o work t ogether .( A) management( B) pr ocessi ng

    ( C) ut i l i t y( D) appl i cat i on( E) None of t heseAns : ( D)

    8. ___ ___ __ ar e speci al l y desi gned comput er chi ps r esi de i nsi de ot herdevi ces, such as your car or your el ect r oni c t hermost at .( A) Ser ver s( B) Embedded comput er s( C) Robot i c computers( D) Mai nf r ames( E) None of t heseAns : ( B)

    9. The f ol l owi ng ar e al l comput i ng devi ces , except . . . . . . . . .( A) not ebook comput ers( B) cel l ul ar t el ephones( C) di gi t al scanner s( D) per sonal di gi t al assi st ant s( E) None of t heseAns : ( C)

    10. i n a r i ng t opol ogy , t he t he comput er i n possessi on of t he ______ cant r asmi t dat a( A) packet( B) dat a

    ( C) access method( D) t oken( E) None of t heseAns : ( D)

    11. Thi s par t of oper at i ng system manages t he essent i al per i pher al s, suchas t he keyboar d, screen , di sk dr i ves, and par al l el and ser i al por t s ____( A) basi c i nput / out put syst em( B) secondar y i nput / out put syst em( C) per i pher al i nput / out put syst em( D) mar gi nal i nput / out put system( E) None of t heseAns : ( A)

    12. ____ ____ Vi r uses ar e of t en t r ansmi t t ed by a f l oppy di sk l ef t i n t hef l oppy dr i ve( A) Tr oj an hor se( B) Boot sector( C) Scri pt( D) Logi c bomb( E) None of t heseAns : ( B)

  • 7/27/2019 computer aptitude test question

    3/9

    13. ________ cont r ol s t he way i n whi ch t he comput er syst em f unct i ons andpr ovi des a meAns : by whi ch user s can i nt eract wi t h t he comput er( A) The pl at f or m( B) Appl i cat i on sof t war e( C) Operat i ng syst em

    ( D) The mot her board( E) None of t heseAns : ( C)

    14. Server s are comput ers t hat pr ovi de resour ces t o ot her comput ersconnect ed t o a ___________( A) mai nf r ame( B) network( C) super comput er( D) cl i ent( E) None of t heseAns : ( B)

    15. A goal of dat a mi ni ng i ncl udes whi ch of t he f ol l owi ng?( A) To expl ai n some observed event or condi t i on( B) To conf i r m t hat dat a exi st s( C) To anal yze dat a f or expect ed r el at i onshi ps( D) To cr eate a new dat a warehouse( E) None of t heseAns : ( A)

    16. URL stands f or . . . . . . . .( A) Uni ver sal Resear ch Li st( B) Uni ver sal Resour ce Li st( C) Uni f or m Resour ce Locat or( D) Uni f or m Resear ch Locat or

    ( E) None of t heseAns : ( C)

    17. A dat abase management system ( DBMS) i s a . . . . . . . . . . . .( A) har dware syst em used t o cr eat e , mai nt ai n and pr ovi de cont r ol l edaccess t o a database( B) har dware syst em used t o cr eat e, mai nt ai n, and pr ovi de uncont r ol l edaccess t o a database.( C) sof t war e syst em used t o cr eat e, mai nt ai n, and pr ovi de uncont r ol l edaccess t o a database.( D) sof t war e system used t o cr eat e, mai nt ai n, and pr ovi de cont r ol l edaccess t o a database.( E) None of t hese

    Ans : ( D)

    18. Whi ch of t he f ol l owi ng i s NOT a goal of t r ansact i on pr ocessi ng syst em?( A) Capt ur e , pr ocess and stor e t r ansact i ons( B) Produce a var i et y of document s r el at ed t o r out i ne busi ness act i vi t i es( C) Reduce manual ef f ort associ at ed wi t h pr ocessi ng busi ness t r ansact i ons( D) Produce st andar d repor t s used f or management deci si on maki ng( E) None of t hese

  • 7/27/2019 computer aptitude test question

    4/9

    Ans : ( )

    19. A Proxy ser ver i s used f or whi ch of t he f ol l owi ng?( A) To pr ovi de secur i t y agai nst unaut hor i zed users( B) To pr ocess cl i ent r equest s f or web pages( C) To pr ocess cl i ent r equest s f or dat abase access

    ( D) To pr ovi de TCP/ I P( E) None of t heseAns : ( B)

