@RexstarPdf_RRB_ALPTechnicianJEUPPCLTG_2_COMPUTER_Chapte
@RexstarPdf_RRB_ALPTechnicianJEUPPCLTG_2_COMPUTER_Chapte
p
RRB ALP/Technician/JE/
UPPCL/TG-2
COMPUTER
Chapterwise
&
Sub-topicwise
Solved Papers
Chief Editor
A.K. Mahajan
Compiled by
Exam Expert Group
Computer Graphics by
Balkrishna, Charan Singh
Editorial Office
12, Church Lane Prayagraj-211002
Mob. : 9415650134
Email : [email protected]
website : www.yctfastbook.com / www.yctbooks.com
www.yctbooksprime.com
All rights reserved with Publisher
Publisher Declaration
Edited and Published by A.K. Mahajan for YCT Publications Pvt. Ltd.
12 Church Lane, Prayagraj and E:Book by APP YCT BOOKS
In order to Publish the book, full care has been taken by the Editor and the Publisher,
yet it is necessary to get your co-operation and suggestions for any errors.
In the event of any dispute, the judicial area will be Prayagraj.
ye
p
INDEX
COMPUTER
Miscellaneous........................................................................................... 251-256
2
ye
p
22. Computer
Ans. (a) : Human ware is hardware and software that
I. Computer an Introduction emphasizes users capability and empowerment and the
design of the user Interface.
1. Which of the following scientists introduced the
concept of Stored Program Computer ? 6. The program instructions are represented in
(a) Blaise Pascal (b) Alan Turing binary and stored in the _______ from which
(c) John Von Neumann (d) Charles Babbage they are fetched, decoded and executed by the
UPPCL Technical Grade-II Shift-I, 28.03.2021 CPU.
Ans. (c) : The concept of stored program computer was (a) memory (b) memory and chip
developed by John Von Neumann in 1940. Who (c) chip (d) control unit
proposed that a program is stored electronically in a RRB Kolkata LP-2009
memory device in binary-number format so that the Ans : (a) Memory is the electronic holding place for the
instructions could be modified by the computer. instruction and data a computer needs to reach quickly.
2. Which of the following CPU registers is used by Its where information is stored for immediate use.
ALU to store operands? Memory is one of the basic functions of a computer,
(a) Both program counter and accumulator because without it a computer would not be able to
(b) Program counter function properly.
(c) Accumulator 7. An ALU typically uses an accumulator to store
(d) Address register operands and results. Which of the following
RRB Bengaluru LP-2004 options correctly describes the accumulator?
Ans. (c) : An accumulator is a type of register for short
term, intermediate storage of arithmetic and logic data (a) Register (b) Main Memory
in a Computer's Central Processing unit (CPU). (c) Processing Unit (d) Secondary Memory
3. Which of the following statements is correct WBPSC Instructor-18.09.2021
about windows operating system? Ans. (a) : The full name of ALU is Arithmetic Logic
(a) Windows NT supports preemptive Unit. It usually uses an accumulator to store operands
multitasking and results. Registers are the smallest data holding
(b) Windows 10 was released in 2010 elements that are built into the processor itself. These
(c) Windows NT was released in 1987 are the memory locations that are directly accessible by
(d) Windows NT was developed by Oracle and the processor. It may hold an instruction, a storage
marketed by Microsoft address or any kind of data such as a bit sequence or
MP Electrician Instructor 07.11.2016, Morning individual characters.
Ans. (a) : Windows NT is a proprietary graphical 8. Which of the following is not a characteristic
operating system produced by Microsoft, the first of a computer?
version of which was released on 27 July, 1993. It is a (a) Speed (b) Intelligent quotient
processor - independent multiprocessing and multi-user (c) Accuracy (d) Versatility
operating system. Windows NT supports preemptive
multitasking. Windows 10 was released to HSSC wireman Instructor -17.12.2019, Shift-I
manufacturing on July, 2015. Ans. (b) : Speed, data storage, accuracy and versatility
are the characteristics of computer while intelligent
4. CPU is the main component of the computer,
which of the following is the full form of CPU? quotient is not the characteristic of computer.
(a) Central Programming Unit 9. Flexibility to solve various problems represents
(b) Control Processing Unit the -------- characteristic of the computer.
(c) Computer Processing Unit (a) diligence (b) speed
(d) Central Processing Unit (c) accuracy (d) versatility
HSSC wireman Instructor -17.12.2019, Shift-I HSSC wireman Instructor -17.12.2019, Shift-II
RRB Guwahati L.P.- 2008 Ans. (d) : Versatility is a characteristic of a computer
Ans. (d) : A CPU (Central Processing Unit) is the which refers to the ability of a computer to perform a
primary component of a computer that performs most of variety of tasks with equal accuracy and efficiency.
the processing tasks. It executes instructions from 10. A _____ shows how operational attributes are
programs and manages data within a computer's linked together and contributes towards realizing
memory. the computer's.
5. In Computers, Users are also known as _____. (a) component design
(a) Humanware (b) Fireware (b) computer architecture
(c) Hardware (d) Freeware (c) computer working
Punjab Wireman instructor-07.07.2013 (d) computer organization
RRB Muzaffarpur L.P.-2006 KPSC Jr. Instructor 22.11.2018w
Computer 3 YCT
ye
p
Ans : (d) Computer organization so is how operational 16. Which of the following was developed by the
attributes are linked together and contribute to realizing French mathematician and philosopher Blaise
the architectural specification. Pascal, also known as the arithmetic machine?
11. A _______is the conceptual design and (a) Abacus
fundamental operational structure of a (b) Pascaline
computer system. (c) Both Abacus and Pascaline
(a) computer organization (d) Neither Abacus nor Pascaline
(b) component design GSSSB Electronic Instructor-22.01.2017
(c) computer working Ans. (b) : Pascal's calculator is also known as
(d) computer architecture arithmetic machine or Pascaline. It was developed by
KPSC Instructor Electronic-25.06.2014 the French mathematician and philosopher Blaise Pascal
Ans : (d) Computer architecting is a theoretical basic in 1642. Abacus is a mathematician tool used for
process. Under which the structural of the computer is calculations. It is mainly used for addition, subtraction,
prepared. multiplication, division.
12. Which among the following is the correct full 17. Which of the following is an OCR font based
form of BIOS? on American standards?
(a) Basic Input Operating System (a) OCR-C (b) OCR-A
(b) Basic Input Output Software (c) OCR-B and OCR-C (d) OCR-B
(c) Basic Input Output System KPSC Jr. Instructor- 09.07.2014
(d) None of these Ans. (b) : OCR-A is a font created in 1968, in the early
GSSSB Electronic Instructor-21.01.2014 days of computer optical character recognition, when
there was a need for a font that could be recognized not
Ans. (c) : BIOS stands for Basic Input Output System, only by the computers of that day, but also by humans.
computer program that is typically stored in EPROM OCR A uses simple thick strokes to form recognized
and used by the CPU to perform startup procedures characters.
when the computer is turned on. Its two major
procedures are determining what peripheral devices 18. Which among the following is/are types of
(Keyboard, Mouse, Disk Drive, Printers, Video, Cards microcontrollers in embedded system?
etc.) A. ARM microcontroller
B. MRP microcontroller
13. Which material is used to manufacture (a) Neither A nor B (b) Only B
Computer Chips?
(c) Only A (d) Both A and B
(a) Silver (b) Iron
UPPCL Technical Grade-II (Shift-II) 20.03.2021
(c) Gold (d) Semiconductor
UKSSSC Tech. Electrical Instructor-21.11.2017 Ans. (c) : ARM stands for Advanced Rise Machine.
The most popular Microcontrollers Programming in the
Ans : (d) Silicon is the material of choice in the chip digital embedded system world, and most of the
industry. Unlike the metals normally used to conduct industries prefer only ARM microcontrollers since it
electrical currents. Silicon is a semiconductor, meaning consists of significant features to implement products
that its conductive properties can be increased by mixing it with an excellent appearance. It is cost sensitive and
with other materials such as phosphorus or boron. high performance device, which has been used in a wide
14. Whom is considered the father of modern range of application such as industrial Instrument
computer? control systems, wireless networking and sensors and
(a) Bill Gates (b) Sunder Pichai automotive body systems etc.
(c) Charles Babbage (d) Steve Jobs 19. With reference to microcontroller, PIC stands
GSSSB Supervisor Electronic Instructor 18.01.2014 for _____.
Ans. (c) : Charles Babbage originated the concept of a (a) Prefaced Internet Controller
digital programmable computer. Babbage is known as (b) Prefaced Interface Controller
the father of computer and is credited with inventing the (c) Peripheral Internet Controller
First Mechanical Computer on 18 October 1871. (d) Peripheral Interface Controller
15. _______ tells raw facts while in ______ the data DSSSB Craft Instructor (ESM) 06.10.2019
becomes meaningful. RRB Bengaluru LP-2004
(a) Information, reporting Ans. (d) : PIC stands for Peripheral Interface
(b) Information, bits Controller, which was developed in the year 1993 by
(c) Records, bytes the General Instruments Microcontrollers. It is
(d) Data, information controlled by software and programmed in such as was
KPSC Instructor Electronics Mech.20.07.2018 that it performs different tasks and controls a generation
Ans : (d) The data are defined as numbers that represent line. PIC microcontrollers are used in different new
measurements from the real world. Datum is a single application such as smart phones, audio accessories and
measurement. advanced medical devices.
Information is organized or classified data, which has some 20. Which among the following statements is/are
meaningful values for the receiver. Information is the correct with respect to hardware and
processed data on which decisions and action are based. software of computers?
Computer 4 YCT
ye
p
A. Computer hardware is the physical 25. State whether the statements given below are
equipment. true or false.
B. Computer software is the collection of (i) The term 'software' means a set of
programs that make hardware do its job computer program, functions and related
(a) Both A and B (b) Only A documents.
(c) Only B (d) Neither A nor B (ii) In order to function, the computer must
UPPCL Technical Grade-II (Shift- II) 27.03.2021 have both software and hardware.
Ans. (a) : Statement A true about computer hardware. (a) (i) true, (ii) false (b) false, (ii) false
Computer hardware includes the physical parts of a (c) (i) false, (ii) true (d) (i) true, (ii) true
computer, such as the easy Central Processing Unit, GSSSB Electronic Instructor-21.01.2014
Random Access Memory, Monitor, Mouse, Keyboard, Ans. (d) : Statement (i) true, software is basically a set
computer data storage and motherboard etc. of instructions or commands that tells a computer what
Statement B true about computer software, software is a to do or in other words, the software is a computer
set of computer programs and associated documentation program that provides a set of instructions to execute a
programs and associated documentation and data. This users commands and tell the computer what to do, for
is in contract to hardware, from which the system is example MS-Word, MS-PowerPoint etc.
built and which actually performs the work. 26. An 'Optical Character Reader' is an example of:
21. 'BUS' in computer ________| (a) control unit
(a) Indicates a data item (b) input unit
(b) Information transmitting is a set of physical (c) arithmetic and logic unit
wires (d) output unit
(c) Indicates an address item. UKSSSC Tech. Electrical Instructor-21.11.2017
(d) Has become a synonym for the file present in the Ans. (b) : OCR stands for Optical Character
operating system. Recognition. This is input device, OCR is the process
that converts an image of text into a machine-readable
DSSSB Craft Instructor (ESM) 06.10.2019 text format. For example, if you seen a form or a
MP Electrician Instructor 07.11.2016, Morning receipt. Your computer saves the scan as an image file.
Ans : (b) A bus is a high speed internal connection. You can't use a text editor to edit, search or count the
Buses are used to send control signals and data between words in the image file. However, you can use OCR to
the processor and other components. Three types of bus convert the image into a text document with its contents
are used. stored as text data.
1. Address bus 2. Data bus 3. Control bus 27. Which of the following facts is false regarding
22. USB stands for............... the control unit?
(a) Uniform serial Bus (a) It receive instructions from memory,
(b) Uniform Series Bus interprets them and directs operation of the
(c) Universal Series Bus computer
(d) Universal Serial Bus (b) It process and stores data
WBPSC Instructor-18.09.2021 (c) It manages and coordinates all the units of the
computer
Ans. (d) : USB stands for Universal Serial Bus, (d) It is responsible for controlling the transfer of
technology used to connect computers with peripheral data and instruction between other units of the
devices. computer
23. The data converted into a more GSSSB Supervisor Electronic Instructor 18.01.2014
understandable form is called ____. KPSC Instructor Electronics Mech.20.07.2018
(a) Instruction (b) Storage Ans. (b) : Except option (b) all other options are true
(c) Power (d) Information regarding to the control unit because processing and
KPSC Jr. Instructor 22.11.2018w storing data is not function of the Control Unit.
Ans : (d) Information is stimuli that has meaning is some 28. Which of the following is an integrated
context for its receiver when information is entered into component of CPU and is generally used to
and stored in a computer, it is generally referred to as data. store data and addresses during program
After processing such as formatting and printing output execution?
data can again be perceived as information. (a) Arithmetic logic unit
24. While of the following is not hardware? (b) Register
(a) Magnetic Tape (b) Printer (c) Control unit
(c) Assembler (d) CRT (d) Secondary memory
Punjab Wireman instructor-07.07.2013 GSSSB Electronic Instructor-22.01.2017
Ans : (c) Magnetic tape, Printer and CRT is a computer Ans. (b) : Register is a type of computer memory used
hardware while assembler is a program for converting by the CPU to quickly accept, store, and transfer data
instructions written in low-level assembly code into and instructions that are being used immediately. The
reloadable machine cache and generating along registers used by the CPU are often called processor
information for the loader. registers is an integrated component of the CPU.
Computer 5 YCT
ye
p
29. Which of the following statements is incorrect Ans. (a) : The full form of ALU is 'Arithmetic Logic
regarding ALU? Unit'. It is a main component of the CPU. It is used to
(a) ALU uses CPU registers for operations perform arithmetic and logic operations.
(b) ALU is one of the main component of the 34. Which of the following components maintains
CPU
order, directs the operation of the entire system
(c) ALU controls the functions of the control unit and does not perform any actual processing on
(d) ALU performs both arithmetic and logic
data?
operations
(a) Control Unit (b) ROM
KPSC Jr. Instructor- 09.07.2014
(c) Mother board (d) I/O unit
Ans. (c) : Arithmetic Logic Unit (ALU) is a digital
circuit that provides arithmetic and logic operations. MP Electrician Instructor 07.11.2016, Morning
The Control Unit (CU) is a component of a CPU that Ans. (a) : The control unit is the part of CPU (Central
directs the operation of the processor. Processing Unit). It control every component of the
ALU does not control the functions of the Control Unit. computer and creates a sequence of all work process
Hence statement (c) is incorrect. and completes the work. It direct the system but does
30. Find out whether the given statements are true not perform data processing.
or false with reference to the CPU. 35. A CPU with a clock rate of 1.8 GHz can
(i) It is made up of register memory, control perform clock cycles per second.
unit and arithmetic logic unit. (a) 18,000,000 (b) 1,800,000
(ii) In modern computers, it is contained in an (c) 180,000,000 (d) 1,800,000,000
integrated circuit chip called the motherboard. WBPSC Instructor-18.09.2021
(a) (i) - True, (ii) - True Ans. (d) : Clock speed of CPU execution per second it
(b) (i) - True, (ii) - False measures the number of cycles, which is measured in
(c) (i) - False, (ii) - False gigahertz (GHz). A 'Cycle' is the basic unit that measures
(d) (i) - False, (i)- True CPU speed. CPU with clock rate of 1.8 GHz per second
UPPCL Technical Grade-II Shift-I, 28.03.2021 can measure up to 1,800,000,000 clock cycles
Ans. (b) : CPU (Central Processing Unit) is the 36. A CPU with a memory address register (MAR)
computer’s part that retrieves and executes information. of 24 bits can address up to ____ memory (in
The CPU is essentially the brain of a CAD (Computer bytes).
Aided Design) system. It consists of an Arithmetic
Logic Unit (ALU), a Control Unit (CU) and various (a) 16 MB (b) 8 KB
register memory. CPU is simply referred as processor, (c) 16 KB (d) 8 MB
while the given statement is not correct with respect to HSSC wireman Instructor -17.12.2019, Shift-I
the second CPU. Ans. (a) : Memory address register (MAR) is a CPU
31. During execution, CPU selects and retrieves register whose function is to store memory addresses. A
instructions from the ____. CPU with memory address register (MAR) of 24 bits
(a) registers (b) main memory can address up to 16 MB (in bytes).
(c) auxiliary memory (d) secondary memory 37. Which of the following is the processing unit of
UPPCL Technical Grade-II (Shift-I) 20.03.2021 the computer?
Ans. (b) : The Control Unit of the Central Processing (a) CPU (b) memory
Unit regulars and integrates the operations of the (c) Graphic Card (d) mother board
computer. It selects and retrieves instructions from the KPSC Jr. Instructor 22.11.2018w
main memory in proper sequence and interprets then so Punjab Wireman instructor-07.07.2013
as to activate the other functional elements of the Ans. (a) : A Central Processing Unit, also called a
system at the appropriate moment. central processor main processor or just processor, is
32. Which memory can be directly accessed by the the electronic circuitry that executes instructions
CPU of the computer? comprising a computer program. The CPU performs
(a) Magnetic tape (b) Hard disc basic arithmetic, logic, controlling and input/output
(c) Memory card (d) Cache memory operations specified by the instruction in the program.
DSSSB Craft Instructor (ESM) 06.10.2019 38. The size of a word in computer is
Ans. (d) : Cache memory is a type of high - speed (a) None of these
volatile computer memory that provides high speed data
access to a processor (CPU) and store frequently used (b) varies within the same computer
computer programs, applications and data. (c) fixed in every case
33. ALU is one of the main components of a (d) fixed in a computer, but varies among
computer's CPU. Which of the following is the different computers
full form of - KPSC Instructor Electronic-25.06.2014
(a) Arithmetic Logic Unit Ans. (d) : Word "size" refers to the amount of data a
(b) Algorithmic Looping Unit CPU's internal data registers can hold and process at
(c) Arithmetic Language Unit one time. Modern desktop computers have 64-bit
(d) Algorithmic Logic Unit words. Computers embedded in appliances and
RRB Gorakhpur L.P.-2008 consumer products have word size of 8, 16 or 32 bits.
Computer 6 YCT
ye
p
39. Cache memory is a small amount of extremely (c) Primary Storage
fast static _____ and is located close to the (d) Hard Disk
_____. RRB Bengaluru LP-2004
(a) RAM, CPU (b) ROM, Motherboard Ans. (c) : The CPU interacts directly with the primary
(c) RAM, Hard disc (d) ROM, CPU memory to perform read/write operation. It is two types
UP PCL Technical Grade-II-11.11.2016 (i) RAM (Random Access Memory)
UPPCL Technical Grade-II (Re-exam) 16.10.2016 (ii) ROM (Read only Memory)
Ans. (a) : Cache memory is a primary memory used by RAM is a volatile i.e. as long as the power is
the CPU to reduce the average cost of retrieving data supplied to the computer it retains the data in it.
from main memory. This static RAM is small in size
and located close to the CPU. 45. Which of the following components of the CPU
maintains and regulates the flow of information
40. Which of the following statement is wrong?
across the processor?
(a) External memory has high storage capacity
and is stable. (a) PC register
(b) Registers are high speed storage area located (b) Control Unit (CU)
outside the CPU. (c) ALU
(c) ROM is a fixed primary memory. (d) Accumulator
(d) Cache memory is a very high speed memory DSSSB Craft Instructor (ESM) 06.10.2019
between CPU and RAM. MP Electrician Instructor 07.11.2016, Morning
UKSSSC Tech. Electrical Instructor-21.11.2017 Ans. (b) : CU stands for Control Unit. It is one of the
Ans. (b) : Statement 'b' wrong because register memory fundamental parts of the CPU. The main work of CU is
is the inside the CPU not outside. Register memory is to tell the most efficient method to work. It guides all
the smallest and fastest memory in a computer. It is not the related operations to the individual parts of the
a part of main memory and is located in the CPU in the processor.
form of registers, which are the smallest data holding 46. Which of the following options is inconsistent
elements. with the remaining three?
41. Which among the following are the components (a) Cache Memory
of CPU? (b) Arithmetic and Logic Unit
(a) RAM and ROM (c) Instruction Decoder
(b) ALU and Memory (d) Control Unit
(c) ALU and Registers RRB Kolkata LP-2009
(d) ALU and Control Unit
HSSC wireman Instructor -17.12.2019, Shift-I
GSSSB Supervisor Electronic Instructor 18.01.2014
GSSSB Electronic Instructor-21.01.2014
Ans. (d) : ALU stands for Arithmetic Logic Unit. CU
stands for control unit. It performs all the arithmetic and Ans. (c) : Cache memory, Arithmetic Logic Unit and
logical operations and process user input. It controls the Control Unit are part of Central Processing Unit while
operations of processor, memory. ALU and other instruction decoder of a processor is a combinatorial
input/output devices. It is directed by control unit. circuit sometimes in the form of a read-only memory,
sometimes in the form of an ordinary combinatorial
42. Which of the following is a part of the CPU of a
computer? circuit, its purpose to translate an instruction cache into
(a) Motherboard (b) ALU the address in the micro memory where the micro cache
for the instruction starts.
(c) SRAM (d) DRAM
GSSSB Electronic Instructor-22.01.2017 47. Which of the following statement is not true
Ans. (b) : Central Processing Unit are- about the central Processing Unit (CPU)?
1. Control Unit (a) Control unit is a part of CPU
2. Arithmetic Logic Unit (b) CPU executes stored program instructions
3. Memory Unit (c) CPU is also known as microprocessor.
43. All the arithmetic and logical operations in a (d) Kernel is the core of CPU.
computer are done by………… UPPCL TG-II (20-03-2021) (Shift-II)
(a) ALU (b) CU Ans. (d) : Kernel is not core of CPU. Kernel is the
(c) Register (d) None option is correct. essential center of a computer operating system. It is the
KPSC Jr. Instructor- 09.07.2014 core that provides basic services for all after parts of the
Ans. (a) : ALU stands for Arithmetic Logic Unit. ALU OS. It is the main layer between the OS and hardware.
enables computers to perform mathematical operations 48. With reference to the central processing unit
an binary number. They can be found of the heart of (CPU) which of the following statements is not
every digital computer and are one of the most true?
important parts of CPU. (a) CPU processes data and instructions
44. Which of the following storage devices directly (b) ALU is a part of CPU
interacts with the CPU? (c) CPU also has a set of registers
(a) Tertiary Storage (d) It performs arithmetic operations
(b) Secondary, Storage UPPCL TG-II 27-03-2021 (Shift-II)
Computer 7 YCT
ye
p
Ans. (a) : Ans. (a) : Throughput is a term used in information
technology that indicates how many units of
information can be processed in a set amount of time.
54. Indentify the correct order of the stages of a
data processing cycle.
(a) Input stage-> Output stage-> Processing
stage -> Storage stage
(b) Input stage -> Processing stage-> Storage
stage-> Output stage
The CPU can process those instructions easily control (c) Processing stage -> Input stage-> Output
unit that knows how to interpret program instructions stage-> Storage stage
and an arithmetic logic unit that knows how to add (d) Input stage-> Processing stage -> Output
numbers. With the control unit and ALU combined, the stage -> Storage stage
CPU can process much more complex programs than a UKSSSC Tech. Electrical Instructor-21.11.2017
simple calculator. KPSC Jr. Instructor- 09.07.2014
49. ______is not a normal hardware port. Ans : (d) The data processing cycle consists of a series
(a) Display port (b) HDMI port of steps where raw data (input) is fed into a system to
(c) Ethernet (d) TCP port produce actionable insights (output). Each step is taken
HSSC wireman Instructor -17.12.2019, Shift-I in a specific order, but the entire process is repeated in a
Ans : (d) Display port, HDMI port and Ethernet are cyclic manner.
hardware port while TCP is called as Transmission Input stage → Processing stage → Output stage →
Control Protocol which provides a communication Storage stage
service between an application program and the internet 55. To increase CPU throughput which of the
protocol. A port number is a unique identifier used with following memories is placed between the CPU
an IP address. and main memory?
50. Which of the following stores the programs (a) Secondary memory (b) Cache memory
and data currently executed by the (c) Sequential memory (d) Auxiliary memory
(a) Primary Memory (b) Auxiliary Memory KPSC Instructor Electronics Mech.20.07.2018
(c) Secondary Memory (d) Tertiary Memory Ans. (b) : Throughput is the number of processes that
UPPCL (TG-II) 24-01-2019 (Morning) complete execution per time unit. If the computer
Ans : (a) Primary memory is a segment of computer system completes n processes in t second time then,
memory that can be accessed directly by the process. Total number of processes completed n
Primary memory have access time less than secondary Throughput = =
memory and greater than cache memory. Primary Time taken by the process t
memory has a storage capacity lesser than secondary To increase CPU throughput cache memory is placed
memory and greater than cache memory. between the CPU and main memory.
51. Which of the following provides internal 56. The CPU clock speed refers to the number of:
storage to the CPU? (a) CPUs it can have
(a) Register (b) Register and RAM (b) RAMs it can have
(c) RAM (d) Hard disk (c) clocks it can have
Punjab Wireman instructor-07.07.2013 (d) Number of cycles CPU executes per second
Ans : (a) A processor register is one of a small set of DSSSB Craft Instructor (ESM) 06.10.2019
data holding places that are part of the computer Ans. (d) : CPU processes many instructions from
processor. A register may hold an instruction a storage different programs every second. The clock speed
address, or any kind of data. Some instructions specify measures the number of cycles your CPU executes per
registers as part of the instruction. second, measured in GHz.
52. The four basic tasks performed by CPU are 57. We express the speed of the computer in
Fetch, ............ , Manipulate and Output: microseconds. Which of the following is equal
(a) Design (b) Decode to one microsecond?
(c) Display (d) Regulate (a) 10–9 second (b) 10–3 second
–6
(UPPCL TG-2 11-11-2016) (c) 10 second (d) 10–2 second
Ans : (b) The four primary function of a CPU are fetch, UPPCL TG-II 20-03-2021 (Shift-I)
decode, execute and write back. Decoding is the process Ans. (c) : 1 microsecond = 1 × 10–6 second
of converting code into plain text or any format that is 58. MIPS is a computer performance measurement
useful for subsequent processes. method for rate of instruction execution per
53. Which of the following represents the amount unit time. What is its full form?
of work that the system is capable of doing per (a) Master instruction per second
unit time? (b) Memory instruction per second
(a) Flow (throughput) (b) Load (c) Metric instruction per second
(c) Thread (d) Response time (d) Million instruction per second
UPPCL TG-II 20-03-2021 (Shift-I) UPPCL Technical Grade-II (Shift- II) 27.03.2021
Computer 8 YCT
ye
p
Ans. (d) : MIPS stands for Million instructions per Ans : (a) The Pentium is a widely used personal
second. MIPS is an approximate measure of a computer computer microprocessor from the Intel corporation.
raw processing power. MIPS figures can be misleading First offered in 1993, the Pentium quickly replaced
because measurement techniques often differ, and Intel's 486 microchip of choice in manufacturing a
different confuters may require different sets of personal computer. Microprocessor sold the under
instructions to perform the same activity. brand name Pentium.
59. What is MFLOPS? 64. If a computer system completes n processes in t
(a) It is used to measure the state of the CPU. seconds, then its throughput is _______
(b) It is used to measure the speed of CPU. processes per second during that interval.
(c) It is a memory unit. (a) t/n (b) n + t
(d) It is used to measure memory access time. (c) n/t (d) n × t
UPPCL TG-II 19-03-2021 (Shift-I) KPSC Jr. Instructor 22.11.2018w
Ans. (c) : Throughput is the amount of work completed
Ans. (b) : MFLOPS stands for Mega Floating Point
in a unit of time. In other words, through put is the
Operation Per Second, MFLOPS are a common processes executed to the number of jobs completed in a
measure of the speed of computer used to perform unit of time. The scheduling algorithm must look to
floating point calculations. Another common measure maximize the number of jobs processed per time limit.
of computer speed are power is MIPS (Million
instructions per second), which indicates integer number of process
Through put = =
performance. schedule length
60. Which of the following statement is/are true? N
(i) GFLOPS is smaller than TFLOPS So =
L
(ii) MFLOPS is greater than GFLOPS the number of processes = n process completion time of
(a) Only (ii) (b) Only (i) all process schedule length = t seconds
(c) Neither (i) nor (ii) (d) (i) and (ii) both Through put = n/t processes per second.
UPPCL TG-II 19-03-2021 (Shift-II) 65. In multitasking situation, semaphore is used to
Ans. (b) : Processing Speed-Flops solve_______ and ________.
Name Unit Value (a) Process synchronization problem, task
Kilo FLOPS KFLOPS 103 scheduling
Mega FLOPS MFLOPS 106 (b) CPU memory synchronization, resolution of
Giga FLOPS GFLOPS 109 I/O deadlocks.
(c) Important section problem, process
Tera FLOPS TFLOPS 1012 synchronization
Peta FLOPS PFLOPS 1015 (d) Solution of booting problem critical section
Exa FLOPS EFLOPS 1018 problem.
Zetta FLOPS ZFLOPS 1021 WBPSC Instructor-18.09.2021
Yotta FLOPS YFLOPS 1024 Ans : (c) CPU in multitasking editing situation memory
61. Which of the following is not a part of CPU. synchronization (CPU memory synchronization) I/O
(a) Memory Unit (b) Arithmetic Logic Unit used to resolve deadlocks.
(c) Control Unit (d) Input Unit 66. Computer administration refers to the ____
HSSC wireman Instructor -17.12.2019, Shift-I units and their inter relationships that
Punjab Wireman instructor-07.07.2013 implement architectural specifications.