    20. When dat a changes i n mul t i pl e l i st s and al l l i st s are not updat ed,t hi s causes:( A) dat a r edundancy( B) i nf or mat i on over l oad( C) dupl i cat e dat a( D) dat a i nconsi st ency( E) None of t heseAns : ( D)

    21. __ __ __ __ ____ _ ar e words t hat a pr ogr ammi ng l anguage has set asi de f ori t s own use.( A) Cont r ol wor l ds( B) Reser ved words( C) Cont r ol st r uct ur es( D) Reserved keys( E) None of t heseAns : ( B)

    22. What i s t he pr i mary di f f erence between a vi r us and a worm?( A) A wor m has t he abi l i t y t o sel f - pr opagat e f r om an i nf ect ed user ' scomput er t o other comput ers( B) A wor m i s usual l y wr i t t en by a cr acker : Scr i pt bunni es do not have

    t he ski l l s t o devel op a wor m pr ogr am( C) A vi r us i s ver y har mf ul t o the comput er s i t i nf ect s : a wor m i s not aser i ous a pr obl em( D) Ant i - vi r us sof t war e i s ef f ect i ve i n f i ght i ng vi r uses but not wor ms( E) None of t heseAns : ( )

    23. ___ ___ descr i be what i s dat abase f i el ds.( A) St r uct ur es( B) Fi el d mar ker s(C) Fi el d def i ni t i on( D) Fi el d names( E) None of t hese

    Ans : ( D)

    24. You must i nst al l a ( n) ____________ on a net work i f you want t o shar ea br oadband I nt ernet connect i on.( A) r out er( B) modem( C) node( D) cabl e( E) None of t hese

  • 7/27/2019 computer aptitude test question

    5/9

    Ans : ( A)

    25. A goal of nor mal i zat i on i s t o ____ _____ _( A) mi ni mi ze the number of r el at i onshi ps( B) mi ni mi ze the number of ent i t i es( C) mi ni mi ze t he number of t abl es

    ( D) mi ni mi ze t he number of r edundancy( E) None of t heseAns : ( D)

    26. Gr ant i ng an out si de or gani zat i on access t o i nt er net web pages i sof t en i mpl ement ed usi ng a (n) __ __( A) ext r anet( B) i nt r anet( C) i nt er net( D) hacker( E) None of t heseAns : ( A)

    27. Whi ch t erm i dent i f i es a speci f i c comput er on t he web and t he mai npage of t he ent i r e si t e( A) URL( B) Web si t e addr ess( C) Hyper l i nk( D) Domai n name( E) None of t heseAns : ( A)

    28. The code that r el at i onal database management syst ems use t o per f ormt hei r dat abase t ask i s r ef er r ed t o as . . . . .( A) QBE( B) SQL

    ( C) OLAP( D) Sequel Server( E) None of t heseAns : ( B)

    29. Chi p i s a common ni ckname f or a ( n) :( A) t r ansi stor( B) r esi stor( C) i nt egr at ed ci r cui t( D) semi conduct or( E) None of t heseAns : ( C)

    30. The pur pose of t he pr i mary key i n a database i s t o:( A) unl ock t he database( B) provi de a map of t he data( C) uni quel y i dent i f y a r ecor d( D) est abl i sh const r ai nt s on dat abase oper at i ons.( E) None of t heseAns : ( B)

  • 7/27/2019 computer aptitude test question

    6/9

    31. A ___ ___ ___ cont ai ns speci f i c r ul es and wor ds t hat expr ess t hel ogi cal st eps of an al gor i t hm.( A) programmi ng l anguage( B) synt ax( C) pr ogr ammi ng st r uct ur e( D) l ogi c char t

    ( E) None of t heseAns : ( )

    32. The desi gn of t he networ k i s cal l ed t he networ k:( A) archi t ectur e( B) ser ver( C) t r ansmi ssi on( D) t ype( E) None of t heseAns : ( A)

    33. The most f r equent l y used i nst r uct i ons of a comput er pr ogr amarel i kel y to be f et ched f r om:

    ( A) t he har d di sk( B) cache memor y( C) RAM( D) r egi sters( E) None of t heseAns : ( B)

    34. The ____________ cont ai ns dat a descr i pt i ons and def i nes t he name,dat a t ype, and l engt h of each f i el d i n t he dat abase.( A) dat a di cti onar y( B) dat a t abl e( C) dat a r ecor d( D) dat a f i el d

    ( E) None of t heseAns : ( A)

    35. Per sonal l ogs or j our nal ent r i es post ed on t he Web are known as:(A) l i s tservs( B) Webcast s( C) bl ogs( D) subj ect di r ectori es( E) None of t heseAns : ( C)

    36. A( n) _______ uses pi ct ur es ( cal l ed i cons) and menus di spl ayed on t hescr een t o send commands t o t he computer syst em.