UKSSSC Tech. Electrical Instructor-21.11.2017 (a) Dynamic (b) Navigational
(c) Stationary (d) Operational
Ans : (d) Memory Unit, Arithmetic Logic Unit and
Control Unit are part of Central Processing Unit (CPU) UPPCL Technical Grade-II-02.08.2015
while input unit is input device. Ans : (d) Computer management refers to the
62. "For computer, world consists of zeros and operational units and their relationship that implement
ones only. To store the zeros and ones,........... is architectural specifications.
placed inside a processor: 67. A device that is connected to a computer but it
(a) I/O device (b) Instruction set is NOT part of the core computer architecture
(c) Transistor (d) Main Memory is known as
(UPPCL TG2 11-11-2016) (a) Processing Device (b) Memory Device
Ans : (c) For the computer the world is made of zero (c) Peripheral Device (d) On-board Device
and one. To store these zero or one, a transistor is RRB Gorakhpur L.P.-2008
installed inside the processor. All the calculations in the Ans: (c) Peripheral device is an auxiliary device used to
computer are done through '0's and '1's only. put information into and get information out of a
63. Which of the following is an example of a high computer. The term peripheral device refers to all
speed microprocessor? hardware components that are attached to a computer
(a) Pentium (b) CD ROM and are controlled by the computer system, but they are
(c) Keyboard (d) Printer not the core components of the computer such as the
RRB Gorakhpur L.P.-2008 CPU or power supply unit.
Computer 9 YCT
ye
p
68. ALU is the part of (c) Type of hard disk drive
(a) CPU (b) CU (d) Type of flash drive
(c) Memory (d) None of these KPSC Jr. Instructor- 09.07.2014
(UPPCL TG2 Re-exam 16-10-2016) Ans : (c) SATA stands for Serial Advanced Technology
Ans : (a) An Arithmetic Logic Unit is the part of a Attachment. SATA is a computer bus interface or
Central Processing Unit that carries out arithmetic and standard hardware interface which connected hard
logic operations on the operands in computer instruction drives, SSD and CD/DVD drives to the computer.
words. IDE stands for Integrated Drive Electronics. It is an
69. What is the full form of PGA graphics card? interface standard for connection of storage devices
(a) Professional Graphics Array such as HDD, SSD and CD/DVD drive to the computer.
(b) Portal Graphic Array 75. What does the term USB stand for?
(c) Personal Graphics Array (a) Unique Service Business
(d) Public Giga Array (b) Unique Service Bus
WBPSC Instructor-18.09.2021 (c) Universal Serial Bus
Ans. (a) : PGA stands for Professional Graphics (d) Universal Service Bus
Adapter or Array. PGA is a video standard developed UPPCL Technical Grade-II (Shift- II) 27.03.2021
by IBM that supports up to 640*400 resolution. Ans. (c) : USB stands for Universal serial Bus. It is
70. Which of the following provides the slot to allow communication between a computer and peripheral
connect graphics cards? or other devices. Which can used to connect printers,
(a) RAM slot (b) AGP slot scanners, keyboards, mice, game controllers and flash
(c) USB port (d) PCI slot drive etc.
HSSC wireman Instructor -17.12.2019, Shift-I 76. Without ______ a system cannot operate.
Ans. (b) : An Accelerated Graphics Port (AGP) is a (a) Motherboard (b) Keyboard
point to point channel that is used for high speed video (c) Speakers (d) Mouse
output. This port is used to connect graphics cards to a RRB Kolkata LP-2009
computers motherboard. Ans : (a) Motherboard is the printed circuit board
71. The set of wires, connecting the microprocessor installed in most of the electronic plants such as laptop
and the memory, through which the data flows computers etc. A computer is made up of components
is called: installed in the microprocessor, main memory and
(a) memory (b) data wire motherboard. Along with this some devices are attached
(c) database (d) databus to control storage, video display and sound. Therefore
GSSSB Electronic Instructor-21.01.2014 the system can not be operated without it.
Ans : (d) Data bus is a group of conducting wires which 77. In computing _____ is the term given to the
carries data only. Data bus is bidirectional because data texture and size of a motherboard.
flow in both directions from microprocessor to memory (a) Form factor (b) CPU
or input/output devices and from memory or (c) ALU (d) Term factor
input/output devices to microprocessor. DSSSB Craft Instructor (ESM) 06.10.2019
72. _____ Is not a part of motherboard. Ans : (a) Form factor is a hardware design aspect that
(a) Expansion card slot (b) DVD Drive defines and prescribes the size, shape and other physical
(c) Storage Connector (d) Memory slot specific specification of components, particularly in
KPSC Instructor Electronics Mech.20.07.2018 electronics. A form factor may represent a board class
of similarly sized components or it may prescribe a
Ans : (b) Expansion card slot, storage connector and specific standard.
memory slot are part of motherboard while DVD Drives
are devices that can read DVD discs on an computer. 78. Which of the following basic operations is/are
DVD players are particular type of devices that do not performed by a computer ?
require a computer to work and can read DVD-Video (a) Arithmetic operation
and DVD-Audio discs. (b) Logical operation
73. Which of the following in the basis of computer (c) Storage and retrieval
and holds all of the circuit that ties the (d) All of these
different components of the computer system (UPPCL TG2 Re-exam 16-10-2016)
together? Ans : (d) The basic operation performed by a computer
(a) Hard Disk Drive (b) Motherboard are arithmetic operation, storage and retrieved and
(c) CPU (d) Cable logical operation. Basically computer does five basic
GSSSB Electronic Instructor-22.01.2017 operations that are input, output, storing, process and
Ans. (b) : It is the basis of your computer. It is the first controlling.
component installed in the system unit and it holds all 79. Home shopping and advertising belong to
of the circuitry that ties the functions of the computer which of the following categories of computer
components together. application?
74. What is SATA and IDE? (a) Marketing (b) Healthcare
(a) Palmtops (c) Education (d) Military
(b) Motherboard Manufacturer MP Electrician Instructor 07.11.2016, Morning
Computer 10 YCT
ye
p
Ans. (a) : Use of computer in different categories - 85. Which of the following characteristics of a
Categories Use computer enables it to work without human
(i) Marketing Advertising, Home shopping intervention?
(ii) Healthcare Diagnostic, system surgery, (a) Diligence (b) Accuracy
Pharma Information system, patient (c) Automatic (d) Versatility
Monitoring system. UPPCL TG-II 19-03-2021 (Shift-I)
(iii) Education Computer based Education Ans. (c) : A computer is an automated machine even if its
(iv) Military Missile control, Military humans instruct it. This is once the instructions are passed,
communication, smart weapons. the computer works on its own till the task is completely
Military operations and planning. done. This includes zero human intervention.
(v) Communication E-mail, chatting, use net video 86. Identify the capability of the computer system
calling etc.
that makes it adaptable.
80. Data processing refer to the transformation of (a) Never getting tired, bored or fatigued
incomplete data into
(a) Analog data (b) Discrete data (b) The quality to complete different types of
(c) Information (d) Binary data tasks: simple as well as complex.
WBPSC Instructor-18.09.2021 (c) The level of precision with which calculations
Ans : (c) Data processing therefore refers to the process of are done
transforming row data into meaningful output i.e. (d) The duration that the computer system
information. requires for fulfilling a task
Information refers to the meaningful output obtained KPSC Jr. Instructor 22.11.2018w
after processing the data. Ans. (b) : Adaptability of computer system means the
81. ______ has a meaning. It is about selecting data quality of it to complete a different type of tasks simple as
summarizing it and presenting it in such a way well as complex. Computer are normally versatile unless
that it is useful to the recipient. designed for a specific operation. Overall a daily purpose
(a) Data (b) Database computer is used in any area of application business,
(c) Command (d) Information industry, scientific, statistical, technological and so on.
HSSC wireman Instructor -17.12.2019, Shift-I 87. Which of the following is a characteristic of a
Ans : (d) Information is a group of data that collectively computer. Which enables it to perform
carries a logical meaning when information is entered into different tasks at the same time?
and stored in a computer, it is generally referred to as data. (a) Diligence (b) Speed
After processing such as formatting and printing output (c) Accuracy (d) Versatility
data can again be perceived as information. UPPCL TG-II 19-03-2021 (Shift-II)
82. Computer is a dumb machine and it cannot do Ans. (d) : Versatility is a characteristic that enables a
any work without instructions from the user - computer to perform completely different types of tasks.
this statement refers to which of the following The capability of a computer to perform more than one
computer characteristic? task or different types of tasks at the same time is called
(a) No feeling (b) Diligence the versatility of a computer.
(c) Versatility (d) No IQ
HSSC Electrician Instructor -17.12.2019 88. The minimum power consumption happens in
Ans. (d) : Computer is a dumb machine and it cannot the case of:
do any work without instructions from the user. This (a) Sleep
statement reference in computer characteristic No IQ. (b) Hibernate
83. Flexibility to solve various problems refers to (c) All of them consumes same amount of power
the ______ characteristic of a computer. (d) Shutdown
(a) Precision (b) Versatility Punjab Wireman instructor-07.07.2013
(c) Speed (d) Diligence Ans. (d) : Shutting down the computer shutdown all
UPPCL (TG-II) 24-01-2019 (EVENING) the devices related to the CPU and monitor and
Ans : (b) Flexibility to solve various problems refers to suspends the power supply. Due to which there is
the speed characteristic of a computer.. minimum power consumption while all devices do not
84. If we repeatedly enter the same input in a shut down in sleep and hibernate etc.
computer system, then we get the same result.
What is this characteristic of the computer 89. The ability to perform error free calculations
called? refers to the ______ property of a computer.
(a) Versatility (b) Reliability (a) Scalability (b) Speed
(c) Scalability (d) Diligence (c) Accuracy (d) Having no IQ
UPPCL TG-II 27-03-2021 (Shift-II) UPPCL TG-II 25-01-2019 (Morning)
Ans. (b) : A computer is reliable as if gives consistent Ans : (c) Computers perform calculations with 100%
result for similar set of data i.e., if we given same set of accuracy. Errors may occur due to data inconsistency or
input any number of times, we will get the same result. inaccuracy.
Computer 11 YCT
ye
p
90. Working continuously with 100% accuracy. 95. Which of the following was the first general -
Errors may occur due to data inconsistency or purpose electronic digital computer designed
inaccuracy. for corporate applications in the united states?
(a) Speed (b) Diligence (a) Z3 Machine (b) Turing machine
(c) No IQ (d) Versatility (c) UNIVAC I (d) ENIAC
UPPCL (TG-II) 24-01-2019 (Morning) UKSSSC Tech. Electrical Instructor-21.11.2017
Ans : (b) A computer is free from tiredness, lack of Ans. (d) : ENIAC (Electronic Numerical Integrator and
concentration, fatigue etc. If can work for hours without Computer) was the first electronic digital computer
creating any error. If millions of calculations are to be which was invented at the university of Pennsylvania by
performed a computer will perform every calculation J. Presper Eckart and John Mauchali in 1945 A.D.
with the same accuracy. 96. The calculator was originated from:
(a) Slide Rule (b) Difference Engine
II. Development of Computer (c) Ada (d) Abacus
KPSC Instructor Electronic-25.06.2014
91. Who built the analytical engine, one of the Ans : (d) The calculator originated from 'Abacus'.
early computing devices? Abacus is a mechanical device used to perform
(a) John Napier (b) Herman Hollerith mathematical calculations. Abacus is the world's first
(c) Blaise Pascal (d) Charles Babbage calculating machine.
KPSC Jr. Instructor- 09.07.2014 97. The word 'computer' was derived from which
Ans. (d) : The analytical engine was built by Charles of the following languages?
Babbage. Blaise Pascal built the first calculator (a) French (b) Latin
machine. (c) German (d) Spanish
Herman Hollerith invented an electromechanical (UPPCL TG2 11-11-2016)
tabulating of punch card machine. Ans : (b) The word 'Computer' was derived from the
92. ENIAC, EDVAC, etc are examples of _____ Latin word 'compute' which means 'To Calculate'.
generation computers. Therefore, the literal meaning of computer is calculator.
Computer is an electronic machine.
(a) Third (b) First
(c) Second (d) Fourth 98. With respect to microprocessors, what is the
full form of VLSI?
GSSSB Electronic Instructor-22.01.2017 (a) Varying Light-Scale Integration
Ans. (b) : ENIAC, EDVAC and EDSAC are examples (b) Very Light-Scale Integration
of the first generation of computers. ENIAC was the (c) Very Large-Scale Integration
first general purpose programmable computer, (d) Varying Large-Scale Integration
developed during World War II with the aim of helping Punjab Wireman instructor-07.07.2013
to calculate artillery firing tables. Ans. (c) : With respect to microprocessors, the full form
93. Electronic Numerical Integrator and Computer of VLSI is Very Large Scale Integration. It is a type of
(ENIAC) was first binary programmable Integrated circuit (IC). In which many transistors are
computer based on____. engaged.
(a) Blaise Pascal's concept 99. The World's first electronic digital computer is:
(b) Von Neumann's architecture (a) ENIAC (b) Siddhartha
(c) Charles Babbage's architecture (c) PARAM (d) MEDHA
(d) Turing's machine concept UPPCL Technical Grade-II (Shift- II)
KPSC Instructor Electronics Mech.20.07.2018 27.03.2021
Ans. (b) : Electronic Numerical Integrator and Ans : (a) ENIAC (Electronic Numerical Integrator and
Computer (ENIAC) was the first binary programmable Computer) was the World's first electronic digital
computer based on Von Neumann's architecture. computer, which was invented at the University of
ENIAC was designed by John Mauchly and J. Presper Pennsylvania, USA by J. Presper Eckert and John
Eckert. ENIAC was completed in 1945 and first put to Mauchly in 1945 AD. It was first used to calculate the
hydrogen BOMB by USA Army. ENIAC was the First
work for practical purpose on December 10, 1945.
General Purpose Electronic Computer.
94. Who began developing the first mechanical 100. Computer systems that store instructions and
computer in 1822? data from the same memory unit without any
(a) Charles Babbage distinction are based on the ______ structure.
(b) Ada Lovelace (a) Harvard (b) Babbage
(c) Herman Hollerith (c) Knuth (d) Von-Neumann
(d) Joseph Marie Jacquard WBPSC Instructor-18.09.2021
GSSSB Supervisor Electronic Instructor 18.01.2014 HSSC wireman Instructor -17.12.2019, Shift-I
Ans. (a) : The first mechanical computer was developed Ans : (d) Von Neuman architecture" refers to any
by Charles Babbage in 1822. These are computers built stored program computer, in which an instruction and a
from mechanical component such as levers and gears data operation cannot occur at the same time because
rather than electronic components. they share their space on a 'Common Bus".
Computer 12 YCT
ye
p
101. The UNIVAC I was the first general-purpose Mauchly that was designed for corporate applications in
electronic digital computer that was designed the United States.
for corporate applications in the United States. 102. With respect to the first digital electronic
What is the full form of UNIVAC? computer, what is the full form of ABC?
(a) Universal Automatic Computer (a) Atanasoff Binary Computer
(b) United Automatic Computer (b) Analog Berry Computer
(c) Universal Automatic Calculator (c) Atanasoff-Berry Computer
(d) Universal Asynchronous Computer (d) Analog Binary Computer
MP Electrician Instructor 07.11.2016, Morning DSSSB Craft Instructor (ESM) 06.10.2019
Ans. (a) : The full form of UNIVAC is Universal Ans. (c) : The first digital electronic computer was
Automatic Computer, it is the first general purpose known as ABC (Atanasoff-Berry-Computer). It was
electronic digital computer that was developed by a created by physics professor John Vincent Atanasoff
team of engineers led by J. Presper Eckert and John and he was graduate student of England in 1943.
Generations Hardware Software Memory Input/output Language Examples of Advantages/
Devices Generations disadvantages
First Vacuum Machine Magnetic Paper tape Low level ENIAC, Consume lot
Generation Tube language tapes and and punched language, EDVAC, of electricity.
(1942- binary (0,1) magnetic cards Machine UNIVAC, expensive,
1955) drums language IBM 650, large size,
(0,1) IBM 701, higher energy,
consumption
Greater
chance of
error
Second Transistor Batch Magnetic core, Magnetic Assembly PDP-8, Smaller in
Generation operating magnetic disk tape and and high IBM 1400 size low
(1956- system Punched level Series IBM power
1964) cards language 7090 & consumption
(FORTRAN, 7094 and generated
ALGOL, UNIVAC less heat.
COBAL) 1107 CDC
3600
Third Integrated Time Large Magnetic High-level IBM 360, Relatively
Generation Circuit Sharing Magnetic core, tape, language IBM 370, fast, small and
(1965- (ICs) SSI, multi magnetic monitor, (PASCAL, PDP-11, cheap, easy to
1975) MSI program tape/disk Keyboard, BASIC) NCR 395 use
ming printer etc.
operating
system
Fourth Micro- Graphical Semiconductor Pointing High level IBM PC, Highly
Generation processor user interface Memory devices language C, STAR reliable and
(1976- and very (GUI), keyboard, C++, 1000, very less
1989) large scale UNIX, Real monitor etc. Database etc. APPLE II maintenance
integration Time, APPLE storages
(VLSI) Distributed Macintosh capacity very
operating Alter 8800 large and
system. etc. faster.
Fifth Based on Internet and Optical disk, Touch Understand Desktops, Portable and
Generation Artificial multimedia virtual screen, pen, natural laptops, small in size
(1990- intelligence, software memory speech language tablets, fastest.
present) uses the parallel/multi (Huge storage input, light (human smart phone
Ultra large- processing capacity) scanner language)
scale operating printer etc.
Integration system.
(ULSI)
technology
and parallel
processing
method.
Computer 13 YCT
ye
p
103. Which of the following was used in second 108. With respect to integrated circuit, what is the full
generation computers. form of VLSI?
(a) Integrated Circuit (b) Transistor (a) Varied Large Scale Integration
(c) Microprocessor (d) Vacuum Tube (b) Very Large-Scale Integration
UPPCL TG-II 20-03-2021 (Shift-I) (c) Varied Large-Scale Interrogation
Ans. (b) : First generation – Vacuum tube (d) Very Large-Scale Interface
Second generation – Transistors UPPCL TG-II 19-03-2021 (Shift-II)
Third generation – Integrated circuit Ans. (b) : The full form of VLSI is Very Large-Scale
Fourth generation – VLSI Microprocessor Integration, it is used in microprocessor, Phone's chip,
Fifth generation – ULSI graphic card etc.
Microprocessor 109. Arrange the following options in ascending
104. Which of the following statements is/are true order on the basis of their data processing
about second generation computers? capabilities. Mainframe, Minicomputer, Micro
(i) Vacuum tubes are used in these. computer.
(ii) In this generation, magnetic core was used (a) Mainframe, Minicomputer, Micro computer
as primary memory. (b) Micro computer, Minicomputer, Mainframe
(a) Only (i) (b) Only (ii) (c) Minicomputer, Mainframe, Microcomputer
(c) Neither (i) nor (ii) (d) Both (i) and (ii) (d) Microcomputer, Mainframe, Minicomputer
RRB Bengaluru LP-2004 UPPCL TG-II 19-03-2021 (Shift-II)
Ans. (b) : The second generation computer was Ans. (b) : Ascending order of computers, based on data
introduced in the year 1956. Transistors were used in processing are follows:
computers of this generation. Due to transistors the size Microcomputer→Minicomputer→Mainframe computer
of the second generation of computer was smaller than A microprocessor used in a microcomputer is less power
the first generation assembly language and high level full than the processor used in minicomputer. Mainframe
languages were also used in computers of this computer is more powerful than minicomputer and less
generation. powerful than super computer.
105. In which of the following generation of 110. In terms of data processing power, which of the
computers C++, COBOL and Java following option gives the correct sequence of
programming language were used? different computer generations:
(a) Fourth (b) Third (a) fourth generation < third generation < second
(c) Fifth (d) First generation < first generation
(b) fourth generation < second generation < third
UPPCL Technical Grade-II Shift-I, 28.03.2021
generation < first generation
Ans. (b) : The period of the third generation of (c) first generation < second generation < third
computer is considered to be from 1963-1972. This generation < fourth generation
generation used IC. Due to which the speed and (d) first generation < third generation < second
efficiency of the computer increased significantly, C++, generation < fourth generation
C, PASCAL, FORTAN and COBOL etc. Punjab Wireman instructor-07.07.2013
106. Which computer generation replaced the IC Ans. (c) : The sequence of computer generations in
(Integrated Circuit) with VLSI (Very Large terms of data processing power is generally as first
Scale Integration) circuit? generation < second generation < third generation <
(a) Fourth (b) First fourth generation.
(c) Second (d) Third 1. 1st generation computer (1942-1955)→Vacuum Tube
HSSC wireman Instructor -17.12.2019, Shift-II 2. 2nd generation computer (1956-1964) → Transistor
GSSSB Supervisor Electronic Instructor 18.01.2014 3. 3rd generation computer (1965-1975) → IC
Ans : (a) Fourth Generation computers were developed 4. 4th generation computer (1976-1989)→VLSI
between 1976-1989 using VLSI which full form is microprocessor
Very Large Scale Integration. It is a circuit and this 5. 5th generation computer (1990-till now) → ULSI
type of circuit has about 5000 transistors and more microprocessor
elements. The use of VLSI technology led to the 111. What is the full form of ULSI?
creation of Microprocessors which reduced the size of (a) Unique-Large-Scale Integration
the computer and increased capacity.
(b) Ultra-Large-Scale Integration
107. Which of the following is a 4th generation (c) Ultra-Light-Scale Integration
Programming language? (d) Unique-Light-Scale Integration
(a) C (b) Basic KPSC Instructor Electronic-25.06.2014
(c) SQL (d) Mercury
Ans. (b) : The full form of ULSI is Ultra - Large - Scale
KPSC Instructor Electronic-25.06.2014 Integration. ULSI is the process of integrating or
UKSSSC Tech. Electrical Instructor-21.11.2017 embedding millions of transistors on a single silicon
Ans. (c) : Structured Query Language (SQL) is the semiconductor microchip.
fourth generation programming language used to 112. Advanced technologies, such as artificial
manage relational database such as to store manipulate intelligence, quantum computing etc were
and retrieve data etc. mainly for the ____ generation of computers.
Computer 14 YCT
ye
p
(a) Fifth (b) Third Ans. (d) : A super computer is a computer with a high
(c) Second (d) Fourth level of performance as compared to a general - purpose
UPPCL TG-II 25-01-2019 (Evening) computer. The performance of a super computer is
Ans : (a) The beginning of the fifth generation of commonly measured in floating point operations per
computer is considered to be from 1990 to till now. This second instead of million instruction per second.
generation of computers was based on advanced
119. PARAM is an example of _____.
technology such as artificial intelligence, quantum
computing, parallel processing hardware etc. Artificial (a) Mini-computer (b) Desktop computer
intelligence has the ability to think and learn on its own (c) Super-computer (d) Laptop
like human. It is used to make intelligence machine KPSC Instructor Electronics Mech.20.07.2018
(computer) that thinks like human. Ans : (c) PARAM is an example of a supercomputer
113. Which of the following can support multiple developed by C. DAC in Pune. Prathyush and Mihir are
users at a time? the fastest supercomputer in India.
(a) Palmtop (b) Personal computer 120. Large (Mainframe) computers are not more
(c) Microcomputer (d) Minicomputer powerful than ______.
UPPCL (TG-II) 24-01-2019 (Morning) (a) Super computer (b) Minicomputer
Ans : (d) Minicomputer is called mid range computer (c) Personal computer (d) Microcomputer
because it is bigger than microcomputer and smaller GSSSB Supervisor Electronic Instructor 18.01.2014
than mainframe computer. Minicomputer is mainly Ans : (a) Mainframe computers are not more powerful
multiuser computer. Where more than one user can than super computer. Super computers are the largest in
work together. Example of minicomputer are IBM's As/ size and the most costly computers in the world while
400e, Honey Well 200, TI-990 etc. mainframe computer are less costly, small in size and
114. One first generation computers can be slower in speed the super computers.
characterized as _____.
121. Which of the following does not belong to the
(a) Mainframe (b) Super Computer
category of microcomputer?
(c) Analog Computer (d) Digital Computer
(a) Desktop computers (b) Cray-1
UPPCL Technical Grade-II (Re-exam) 16.10.2016
(c) Workstations (d) Palmtop computers
Ans. (c) : The first generation computers can be
UKSSSC Tech. Electrical Instructor-21.11.2017
characterized as Analog Computer.
Ans. (b) : Cray-1 is a super computer, which was
115. Computer like desktop computers laptops and
palmtop computers can be classified as _____. designed, developed and marketed by Cray Research.
(a) Super Computer (b) Mini Computer The first Cray-1 system was installed at Los Almos
National Laboratory in 1976. While desktop computers,
(c) Mainframe Computer (d) Personal Computer
workstations, palmtop computer, microcomputers are
RRB Kolkata LP-2009
the categories of computers.
Ans. (d) : Computer like desktop computers laptops and
palmtop computers can be classified as Personal
Computer.
III. Input/Output
116. The term 'tower model' is related to which of 122. Which of the following is a special purpose
the following category of computers? application software?
(a) Desktop computer (b) PDAs (a) Payroll system
(c) Laptop (d) Palmtop (b) Linux
KPSC Jr. Instructor- 09.07.2014 (c) Windows
Ans. (a) : The term 'tower model' refers to the desktop (d) Database management system
computer category of computers, in which the power
supply, motherboard, hard drive etc are stacked on top RRB Bengaluru LP-2004
of each other in a cabinet. Ans. (a) : Payroll software is an on-premises or cloud -
based solution that manages, maintains and automates
117. Which of the following is not a type of
payments to employees.
Computer classification?
(a) Electrical computer (b) Analog computer 123. Which of the following input devices is used as
(c) Digital computers (d) Hybrid computer a personal computer peripheral or general
GSSSB Electronic Instructor-22.01.2017 control device consisting of a hand - held stick
that rotates around a loose and moves the
Ans : (a) Analog computer, digital computer and screen cursor around rotates?
Hybrid computer are types of computer classification,
(a) Microphone (b) MICR
where as electrical computer is not a type of computer.
(c) Biometric (d) Joystick
118. Which of the following are large systems DSSSB Craft Instructor (ESM) 06.10.2019
specially designed to solve complex scientific
and industrial problems? Ans. (d) : Joystick is an input device which works like a
(a) Mini computers (b) Micro computers trackball. The ball has a stick attached to it that rotates
on a base and reports its angle or direction to the CPU.
(c) Mainframes (d) Super computers
It is used in video games, simulator training etc.
UPPCL Executive Assistant 30.11.2022, Shift-I
Computer 15 YCT
ye
p
124. Which of the following types of mouse uses 129. Which of the following statements regarding
laser rays for cursor movement on the input devices of a computer is incorrect?
computer screen? (a) They convert input data into digital form.
(a) Optical (b) Electrical (b) Data entered through the keyboard are
(c) Gyroscopic (d) Mechanical directly transferred to the Memory Data
MP Electrician Instructor 07.11.2016, Morning Register (MDR).
Ans. (a) : Optical mouse uses a laser to detect the (c) Mouse is an input device.
movement of the mouse. An optical mouse uses LEDs, (d) They are used to send data to the computer.
optical sensor, and digital signal processing in place of KPSC Jr. Instructor 22.11.2018w
traditional mouse ball and electromechanical Ans. (b) : An input device is a computer device that
transducers. allows computer users to enter data into the system and
send instructions to the system to perform tasks.
125. Which of the following mouse actions is Following are the input devices in a computer –
commonly used to start a program or open a
Braille reader, GPS device, optical mark reader etc.
file? Hence, option a, c, d is related to computer input device
(a) Right click (b) Double Click and option (b) is not correct.
(c) Left click (d) Drag and drop 130. Which of the following is an input device?
WBPSC Instructor-18.09.2021 (a) Optical character reader (b) Projector
Ans. (b) : Double click on mouse action is usually used (c) Headphones (d) Inkjet printer
to start a program or open a file. (UPPCL TG-2 26.06.2016)
126. Select the odd option. RRB Kolkata LP-2006
(a) Joystick (b) Printer Ans. (a) : The main input and output devices of the
(c) Keyboard (d) Mouse computer are as follow:
HSSC wireman Instructor -17.12.2019, Shift-I Input Devices– Keyboard, Mouse, Trackball, Barcode
Ans. (b) : Input devices are hardware components or reader, Optical Character Reader, Joystick, Scanner,
peripherals used to provide data and commands to a Webcam, Touchpad etc.
computer or electronic device. They allow users to input Output Devices– Monitor, Printer, Projector, Plotter,
information, interact with software, and control the LCD, Projection Panel, Headphone, Speaker etc.
device's functions. Mouse, Keyboard and Joystick are 131. Which device sends information to a computer
input devices, while printer is output device. system for processing?
127. All of the following are examples of various (a) Monitor (b) Printing
input devices, EXCEPT: (c) Input (d) Output
(a) Speakers (b) Keyboard UPPCL-JE 31-01-2019 (Batch -01)
(c) Mouse (d) Optical Scanner RRB Ajmer-2004
HSSC wireman Instructor -17.12.2019, Shift-II Ans. (c): Input device sends data to computer system
RRB Kolkata LP-2012 which is processed by processor and after processing,
Ans. (a) : Input devices are hardware components that result is obtained with the help of output device.
allow users to enter data or commands into a computer. 132. The device that converts a physical image into
Some common input devices-: a digital one is called:
(a) Scanner (b) Image Converter
• keyboard
(c) Printer (d) Recorder
• Mouse RRB Gorakhpur L.P.-2008
• Touch Screen Ans. (a) : Scanner is an input device through which we
• Scanner scan the hard copy data and convert that into the digital
• Joystick form.