    ( A) command - based user i nt er f ace( B) GUI(C) sys tem ut i l i t y( D) API( E) None of t heseAns : ( B)

    37. The ____ _ manual t el l s you how t o use a sof t ware pr ogr am.( A) document at i on

  • 7/27/2019 computer aptitude test question

    7/9

    ( B) programmi ng( C) t echni cal( D) user( E) None of t heseAns : ( )

    38. Whi ch of t he f ol l owi ng i s NOT a t ype of br oadband I nt ernetconnect i on?( A) Cabl e( B) DSL( C) Di al - up(D) Sat el l i t e( E) None of t heseAns : ( C)

    39. Sof t ware, such as vi r uses, worms and Troj an horses, t hat has amal i ci ous i nt ent , i s known as:( A) spyware( B) adware

    ( C) spam( D) mal ware( E) None of t heseAns : ( D)

    40. Maki ng a f i el d ___ ___ meAns : t hat i t cannot be l ef t bl ank.( A) numeri c( B) r equi r ed( C) cal cul at ed( D) val i dat ed( E) None of t heseAns : ( B)

    41. ____ ____ _ i s t he pr ocess of f i ndi ng er r or s i n sof t war e code.( A) Debuggi ng( B) Compi l i ng( C) Test i ng( D) Runni ng( E) None pf t heseAns : ( )

    42. ___ ___ ___ ___ ar e vi r uses t hat ar e t r i gger ed by t he passage of t i me oron a cer t ai n date.( A) Boot - sect or vi r uses( B) Macr o vi r uses( C) Ti me bombs

    ( D) Wor ms( E) None of t heseAns : ( C)

    43. Li nux i s a ( n) ___ ___ ___ ___ oper at i ng system.( A) open- sour ce( B) Mi crosof t( C) Wi ndows( D) Mac

  • 7/27/2019 computer aptitude test question

    8/9

    ( E) None of t heseAns : ( A)

    44. What i s a backup?( A) Rest or i ng t he i nf ormat i on backup( B) An exact copy of a system' s i nf ormat i on

    ( C) The abi l i t y t o get a syst em up and r unni ng i n t he event of a syst emcrash or f ai l ur e( D) Al l of t hese( E) None of t heseAns : ( D)

    45. Whi ch of t he f ol l owi ng pl aces t he common data el ement s i n or der f r omsmal l est t o l ar gest( A) char acter , f i l e, r ecor d, f i el d, dat abase( B) char acter , r ecor d, f i el d, dat abase, f i l e( C) char acter , f i el d, r ecor d, f i l e, dat abase( D) Bi t , byt e, char acter , r ecor d, f i el d, f i l e, dat abase,( E) None of t hese

    Ans : ( C)

    46. The i nternet i s . . . . . .( A) a l arge network of networks( B) an i nt er nal communi cat i on syst em f or a busi ness( C) a communi cat i on syst em f or t he I ndi an government( D) Al l of t hese( E) None of t heseAns : ( D)

    47. ____________ ar e l i st s of commands t hat appear on the screen.( A) GUI s( B) I cons

    ( C) Menus( D) Wi ndows( E) None of t heseAns : ( C)

    48. Whi ch of t he f ol l owi ng st atement s i s FALSE concerni ng f i l e names?( A) Fi l es may shar e the same name or t he same ext ensi on but not bot h( B) Every f i l e i n t he same f ol der must have a uni que name( C) Fi l e ext ensi on i s anot her name f or f i l e t ype( D) The f i l e extensi on comes bef or e t he dot ( . ) f ol l owed by the f i l e name( E) None of t heseAns : ( D)

    49. Ver i f i cat i on of a l ogi n name and password i s known as:( A) conf i gur at i on(B) accessi bi l i ty( C) aut hent i cat i on( D) l oggi ng i n( E) None of t heseAns : ( C)

    50. Whi ch of t he f ol l owi ng woul d most l i kel y NOT be a sympt om of a vi r us?

  • 7/27/2019 computer aptitude test question

    9/9

    ( A) Exi st i ng pr ogr am f i l es and i cons di sappear .( B) The CD- ROM st ops f unct i oni ng.( C) The Web browser opens t o an unusual home page.( D) Odd messages or i mages ar e di spl ayed on the scr een.( E) None of t heseAns : ( B)