• Barcode Reader 133. Which of the following is not an output device?
An output device is a hardware component that displays (a) Printer (b) Plotter
or provides information from a computer common (c) Scanner (d) Speaker
examples include monitor, printer, speaker and Punjab Wireman instructor-07.07.2013
headphone. Ans : (c) Devices that produce or display results after
128. The two running programs coordinates to the processing, are called output devices such as printers,
I/O stream is called as ____. plotters and speakers while scanner is an input device
that is used to convert text or images into digital form.
(a) Cache (b) Pipe
134. Which of the following is not a part of input
(c) Buffer (d) Thread
stage?
RRB Kolkata LP-2009 (a) Data Capture
Ans : (b) The two running programs coordinates to the (b) Performance of Instructions
I/O stream is called as pipe. Pipe is a method of which (c) Data Collection
information is passed from one program process to (d) Encoding
another program process. UPPCL Technical Grade-II-09.08.2015
Computer 16 YCT
ye
p
Ans. (b) : The process of input takes place in several 142. A mouse, trackball and joystick are examples of
stages like data capture, data encoding, data collection (a) pointing devices
but display of instructions is not a part of input stage. (b) pen input devices
135. The Insert key on the keyboard of a computer (c) data collection devices
system is used to toggle between the ________ (d) multimedia devices
and _________ modes during data entry. (UPPCL TG-2 26.06.2016)
(a) insert, overwrite UPPCL-JE 31-01-2019 (Batch -01)
(b) backspace, overwrite Ans: (a) Mouse is a small hand held pointing device
(c) delete, insert that basically control the two-dimensional movement of
(d) delete, overwrite the cursor of the display screen pointing devices are the
Punjab Wireman instructor-07.07.2013 input devices that are generally used for moving the
Ans. (a) : The Insert key is mainly used to switch between cursor to a particular location to point an object on the
the two modes of entering text and to toggle between the screen.
Insert and Overwrite modes during data entry. Some of the commonly used pointing devices are:
136. The default layout of most keyboards is called - Mouse, trackball, Light pen, Joystick, Touch screen.
(a) ALPHBET (b) QWERTY A pointing device is a human interface device that
allows a user to input spatial data to a computer.
(c) ASCII (d) IEEE
KPSC Instructor Electronic-25.06.2018 143. Touchpad is a good alternative to the mouse, it
is an example of .............
Ans. (b) : The default layout of most keyboards is
(a) Software device (b) Printing device
QWERTY. It was first designed by shells and Glidden
typewriter in 1868. (c) Pointing device (d) Temporary device
(UPPCL TG2 11-11-2016)
137. A device that allows you to take to a computer
(such as a mouse or keyboard) is a/an ______ Ans : (c) Touchpad is an input device, with the help of
device. which we give instructions to our system just by
(a) Storage (b) Process touching the screen.
(c) Input (d) Output 144. Which of the following statements is wrong?
GSSSB Electronic Instructor-21.01.2014 (i) The cordless mouse is not physically connected
Ans. (c) : Input devices like keyboard, Mouse, Touchpad to the computer.
etc. are used to give instructions to the computer. (ii) The cordless mouse relies on infrared or
138. Which of the following is an Input device? radio waves to communicate with the
(a) Joystick (b) Plotter computer.
(c) Coder (d) Printer (a) Only (ii) (b) Both (i) and (ii)
(c) Neither (i) nor (ii) (d) Only (i)
UKSSSC Tech. Electrical Instructor-21.11.20178
UPPCL (TG-II) 24-01-2019 (EVENING)
Ans. (a) : Joystick is an input device which works like
a trackball. A stick is attached to the ball through, which Ans : (c) Cordless mouse is an input device used in
it is rotated. It is used in video games, simulator training computer. It is very modern mouse which does not
etc. require cable to connect. In this, infrared or radio waves
are needed for transmission.
139. Which among the following input devices
consists of a stick which pivots on a base and 145. The technology of scanning that recognized
reports its angle or direction of the CPU? handwritten text and printed text is
(a) Microphone (b) Light pen (a) MICR (b) OMR
(c) Keyboard (d) Joystick (c) OCR (d) BCR
UPPCL JE 2019 (Batch-02) UPPCL-JE 31-01-2019 (Batch -01)
Ans. (d): Joystick is an input device consists of a stick Ans: (c) OCR (Optical Character Recognition) is a
which pivots on a base and reports its angle or direction technology of scanning that recognizes handwritten text
of the CPU. and printed text.
140. Light pen and Joystick are _______. 146. The technology of scanning that reads the
(a) storage devices (b) input devices check boxes contained inside a predefined
(c) algorithms (d) output devices space is
HSSC wireman Instructor -17.12.2019, Shift-I (a) BCR (b) OCR
Ans. (b): Devices through which we give instructions to (c) OMR (d) MICR
the computer are called as input devices. UPPCL JE 2019 (Batch-02)
For example- Light pen, Joystick, Mouse, Keyboard etc. Ans: (c) Optical Mark Recognition (OMR) is a method
141. Which of the given options is odd? of entering data into a computer system, which reads the
check box in the predefined position.
(a) Trackball (b) Keyboard 147. For reading a candidate's choice in multiple
(c) Antivirus (d) Mouse
choice questions which of the following input
UPPCL TG-II 25-01-2019 (Morning) devices is generally used?
Ans : (c) Trackball, Keyboard and Mouse all these are (a) Magnetic Ink Card Reader
hardware devices whereas antivirus is software. (b) Optical Character Reader
Computer 17 YCT
ye
p
(c) Optical Mark Reader 152. Microphone is a/an______ device, which
(d) Bar Code Reader receives sound as input.
UPPCL JE 2019 (Batch-01) (a) Signal Digitizing
Ans: (c) Optical Mark Reader is an input device, which (b) Audio signal collection
is used to read a candidate's choice in multiple choice (c) Audio signal processing
questions. (d) Input
148. Which of the following options of mouse RRB Gorakhpur L.P.-2008
properties is used to swap the functions of the Ans : (d) A microphone is an input device. It converts
right and left mouse buttons? sound waves into electrical signals that can be
(a) Pointer Options processed and recorded by a computer or other
(b) ClickLock electronic devices.
(c) Double-click speed 153. Which input device converts analog
(d) Button configuration information into digital form and can be used
for doing fine works of drawing and image
KPSC Jr. Instructor 22.11.2018w manipulation?
Ans. (d) : Button configuration option of mouse (a) Microphone (b) Bar Code Reader
properties is used to swap the functions of the right and (c) Digitizer (d) Graphic Plotter
left mouse buttons, whereas pointer options change the UPPCL JE 2019 (Batch-02)
pointer shape, ClickLock enables you to highlight or Ans: (c) A digitizer is an input device or technology
drag items without holding down the mouse button. used to convert analog information, such as drawings,
149. Which of the following statement(s) is/are true hand written notes, images into digital format that a
about changing mouse properties in Windows computer can understand and manipulate. It is commonly
10? used in graphic design, art and industries where precise
(i) The function of the left button of the mouse input or capturing of analog data is needed.
cannot be changed. 154. Which of the following is not an input device?
(ii) The size of the mouse pointer can be (a) Track Ball (b) Plotter
changed. (c) Light Pen (d) Magnetic Scanner
(a) Only (ii) (b) Neither (i) nor (ii) DSSSB Craft Instructor (ESM) 06.10.2019
(c) Both (i) and (ii) (d) Only (i) Ans : (b) Track ball, Light pen and magnetic scanner, all
HSSC wireman Instructor -17.12.2019, Shift-II are input devices, while plotter is output device.
Ans. (a) : To change the mouse properties in Windows 155. A keyboard is used
10, the function of the left mouse button can be changed (a) to enter text and numbers and send
and the size of the mouse pointer can also be changed, commands to the computer
hence the given statement (ii) is true. (b) to create new keys to use with your computer
(c) to open the computer
150. Which of the following statement is/are correct
(d) for all of these
about changing mouse properties in windows
(UPPCL TG2 Re-exam 16-10-2016)
10.
(i) The cursor speed of the mouse cannot be Ans : (a) Keyboard is an input device. Keyboard is used
changed. to enter data in the computer. Shortcut Keys are used to
give commands to the computer. The main button of the
(ii) It is possible to change the function of the Keyboard are as bellow-
left mouse button to open the context (1) Numeric buttons (A-Z, 0-9)
menu. (2) Function button
(a) Both (i) and (ii) (b) Only (i) (3) Cursor button
(c) Only (ii) (d) Neither (i) Nor (ii) (4) Special button
UKSSSC Tech. Electrical Instructor-21.11.2017 156. Which of the following is a toggle key on a
Ans. (c) : Statement (i) is incorrect with respect to keyboard?
mouse properties in windows 10 because in this we can (a) Alt (b) Shift
change the speed of the mouse cursor as per our (c) Scroll lock (d) Ctrl
requirement. Statement (ii) is true, can change the function UPPCL Technical Grade-II (Shift- II) 27.03.2021
of the left mouse button to open the context menu. Ans. (c) : Toggle ‘Key’ is used to turn a function off or
151. The Click Lock property of the mouse - on or to switch between two functions. There are three
(a) None of these toggle keys in the keyboard.
(b) Allows to prevent items from getting clicked 1. Num Lock
(c) Allows to set password for items 2. Caps Lock
(d) Allows to drag without holding mouse button 3. Scroll Lock
MP Electrician Instructor 07.11.2016, Morning Toggle key can also be turned on/off as per requirement.
WBPSC Instructor-18.09.2021 157. Parallel ports usually are not used to connect
Ans : (d) The ‘ClickLock’ property of the mouse, _______.
enables a user to lock down the primary mouse button (a) Modem (b) Scanner
after a single click. This allows you to highlight or drag (c) Printer (d) CD Writer
without holding down the primary mouse button. UKSSSC Tech. Electrical Instructor-21.11.2017
Computer 18 YCT
ye
p
Ans. (a) : Printers, Scanners, CD writers, etc. are Ans : (b)
usually connected to parallel ports while modems are Backspace - Deletes the character to the left of the
connected to serial ports. cursor.
158. A combination of the keyboard and the visual Delete - Deletes the character to the right of the
display unit is called a ____. cursor.
(a) mouse (b) port Home - The home key brings cursor to the
(c) terminal (d) cable beginning of the line.
GSSSB Supervisor Electronic Instructor 18.01.2014 End - The end key brings cursor to the end of
KPSC Instructor Electronics Mech.20.07.2018 the line
Ans : (c) A computer terminal is an electronic or 164. The arrow keys, Home Key, End Key, Page Up
electromechanical hardware device used to display or and Page Down keys in a computer keyboard
print data in a computer, a computer terminal including a are classified as
keyboard and VDU are attached to each other. (a) Function keys (b) Special purpose keys
159. QWERTY keyboard design was originally (c) Standard keys (d) Navigation keys
intended to UPPCL JE 2019 (Batch-02)
(a) Make typing harder and inefficient Ans: (d) In computer keyboard, the arrow keys, home
(b) Improve the typing accuracy key, end key, page up and page down keys are kept in
(c) Make typing more efficient the category of navigation keys.
(d) Improve the typing speed 165. Ctrl, Shift and Alt are called
(a) Adjustment keys (b) Function keys
UPPCL JE 2019 (Batch-01)
(c) Modifier keys (d) Alphanumeric keys
Ans: (a) QWERTY was originally created to make (UPPCL TG-2 26.06.2016)
typing difficult and inefficient. It was designed in 1868
Ans : (c)
by type writer inventor Christopher Shields.
Function key : F1..................F12
160. QWERTY refers to:
Alphanumeric key : A......Z, 0.......9
(a) Arrangement of hardware parts of a standard
computer or mobile devices Modifier key : Ctrl, Alt, Shift
(b) Arrangement of keys on a standard English Adjustment key : Function key, Arrow key and
computer keyboard or typewriter as such keys by which brightness etc, are adjusted.
(c) Arrangement of only function keys on a 166. Which of the following keys work in a toggle
standard English computer keyboard mode in a computer keyboard?
(d) Arrangement of only numeric keys on a (a) Shift (b) Caps lock
standard English computer keyboard (c) Enter (d) Ctrl
UPPCL TG-II 27-03-2021 (Shift-II)
UPPCL JE 31-01-2019 (Batch-02)
Ans. (b) : The most commonly used toggle key is the
Ans: (b) QWERTY refers to arrangement of keys on a caps lock key which alternates letters between upper
standard English computer keyboard or typewriter. case and lower case.
161. The wildcard character for matching any number 167. A computer keyboard generally has _____
of characters is function keys.
(a) Hyphen Sign (b) Ampersand Sign (a) 11 (b) 10
(c) Asterisk Sign (d) Dollar Sign (c) 16 (d) 12
WBPSC Instructor-18.09.2021 UPPCL (TG-II) 24-01-2019 (Morning)
Ans : (c) Asterisk is a little star symbol which matches Ans : (d) The function keys or F keys are line up at the
letters. It is located on numeric key 8 of keyboard which top of the keyboard and label F1 to F12. These keys act
matches any number of characters. as shortcuts performing certain functions such as saving
162. Shift key and Print Screen key in a computer a file, printing data or refreshing a page. The number of
function 'keys' is 12.
keyboard are known as
(a) Special purpose keys (b) Standard keys 168. Which of the following is not an option in the
buttons tab at the bottom of the mouse
(c) Navigation keys (d) Function keys properties window of the control panel in
UPPCL JE 2019 (Batch-01) windows 10 OS?
Ans: (a) In computer keyboard, shift and print screen (a) Clicklock (b) Button configuration
keys are called special purpose keys. (c) Single Click speed (d) Double-click speed
163. Which key deletes the character to the left of HSSC wireman Instructor -17.12.2019, Shift-II
the cursor? Ans. (c) : In windows 10 OS clicklock, buttons
(a) End (b) Backspace configuration and double click speed are found in the
(c) Home (d) Delete buttons tab under the mouse properties window of the
(UPPCL TG-2 26.06.2016) control panel whereas single click speed is not an option
(UPPCL TG-2 Re-exam 16-10-2016) available.
Computer 19 YCT
ye
p
169. The blinking symbol on the computer screen is bank's code number are cheque and number printed on
called the cheque with a special type of ink which particles are
(a) Mouse (b) hand magnetic material which are machine readable.
(c) cursor (d) logo 175. Which of the following is not an output device ?
(UPPCL TG2 Re-exam 16-10-2016) (a) Plotter
Ans : (c) The blinking symbol on the computer screen (b) Speech synthesizer
is called the cursor, it shows the current position, where (c) MICR
word will typed. (d) Smart and intelligent terminal
170. Which of the following is used to read hand HSSC wireman Instructor -17.12.2019, Shift-II
written or printed text to make a digital image Ans. (c) : Plotter, Speech synthesizer and Smart
that is stored in memory? intelligent terminal are output devices, whereas
(a) Printer (b) Laser beam Magnetic Ink Character Recognition is an input device.
(c) Scanner (d) Touchpad 176. Which of the following types of scanner reads
(UPPCL TG-2 26.06.2016) characters, marks and codes with the help of a
Ans : (c) A scanner is a device that alternatively scans light source and they are used for objective
an image, printed text, hand writing or an object and type answer papers in competitive
converts them into a digital image and stores it in examinations?
memory. (a) Optical Character Recognition
171. Which of the following is a direct input device (b) Optical Mark Recognition
wherein data is inputted into the computer (c) Optical Barcode Recognition
directly by a machine or device? (d) Magnetic Ink Character Recognition
(a) Touch screen (b) Barcode scanner UPSSSC JE 2018 ( Exam date 16.04.2022)
(c) Microphone (d) Webcam (UPPCL TG-2 26.06.2016)
RRB Kolkata LP-2009 Ans. (b) : Optical Mark Recognition Scanner reads
MP Electrician Instructor 07.11.2016, Morning alphabets, numbers and codes with the help of light
Ans. (b) : A barcode reader or barcode scanner is an source and is used for objective type answer sheets in
optical scanner that can read printed barcodes, decode competitive examination.
the data contained in the barcode to a computer. 177. ______is a technology used by banking or other
172. Which of the following devices is used to print finance industries for faster processing of
very large drawings or complex line art by cheques.
mechanical movement of a pen or other (a) OCR (b) OMR
instrument across the surface of a piece of (c) MICR (d) ISBN
paper? (UPPCL TG-2 26.06.2016)
(a) Line Printer (b) Inkjet Printer Ans : (c) MICR (Magnetic Ink Character Recognition)
(c) Scanner (d) Plotter is a technology used by banking or other finance
UPSSSC JE 2018 ( Exam date 16.04.2022) industries for faster processing of cheques.
Ans. (d) : Plotter is used to print very large drawings or 178. The panels used in ATM machines, safe
complex line art by mechanical movement of a pen or Checking Kiosks at Airports etc are examples
other instrument across the surface of a piece of paper of _____
this plotters pen work on X axis and paper wrapped on (a) Laser pens (b) Analog display units
the drum is moved horizontally along the X axis. (c) Touch panels (d) Projectors
173. Which of the following scanners looks similar to a UPPCL Technical Grade-II (Shift-II) 20.03.2021
photocopier machine and it consists of a box Ans : (c) Touch panels is a pointing device that
containing a glass plate on its top and a lid that enables user to enter data such as text, picture, image,
covers the glass plate? directly touching the screen and interact with computer
(a) Laser (b) Flatbed system. It is used in a variety of applications such as
(c) Inkjet (d) Dot matrix cell phones, PDA's ATMs and games.
UPPCL JE 31-01-2019 (Batch-02) 179. Match the following:
Ans: (b) Flatbed scanner looks like to a photocopier 1. Software A. Light pen
machine and it consists of a box containing a glass plate 2. Input device B. Speaker
on its top and a lid that covers the glass plate the lid of 3. Output device C. Secondary memory
flatbed scanners is adjustable that makes the scanning of
different object such as documents and leaflets possible. 4. SSD D. Set of program
(a) 1- D, 2-A, 3-B, 4-C (b) 1-D, 2-C, 3-B, 4-A
174. MICR Scanner ––––– is an example of. (c) 1-A, 2-D, 3-B, 4-C (d) 1-D, 2-A, 3-C, 4-B
(a) Control Unit (b) Input Unit
GSSSB Electronic Instructor-21.01.2014
(c) Output Unit (d) Secondary Memory
KPSC Jr. Instructor 22.11.2018w Ans. : (a) Matched options are as follows:
Punjab Wireman instructor-07.07.2013 1. Software D Set of program
Ans. (b) : Magnetic Ink Character Recognition (MICR) 2. Input device A Light pen
is an input device. It is commonly used in banks as a 3. Output device B Speaker
large number of cheques are processed every day. The 4. SSD C Secondary memory
Computer 20 YCT
ye
p
S.N. Main Output Device 184. Which of the following printers prints
1. Monitor characters by striking a pin on an ink-ribbon?
2. Printer (a) Dot matrix (b) LED
3. Speaker (c) Laser (d) Inkjet
RRB Kolkata LP-2009
4. Plotter
Ans. (a) : Dot matrix printer is an impact printer which
5. Screen Image Projector
print character using a fixed number of pin or wires.
180. Which of the following statements is incorrect
185. A/An ______ is an output device that produces
with reference to the visual display unit (VDU)
high quality graphics using an ink pen.
of a computer system?
(a) Dot Matrix Printer (b) Plotter
(a) VDU creates images by arranging tiny dots (c) VDU (d) Inkjet Printer
known as pixels, in a rectangular pattern
UPPCL (TG-II) 24-01-2019 (EVENING)
(b) VDU is the primary output device of a computer
(c) VDU has differences between cathode-ray Ans : (b) Plotter is an output device that is used to
tube and flat-panel display print high quality graphics and image. It uses one or
(d) The size of the pixel determines the clarity of more pens to produce a high quality drawing.
the image displayed on the VDU 186. Which output device draws pictures on a paper
HSSC wireman Instructor -17.12.2019, Shift-II based on the commands given from a computer
Ans. (d) : The size of the pixel determines the clarity of using a pen?
the image displayed on the VDU. (a) Scanner (b) Monitor
(c) Inkjet printer (d) Drum plotter
181. Which of the following statements is correct UPPCL-JE 31-01-2019 (Batch -01)
about the output devices of a computer?
(a) It is used to send data to the computer Ans: (d) Drum plotter is a graphic output device that
(b) Mouse is an output device draws lines or image with a continuously moving pen
(c) It converts digital data into a form on a sheet of paper rolled around a rotating drum that
understandable by humans moves the paper in a direction perpendicular to the
(d) It converts data into digital form motion of the pen. The plotters are divided into the
Punjab Wireman instructor-07.07.2013 following four categories on the basis of their working
Drum plotter, Flatbed, Inkjet and Electrostatic etc.
Ans. (c) : Output devices are hardware components of a
computer system that displays or presents information 187. There are two types of plotters, whose name
to the user or another machine. They convert digital are–
data generated by computer into human - readable or (a) spiral and flatbed (b) flatbed and cone
machine readable form. Ex- Monitors, Printers, (c) drum and flatbed (d) drum and spiral
Speakers, Projectors, Headphones etc. Mouse is an DSSSB Craft Instructor (ESM) 06.10.2019
input device. So, option (c) is correct. MP Electrician Instructor 07.11.2016, Morning
182. Which of the following statements is incorrect Ans: (c) Plotter is a computer printer which is used to
regarding computer output devices? vector graphics. Mainly three types of plotters are:-
(a) It converts digital data into a form that is (i) Drum (ii) Flatbed (iii) Inkjet.
human understanding 188. Which of the following is NOT a type of
(b) It converts data into digital form monitor?
(c) It receives data from the computer system for (a) TFT Monitor
display (b) High-Definition Multimedia Interface
(d) Printer is an output device (HDMI)
KPSC Instructor Electronic-25.06.2014 (c) LCD Monitor
GSSSB Electronic Instructor-21.01.2014 (d) CRT Monitor
UKSSSC Tech. Electrical Instructor-21.11.2017 WBPSC Instructor-18.09.2021
Ans. (b) : Output device is a component of computer Ans : (b) TFT, LCD and CRT are types of monitor
system which displays data or instructions as result after whereas High Definition Multimedia Interface (HDMI) is
processing. Example - Monitor, Printer, Speaker, Plotter the most frequently used HD signal for transferring both
video card. It converts digital data into a form that is high definition audio and video over signal cable.
human understandable. 189. Which of the following monitors is made of
183. Which of the following is NOT a type of printer? thick glass vacuum tube, a result of which is a
(a) Drum (b) Daisy wheel smoothed screen with a coating of phosphorus
(c) Laser (d) Switch on the inner surface?
UPPCL Technical Grade-II (Shift-I) 19.03.2021 (a) Plasma (b) LED
Ans. (d) : Drum, daisy wheel and laser printers are (c) CRT (d) LCD
types of printers by which the result is obtained from HSSC wireman Instructor -17.12.2019, Shift-I
computer in the form of hardcopy whereas switch is a Ans. (c) : CRT is short form of Cathode Ray Tube. It is
network device that is used to segment the networks in a traditional monitor made of thick glass vacuum tube.
to different subnet works called subnets or LAN There is a coding of phosphorus on the inner surface of
segments. every CRT, which makes the monitor screen smooth.
Computer 21 YCT
ye
p
190. Computer Display is also called 195. The default screen on the monitor when no
(a) Multimedia Monitor Terminals (MMT) other application is running is called
(b) Cathode Ray Tube (CRT) (a) Login Screen (b) Interface
(c) Video Display Terminal (VDT) (c) Desktop (d) Screensaver
(d) Video Distribution Units (VDU) UKSSSC Tech. Electrical Instructor-21.11.2017
UPPCL JE 31-01-2019 (Batch-02) Ans. (c) : When no other application is running on the
monitor, it is called the home screen of the computer i.e.
Ans: (c) A computer display or monitor is an electronic desktop.
output device that is also known as Video Display The login screen is the screen of the web pages accessed
Terminal (VDT) or a Video Display Unit (VDU). It is by the user on which the user is signed in. In
used to display image, text, Video and graphics computing, an interface is the extent to which two parts
information. of a computer system are in contact. User interface
191. Computer monitor is also called VDU. What works between the computers and the human.
does VDU mean? A screen saver is an animated picture that is
(a) Vertical Dialysis Unit automatically activated on a personal computer when no
(b) Video Dialysis Unit user activity is felt for a specific amount of time.
(c) Vertical Display Unit 196. Computer output microfilm technology is used
(d) Video Display Unit to record computer ______ film images.
UPPCL (TG-II) 24-01-2019 (EVENING) (a) Macroscopic (b) Bioscope
Ans : (d) VDU means Video Display Unit, it is a (c) Microscopic (d) Laparoscopic
GSSSB Supervisor Electronic Instructor 18.01.2014
computer display or monitor that is used to display
image, text, video and graphics information. Ans : (c) Computer output microfilm technology is
used to record computer microscopic film images.
192. Computer monitor is also known as-
197. Unit(s) used for measuring speed of printer
(a) Video Display Unit is/are?
(b) Vertical Dialysis Unit A. CPM B. RPM C. PPM
(c) Vertical Display Unit (a) Only A (b) Only B
(d) Video Dialysis Unit (c) Only C (d) Both A & C
KPSC Jr. Instructor 22.11.2018w (UPPCL TG2 11-11-2016)
Ans. (a) : VDU stands for "Visual Display Unit" or Ans : (d) The unit for measuring the speed of a printer
"Video Display Unit", it is also called monitor or is CPM and PPM, whereas RPM is the unit to measure
screen. VDU displays images generated by a computer the speed of a machine.
or other device. 198. Printing speed of laser printers is measured in
193. An image is composed of (a) Lines per page (b) Characters per hour
(a) Pels (b) Pexels (c) Characters per line (d) Pages per minute
(c) Dots (d) All of these UPPCL JE 2019 (Batch-02)
KPSC Instructor Electronic-25.06.2014 Ans: (d) The unit of measurement for the printing
Ans. (d) : An image is composed of pels, pixel and speed of a laser printer is Pages Per Minutes (PPM).
dots. 199. Which of the following options best describes
• Pixel is the smallest element of an image. It is also the truth of the given statements?
known as PELs. (i) Inkjet printers print by spraying droplets
of ink on the paper.
• Dots are light receptor called photodiode. (ii) Laser printer fuses ink onto paper with the
1 Dot = 1 Pixel help of heat.
194. Which of the given options best describes the (a) (i) true (ii) true (b) (i) true (ii) false
truthfulness of the following statements? (c) (i) false (ii) false (d) (i) false (ii) true
(i) In 1-bit images, each pixel is stored as a KPSC Instructor Electronics Mech.20.07.2018
single byte. Ans. (a) : Both of the above options are correct. Ink jet
(ii) A 1-bit image with resolution 640×480 printers spray liquid ink onto paper with small, precise
needs a storage space of 640 + 480 bits. droplets. Ink housed in replaceable or refillable
(a) (i) - False, (ii) - True cartridges most of which include a print head consisting
(b) (i) - True, (ii) - False of thousands of tiny nozzles through which ink is
(c) (i) - True, (ii) - True sprayed and which are arranged together.
Laser printer is an electrostatic digital printing process.
(d) (i) - False, (ii) - False It produces high quality text and graphics by repeatedly
GSSSB Electronic Instructor-21.01.2014 passing a laser beam over a negative charged cylinder
Ans. (d) : In 1-bit images, each pixel is stored as a called a "drum" to define the differently charged image.
single bit i.e 0 or 1. 200. Which of the following devices is capable of
For 1 bit images with 640×480 resolution producing large-format drawings like graphs
640 × 480 and construction drawings?
= 37.5 KB of space will be required. (a) Laser printer (b) Flat-bed printer
8 × 1024 (c) Inkjet printer (d) Dot matrix printer
Hence the above statement is false. GSSSB Electronic Instructor-22.01.2017
Computer 22 YCT
ye
p
Ans : (b) A flat-bed printer is a device capable of 207. Laser printers use ______
producing large-format drawings such as graphs and (a) No toner, as they use heat sensitive paper
construction drawings. It usually prints digital images (b) Powdered toner in a cartridge
on plastic or paperboard. (c) Ribbon toner
201. How does a laser printers print? (d) Liquid toner
(a) Line by Line (b) Pixel by Pixel MP Electrician Instructor 07.11.2016, Morning
(c) Page by Page (d) Character by Character
UPPCL-JE 31-01-2019 (Batch -01) Ans : (b) The laser printer was invented in 1969 by
Gary Starkweather. Laser printers use powdered toner
Ans: (c) Laser printer is a non-impact printer which
in the Cartridge.
prints page by page. It produces images with the help of
a laser beam. 208. Which type of printers uses light to produce
the dots needed to form the characters to be
202. A _____ printer creates an image directly on
printed on a page?
paper by spraying ink through up to 64 small
(a) Line Printers (b) Chain Printers
nozzles.
(a) Daisy Wheels (b) Laser (c) Laser Printers (d) Dot Matrix Printers
(c) Inkjet (d) Dot Matrix UPPCL-JE 31-01-2019 (Batch -01)
KPSC Jr. Instructor- 09.07.2014 Ans: (c) Laser printers uses light to produce the dots
Ans : (c) An inkjet printer creates an image directly on needed to form the characters to be printed on a paper.
paper by spraying ink through up to 64 small nozzles. 209. Which of the following printers is non-impact
Inkjet printer offers a resolution of 300 dots per inch and type?
produces high quality printouts such as graphics and
image. (a) Daisy Wheel Printer (b) Laser Printer
203. Select an incompatible device from the (c) Dot Matrix Printer (d) Line Printer
following options. WBPSC Instructor-18.09.2021
(a) Scanner (b) Keyboard Ans : (b) Laser Printer is an electrostatic digital printing
(c) Webcam (d) Printer process. It prints high quality text and graphics. This
RRB Bengaluru LP-2004 type of printer is non-impact type printer.
Ans : (d) Among the given options scanner, keyboard 210. Which of the following is behind the computer
and webcam are input devices whereas printer is an case?
output device.
(a) DVD Drive (b) Floppy Drive
204. Which one of the given options is different (c) Zip Drive (d) Parallel or printer port
from the rest? HSSC Electrician Instructor -17.12.2019
(a) Laser Printer (b) Dot matrix printer
(c) Thermal printer (d) Inkjet printer Ans : (d) The printer port is also called the parallel port
UPPCL TG-II 25-01-2019 (Evening) which is used by the printer. The printer port is always
Ans : (b) Printer is an output device, which prints the present behind the computer casing.
information received from the computer on paper. 211. Which of the following is output device?
Printers are divided into two parts on the basis of (a) Scanner (b) LCD projector
printing, impact printers and non-impact printers. Here, (c) Mouse (d) Light pen
dot matrix paper is an impact printer while the rest are Punjab Wireman instructor-07.07.2013
non-impact printer.
Ans : (b) LCD projector is an output device whereas
205. Which of the following printers can use scanner, mouse and light pen are input devices.
continuous paper instead of single sheet?
(a) Inkjet printer S.No. Input Device
(b) Dot matrix printer 1 Keyboard
(c) Both Inkjet and Laser printer 2 Mouse
(d) Laser printer 3 Track ball
UPPCL TG-II 25-01-2019 (Evening)
4 Joystick
Ans : (b) The print head of a dot matrix printer consists
of a matrix of many pins and each pin prints a dot by 5 Scanner
touching the ribbon and paper, in this printer a 6 Microphone
continuous roll of paper takes place without applying a 7 Webcam
single sheet and this type of continuous printers are
installed in bank or ticket machine or ATM etc. 8 Barcode Reader
206. _______ printers create text and graphics on 9 OCR (Optical Character Reader)
paper without actually striking the paper. 10 MICR (Magnetic Ink Character Reader)
(a) Dot matrix (b) Daisy wheel 11 OMR (Optical Mark Reader)
(c) Impact (d) Non-impact
UPPCL (TG-II) 24-01-2019 (EVENING) 12 Kimball Tag Reader
Ans : (d) Non-impact printer is a type of printer it 13 Speech Recognition System
create text and graphics on paper without actually 14 Light Pen
striking the paper. 15 Touch Screen
Computer 23 YCT
ye
p
IV. Memory 216. Which of the following memories needs to be
refreshed continuously at certain time
212. Which among the following statements is/are intervals?
correct with respect to types of memory? (a) Cache Memory (b) Secondary
A. Internal processor memories (c) SRAM (d) DRAM
B. Primary memory or main memory UKSSSC Tech. Electrical Instructor-21.11.2017
C. Secondary or auxiliary memory Ans. (d) : The full form of DRAM is Dynamic Random
(a) All of the options (b) Both B and C Access Memory. It needs to be refreshed constantly to
(c) Both A and B (d) Both C and A maintain the data, otherwise it will lose the data.
GSSSB Electronic Instructor-22.01.2017 DRAM is slower than SRAM. SRAM does not need to
be refreshed frequently DRAM is cheaper than SRAM.
KPSC Jr. Instructor- 09.07.2014
217. Semiconductor memory, Dynamic RAM
Ans. (a) : Memory is a device in a computer where
(DRAM) stores each bit of information in a
instruction and other data are stored, their types are as ________.
follows.
(a) diode (b) encoder
• Internal Processor Memory (c) capacitor (d) resistor
• Primary Memory or Main Memory GSSSB Electronic Instructor-21.01.2014
• Secondary or Auxiliary Memory Ans. (c) : Dynamic Random Access Memory (DRAM)
Register is a type of internal processor memory while is a type of semiconductor memory that stores each bit
main memory is RAM, but both of them interact of information in a capacitor. DRAM stores each bit of
directly with the processor. There are two types of data in a separate passive electronic component, which
primary memory RAM and ROM. Secondary memory is inside an integrated circuit board. A bit in every
is also called auxiliary memory. In this data can be electronic component has two states (concepts) of value
stored for a long time. called 0 and 1.
213. The main memory of a computer is made using 218. Which of the following is widely used for
which of the following technique? implementing main memory?
(a) Magnetic (b) Optical (a) Magnetic drum memory
(c) Semi-conductor (d) Vacuum tube (b) Magnetic core memory
KPSC Instructor Electronics Mech.20.07.2018 (c) Static RAM
Ans. (c) : A semiconductor substance lies between the (d) Dynamic RAM
conductor and insulator. It control and manage the flow UKSSSC Tech. Electrical Instructor-21.11.2017
of electric current in electronic equipment and devices. Ans. (d) : RAM is a type of memory that temporarily
As a result, it is a popular component of electronic chips stores data and instructions to perform the task currently
made for computing components and a variety of being run by the CPU. It is of two types -
electronic devices, including solid state storage. (i) DRAM (ii) SRAM.
214. Which of the following is an example of volatile The full form of DRAM is Dynamic Random Access
memory? Memory. This is volatile memory. It is used as main
(a) Hard drive (b) ROM memory in computers because the data of DRAM is
(c) RAM (d) Flash memory always changing so it needs to be refreshed.
(UPPCL TG2 Re-exam 16-10-2016) 219. Which of the following statement is incorrect
Ans. (c) : Random Access Memory (RAM) is an regarding computer memory?
example of volatile memory because all its data is lost (a) Before processing, the program and data are
when the power supply is off. loaded into primary memory
Another example of volatile memory is cache memory. (b) RAM is a non - volatile memory
(c) The CPU of the computer cannot directly
215. Which of the following statements related to access the hard disk
primary memory of a computer is (d) RAM is a primary memory
INCORRECT?
KPSC Instructor Electronic-25.06.2014
(a) RAM is a component of Arithmetic Logic
Unit (ALU) Ans. (b) : Computer memory is a physical device which
is used to temporarily and permanently store
(b) The CPU interacts directly with the primary information, instructions and data in a computer. There
memory. are mainly two type of computer memory.
(c) Random Access Memor (RAM) is a volatile (i) Primary memory
primary memory. (ii) Secondary memory.
(d) ROM is a non-volatile primary memory. Primary memory also two types - RAM and ROM.
GSSSB Supervisor Electronic Instructor 18.01.2014 RAM is a volatile memory, hence option (b) statement
Ans. (a) : RAM is a component of primary memory. is incorrect and all other statement are correct.
Primary memory is a volatile memory and is the main 220. Which of the following application software is
memory of the computer and is also called temporary available for free (you can download and install
memory. The data and instruction processed by the it for free) but no changes are allowed in its
CPU is used to store. source code?
Computer 24 YCT
ye
p
(a) Closed (b) Graphics 225. Which of the following hardware components
(c) Multimedia (d) Freeware is also considered as a storage unit, thought it
Punjab Wireman instructor-07.07.201 has a very small strong capacity?
Ans. (d) : Freeware refers to software that is distributed (a) Register (b) Control Unit
and made available to user for free to download. In this (c) Data Bus (d) ALU
type of software user can't make any change in source HSSC wireman Instructor -17.12.2019, Shift-II
code of it. Ans. (a) : Register memory is fastest and most
221. With respect to the computer system, the term expensive memory of the computer system. Its data
'cache' means : storage capacity is less.
(a) a small but faster memory placed between the 226. Which of the following contains very small size
CPU and the main memory to reduce the storage units called register?
memory access time (a) Hard disk (b) CPU
(b) a way of connecting multiple functional units (c) Input device (d) Output device
to the internal bus UPPCL Technical Grade-II-02.08.2015
(c) a group of physical lines meant to carry Ans. (b) : Central Processing Unit is the main processor
information or it is electronic circuitry that executes instructions
(d) a memory trash can comprising a computer program.
KPSC Jr. Instructor 22.11.2018w 227. Which of the following statement is wrong?
Ans. (a) : Cache memory is a type of high-speed (a) Register may contain instruction or storage
volatile computer memory that provides high-speed data address, but may not contain data.
access to a processor and stores frequently used (b) Cache memory works very fast, but its
computer programs, applications and data. It's a small capacity is less.
but faster memory placed between the CPU and the (c) The basic input/output system (BIOS) is
main memory to reduce the memory access time. stored in the memory chip of Read Only
Memory (ROM)
222. Which among the following describes ROM?
(d) The storage capacity of the internal memory
(a) Read Only Memory (b) Read Once Memory is small and it is variable.
(c) Read On Memory (d) Read Other Memory UPPCL TG-II 27-03-2021 (Shift-I)
HSSC Electrician Instructor -17.12.2019
Ans. (a) : A CPU resister is a small set of data holding
RRB Bengaluru L.P.-2010 process that are part of the computer process. It can
Ans. (a) : ROM is a temporary memory it is short form hold on instruction, a storage address, or any kind of
of Read Only Memory. It is type of non volatile memory data. So statement (a) is wrong.
used in computer and other electronic devices. The 228. The data to be processed remains in the ____.
information is stored permanently is such memories
durries manufacture. (a) secondary memory unit
(b) memory unit
223. Which of the following sets of words best
(c) read protected unit
describes the characteristics of a primary
storage device, like RAM? (d) control unit
(a) Cheap, non-volatile, fast access RRB Bengaluru LP-2004
(b) Volatile, expensive, slow access Ans : (b) Memory unit stores all the data and the
(c) Expensive, Volatile, fast access introductions required for processing.
(d) Fast access, non-volatile, cheap 229. Which of the following is NOT a characteristic of
WBPSC Instructor-18.09.2021 RAM?
(a) Faster (b) Expensive
Ans. (c) : Random Access Memory (RAM) is a high (c) High power consumption (d) Smaller
speed component in device that temporary store all
DSSSB Craft Instructor (ESM) 06.10.2019
information.
RAM has following characteristics: Ans. (d) : Characteristic of RAM–
• RAM is expensive memory. • RAM is the fastest memory.
• RAM store temporally data so its called volatile memory. • RAM is expensive memory and it can be accessed by
directly.
• RAM can placed very close to the CPU that why it • RAM is volatile in nature, which means the data is
has fast access time. lost when the device is switched off.
224. Which of the following is not a type of ROM • RAM consum high power.
(Read Only Memory)? Smaller is not a characteristic of RAM.
(a) EEPROM (b) DROM 230. What is the full form of letter 'S' in SDRAM?
(c) EPROM (d) PROM (a) Synchronous (b) Simple
UPPCL TG-II 28-3-2021 (Shift-I) (c) Static (d) Service
Ans. (b) : ROM, is short form of Read Only Memory. It UPPCL Technical Grade-II (Shift-II) 20.03.2021
stores information permanently so its called non-volatile Ans. (a) : Synchronous Dynamic Random Access
memory. Type of ROM– Memory (SDRAM). Synchronous relates to the
PROM – Programmable Read Only Memory behavior of the Dynamic Random access memory type
EPROM – Erasable Programmable ROM that synchronizes with the clock system of the
EEPROM – Electrically Erasable Programmable ROM computer, thus making it easier to manage it quicker.
Computer 25 YCT
ye
p
231. The_____unit is capable of mimicking the (ii) The recording surfaces of a hard disk are
processor and, indeed, of taking over control of divided into concentric circles called sectors.
the system from the processor. (a) (i) False (ii) False (b) (i) True (ii) True
(a) Random Memory Access (c) (i) False (ii) True (d) (i) True (ii) False
(b) Indexed sequential Memory Access UKSSSC Tech. Electrical Instructor-21.11.2017
(c) Sequential Memory Access Ans. (c) : Statement (i) false because static memory
(d) Direct Memory Access does not need to be refreshed.
KPSC Jr. Instructor 22.11.2018w The recording surfaces of a hard disk are divided into
Punjab Wireman instructor-07.07.2013 concentric circles called sectors, this is true statement.
Ans : (d) Direct Memory Access (DMA) is the process of 238. Based on their data persistence property,
transferring data without the involvement of the processor identify the odd one out from the following
itself. The DMA unit is capable of mimicking the options.
processor and indeed, of taking over the control of system (a) SRAM (b) EEPROM
from the processor. (c) EPROM (d) PROM
232. In a Computer RAM is GSSSB Supervisor Electronic Instructor 18.01.2014
(a) Non-volatile Ans. (a) : SRAM is type of RAM but EPROM,
(b) Both volatile and non-volatile EEPROM and PROM are types of ROM. RAM is
(c) None of these volatile memory but ROM is non-volatile memory.
(d) Volatile 239. Which of the following statement is false?
KPSC Instructor Electronic-25.06.2014 (a) SRAM is faster than DRAM
RRB Ranchi LP-2008 (b) SRAM uses transistors and latches.
Ans : (d) RAM (Random Access Memory) is an (c) SRAM does not require refresh electrical
Electronic temporary memory (Volatile Memory) circuitry.
therefore the data stored in it remains only as long as (d) SRAM is also called synchronous Random
the computer remains on. Excel memory.
233. A CPU interacts with ___ for data access during UPPCL TG-II 19-03-2021 (Shift-II)
program execution. Ans. (d) : SRAM is short form of Static Random
(a) RAM (b) ROM Access Memory.
(c) hard disk (d) magnetic tape 240. In which of the following transistors and
UPPCL TG-II 19-03-2021 (Shift-I) latches are used?
Ans. (a) : The CPU directly interacts with the RAM for (a) ROM (b) Hard Disk
data access during program execution. (c) DRAM (d) SRAM
234. What is the letter 'S' in SRAM? UPPCL TG-II 20-03-2021 (Shift-I)
(a) Secure (b) Symmetric Ans. (d) : SRAM (Static Random Access Memory) is
(c) Static (d) Synchronous types of memory that uses latching circuitry (flip-flop)
UPPCL TG-II 19-03-2021 (Shift-I) to store each bit.
Ans. (c) : SRAM is short form of Static Random 241. Which of the following statement(s) is/are
Access Memory. It is a form of semiconductor memory incorrect?
widely used in microprocessor. (i) Compared to main memory, secondary
memory has limited storage capacity.
235. Which of the following types of memory must
be continually refreshed in order to maintain (ii) DRAM is slower than SRAM.
the data? (a) Both (i) and (ii) (b) Only (ii)
(a) PROM (b) SRAM (c) Only (i) (d) Neither (i) nor (ii)
UPPCL TG-II 25-01-2019 (Morning)
(c) DRAM (d) ROM
UPPCL TG-II 19-03-2021 (Shift-I) Ans : (c) Statement (i) is wrong because primary
memory has limited storage.
Ans. (c) : The full form of DRAM is Dynamic Random
Statement (ii) is correct because DRAM is slower than
Access Memory. Which is used to store data, it must be SRAM.
refreshed several times per second.
236. Which of the following is a primary storage 242. Which of the following statement (s) is/are
device? correct?
(a) DRAM (b) Compact disk (i) The access time of primary memory is
(c) Flash drive (d) Pen drive more than the time of secondary memory.
GSSSB Electronic Instructor-21.01.2014 (ii) For the same storage capacity, DRAM is
Ans. (a) : Dynamic Random Access Memory (DRAM) cheaper than SRAM.
is a type of random access memory that stores each bit (a) Neither (i) Nor (ii) (b) Only (i)
of data in a memory cell. Usually consisting of a small (c) Both (i) and (ii) (d) Only (ii)
capacitor and a transistor, both typically based on UPPCL TG-II 25-01-2019 (Evening)
metal-oxide-semi conductor technology. Ans : (d) The access time of primary memory is less
237. Which of the following options best describes than the access time of secondary memory. So
the truth of the given statements? statement (i) is incorrect. For the same storage capacity,
(i) SRAM needs to be refreshed periodically to DRAM is cheaper than SRAM. So statement (ii) is
preserve the data stored in it. correct.
Computer 26 YCT
ye
p
243. Extend ASCII used the ____ bit and provides Ans : (a) ROM is short form of Read Only Memory. It
the code for the ____ character. is non-volatile memory that store information
(a) 8,256 (b) 7,128 permanently. In such memory the information stores
(c) 8,257 (d) 7,256 during manufacture. It is also called permanent memory.
KPSC Instructor Electronics Mech.20.07.2018 250. On which type of ROM, data can be written
Ans. (a) : ASCII is the acronym for American Standard only once?
code for Information Interchange. Extended ASCII uses (a) PROM (b) EPROM
8 bits and provides codes for 256 characters. (c) EEPROM (d) FROM
MP Electrician Instructor 07.11.2016, Morning
244. What is the difference between the ASCII
codes of 4 and 9? Ans : (a) PROM is short form of Programmable Read
(a) 7 (b) 5 Only Memory. It is a computer memory chip that can
(c) 4 (d) 6 be programmed once after it is created the information
written in form is permanent and cannot be erased or
UPPCL TG-II 19-03-2021 (Shift-II)
deleted.
Ans. (b) : The ASCII value of 4 is 52 and the ASCII
value of 9 is 57. Therefore! 57 – 52 = 5 251. Flash memory is a special type of
(a) EROM (b) EEPROM
245. In the word "EDO RAM" what is the full form (c) ERAM (d) EPROM
of EDO? WBPSC Instructor-18.09.2021
(a) Expanded Data Origin
Ans : (b) Flash memory is a permanent memory that
(b) Extended Dynamic Output
means it can store data permanently. Flash memory is a
(c) Expanded Dynamic special type of EEPROM and it was invented by
(d) Extended Data Output Japanese Engineer Masuoka Fujio.
(UPPCL TG2 11-11-2016)
252. Which of the following is/are the major type(s)
Ans : (d) In 'EDO RAM' word full form the EDO is of computer chips?
'Extended Data Output.' (a) Primary memory chip
246. On the basis of access time which type of (b) Microprocessor chip
memory is fastest? (c) a and b both
(a) RAM (b) Cache (d) None of these
(c) CPU Register (d) ROM (UPPCL TG2 Re-exam 16-10-2016)
GSSSB Electronic Instructor-22.01.2017 Ans : (c) The two major types of computer chips are the
Ans : (c) On basis of access time CPU registers are primary memory chip and the microprocessor chip.
fastest memory. These are temporary memory units that 253. Which of the following statements is/are false?
store data and those are located in processor. (i) BIOS is a firmware.
247. The purpose of the instruction register is to (ii) Cache memory is an example of utility
____. software.
(a) keep a count of the number of executing (a) (i) and (ii) both (b) Neither (i) nor (ii)
programs (c) Only (i) (d) Only (ii)
(b) keep a count of control registers HSSC wireman Instructor -17.12.2019, Shift-II
(c) hold the machine instruction that is currently Ans. (d) : The full form of BIOS is Basic Input Output
being executed System. With its help all the components of the
(d) hold the address of the next instruction computer works. BIOS is a firmware. Cache memory
KPSC Jr. Instructor- 09.07.2014 stores temporary data that may exist in both hardware
Ans. (c) : In computer science, instruction register (IR) and software but is not an example of utility software.
is part of CPU's Control Unit. This register can hold the 254. Which type of memory is mainly used to
current instruction specifically the instruction register synchronise with a high-speed CPU and to
holds the OP code which define the type of instruction. improve its performance?
248. Which of the following system software is an (a) Tertiary memory (b) Cache memory
operational software stored on a flash drive, (c) Secondary memory (d) Primary memory
ROM or EPROM and can be recognized by the RRB Ahmadabad LP-2005
OS? Ans. (b) : Cache memory is expansive and fastest memory
(a) Operating System (b) Device Driver among the option. It is mainly used to synchronize with a
(c) Language Translator (d) Firmware high-speed CPU and to improve its performance.
UPPCL Technical Grade-II Shift-II, 28.03.2021 255. Which of the following represent the correct
Ans. (d) : Firmware is a type of system software which order of storage devices in increasing order of
is inbuilt in flash drive, ROM or EPROM. It is their storage sizes?
recognized by the operating system. (a) Hard Disk Drive, RAM, Cache, Register
249. Which of the following memory is permanent (b) Cache, Register, Hard Disk Drive, RAM
memory? (c) Register, Cache, RAM, Hard Disk Drive
(a) ROM (b) RDRAM (d) Register, Cache, Hard Disk Drive, RAM
(c) SDRAM (d) RAM Punjab Wireman instructor-07.07.2013
RRB Gorakhpur L.P.-2008 KPSC Instructor Electronic-25.06.2014
Computer 27 YCT
ye
p
Ans : (c) 259. Direct Memory Access (DMA) is a technique
where in the CPU:
(a) transfers data to I/O
(b) transfers data to the disk drive
(c) is idle and transfer takes place through a
network
(d) is idle and does not play any role in data
transfers
DSSSB Craft Instructor (ESM) 06.10.2019
256. Which of the following stores the programs and Ans : (d) The full from of DMA is Direct Memory
data currently being executed by the CPU? Access. It is the process of transferring data without the
(a) Tertiary memory (b) Auxiliary memory involvement of the processor or CPU itself.
(c) Primary memory (d) Secondary memory 260. Which among the following is the fastest?
UKSSSC Tech. Electrical Instructor-21.11.2017 (a) ROM (b) Flash drive
Ans. (c) : Primary memory (Cache) stores the programs (c) Cache memory (d) RAM
and data which are currently being executed by the MP Electrician Instructor 07.11.2016, Morning
CPU. Primary memory has a faster access time than Ans. (c) : Cache memory is expansive and fastest memory
secondary memory. among the option. It is mainly used to synchronise with a
257. Which one of the following options is correct high-speed CPU and to improve its performance.
with respect to the increasing order of access 261. Which of the following is the fastest type of
speed? memory?
(a) Magnetic tape → Optical disk → Cache (a) Primary memory (b) Secondary memory
memory → Registers (c) Cache memory (d) External memory
(b) Magnetic tape → Optical disk → Cache RRB Chandigarh L.P.-2014
memory → Main memory Ans : (c) Cache memory is a special type of memory,
(c) Optical disk → Magnetic tape → Cache which is highly uses faster Static RAM Chips. It is a
memory → Registers very fast memory between primary memory and CPU
(d) Optical disk → Magnetic tape → Main when frequently used data and instructions are stored.
memory → Cache memory Cache memory speed being fast means increasing the
UPPCL Technical Grade-II (Shift-II) 19.03.2021 speed of the processor.
Ans. (a) : 262. Which of the following is mainly used for cache
memory?
(a) DVD (b) DRAM
(c) SRAM (d) Blu-ray disk
UPPCL (TG-II) 24-01-2019 (EVENING)
Ans : (c) High speed Static RAM (SRAM) are used for
cache memory.
263. Select the memory unit that has the shortest
access time.
(a) ROM (b) Flash (c) RAM (d) Cache
As we move from top to bottom in the hierarchy the KPSC Jr. Instructor 22.11.2018w
access time increases or the access speed decreases. Punjab Wireman instructor-07.07.2013
The correct order of access speed is increasings- Ans : (d) Cache memory is very fast memory is retrives
Magnetic Tape→Optical Disk→Cache Memory→ Resistors. data at very high speed.
258. Which of the following memories has the
shortest access time?
(a) Cache Memory
(b) Magnetic Bubble Memory
(c) Magnetic Core Memory
(d) Random Access Memory
RRB Bengaluru LP-2004
Ans : (a) 264. Flash Drive is a type of:
(a) EPROM (b) ROM
(c) PROM (d) EEPROM
KPSC Instructor Electronic-25.06.2014
Ans. (d) : A USB flash drive is a data storage device
that includes flash memory with an integrated Universal
Serial Bus (USB) interface. USB flash drive are
typically removable and rentable and physical much
smaller than an optical disc. Flash drive is a type of
EEPROM.
Computer 28 YCT
ye
p
265. Which among them is the slowest form of memory 271. Which of the following statement is/are true?
in terms of data transfer and storage rate? (i) Full form of VDU is Visual Display Unit
(a) Registers (b) Cache memory and it is an example of both software and
(c) Main Memory (d) Flash memory hardware.
(UPPCL TG2 11-11-2016) (ii) Interpreter is used for assembly language
Ans : (d) Flash memory is the slowest form of memory programs, while compiler is used for high
in terms of data transfer and storage rate. Flash memory level language programs.
are used in cellular phone, digital camera, setup box etc. (a) Only (i) (b) Both (i) and (ii)
266. Which memory cannot be accessed directly by (c) Only (ii) (d) Neither (i) nor (ii)
the computer? UPPCL Technical Grade-II Shift-II, 28.03.2021
(a) RAM (b) Cache memory Ans. (d) : The full form of VDU is Visual Display Unit
(c) ROM (d) Memory card and it is also called monitor. It is an output device and
HSSC wireman Instructor -17.12.2019, Shift-II an example of hardware. Both compiler and Interpreter
Ans. (d) : RAM, cache memory, ROM are directly are used for language translator. Compiler translates the
accessed by processor (C.P.U.) because these are all entire source code of the program at once whereas
examples of primary memory. Hence, memory card is interpreter to translates line at a time.
an example of secondary memory. These are not 272. Which of the following is an example of a
accessed directly by the CPU. virtual display unit (VDU)?
267. Which of the following is not a secondary storage (a) CRT Monitor (b) Plotter
device? (c) Printer (d) Scanner
(a) Flash Drive (b) Pen Drive UPPCL TG-II 27-03-2021 (Shift-II)
(c) Compact Disc (d) DRAM Ans. (a) : CRT Monitor is example of VDU (Visual
MP Electrician Instructor 07.11.2016, Morning Display Unit). It may be peripheral device or may
WBPSC Instructor-18.09.2021 integrated with other components. At present, LED
Ans. (d) : DRAM (Dynamic Random Access Memory) LCD and plasma technology are used as monitors.
is a primary memory or primary storage device while 273. Which of the following usually possess
other option (Flash drive, Pen drive, CDs) are example maximum storage?
of secondary storage device. (a) DVD (b) Hard drive
268. Hard disc, CD and Pen drive are examples of (c) Flash drive (d) Flopy disk
which of the following storage? RRB Kolkata LP-2009
(a) Secondary WBPSC Instructor-18.09.2021
(b) Sequential access
Ans. (b) : DVD, Flash Drive, Floppy disk all storage
(c) Data on convertible Plastics
device store less data compare to hard disk drive.
(d) Primary
UPPCL TG-II 27-03-2021 (Shift-II) 274. Which memory uses the concept of tracks and
Ans. (a) : Hard disc, CD and Pen drive are example of sector?
secondary storage device. (a) SRAM (b) Hard disk
(c) DRAM (d) Magnetic tape
269. Which among the following is a Sequential
KPSC Jr. Instructor 22.11.2018w
Access Memory?
(a) Optic Disk (b) Magnetic Disk Ans. (b) : A hard disk drive is a non - volatile
(c) Magnetic Drum (d) Magnetic Tape secondary storage device the recording surface of a hard
RRB Gorakhpur L.P.-2008 disk is divided into tracks and sectors.
DSSSB Craft Instructor (ESM) 06.10.2019 275. Consider a hard disk with 8 recording surfaces
Ans. (d) : In magnetic tape only one side of the ribbon is and 4 sectors per track. If the total number of
used for storing data. It is sequential memory which parts is 320, how many tracks will be there
contains thin plastic ribbon to store data and coated by recording surface.
magnetic oxide. So the data read write speed is slower. (a) 8 (b) 4 (c) 32 (d) 10
DRAM works on sequential order like A, B, C, D is data, UPPCL TG-II 19-03-2021 (Shift-II)
we have to go through BC to go from A randomly in Ans. (d) : Recording surface = 8
optical disk. per track (sector) = 4
270. A CD-RW disk Total number of part = 320
(a) Has a faster access than an internal disk 320
(b) Is a form of optical disk, so it can only be Tracks per recording surface = = 10
32
written once.
276. File and folders are organized as a structure on
(c) Holds less data than a floppy disk computer hard disk
(d) Can be erased and rewritten (a) Linear list (b) Tree
(UPPCL TG-2 26.06.2016) (c) Table (d) Graph
Ans : (d) CD-R or CD-RW drives are also called CD UPPCL TG-II 25-01-2019 (Evening)
writers, CD burners, or CD recorders can read the same Ans : (b) Files and folders are arranged in form of a
formats as CD-ROM drives CD-DA, CD-ROM, and free structure in the computer hard disk, in which the
CD-R/RW discs but can also write data to inexpensive root directory and sub directories are followed by
CD-R (write - once) and CD-RW (Re-Writable) discs.
folders, files etc.
Computer 29 YCT
ye
p
277. If the hard disk has 4 recording surfaces and 282. Which of the following optical storage format has
each surface has 16 track divided into 8 sectors, been developed to enable recording, rewriting
then the number of cylinders in the hard disk and playback of High Definition (HD) video?
will be? (a) Compact disc (b) Blue-ray disc
(a) 16 (b) 8 (c) 32 (d) 4 (c) Hard disc (d) Floppy disc
UPPCL TG-II 20-03-2021 (Shift-I) UPPCL TG-II 25-01-2019 (Evening)
Ans. (a) : A hard disk is made up of several platters, Ans : (b) Blue-Ray disc is an optical disc that most after
and each platter has 2 recording surfaces. Each surface used for playback of High Definition (HD) video. It is also
consists of a number of tracks divided in to a number of use for enable rewrite video and other data.
equal sectors.
Each platter has equally spaced tracks stored in a 283. What is the full form of CAD?
cylinder. Thus if there are 16 tracks in each sector then (a) Computer Aided Design
they require 16 cylinders. (b) Computer Acadmy Design
278. Which of the following are wrong– (c) Computer Developer Academy
(i) A CD-R is a re-write disc that allows you to (d) Computer Aided Developer
erase previously recorded data and write UPPCL TG-II 19-03-2021 (Shift-I)
new data onto it. Ans. (a) : CAD stands for computer Aided Design. It is
(ii) The letters RW in CD-RW mean "read an advance software for creativity design and generate
and write." technical 2D and 3D diagram. It provides the facility to
(a) Only (ii) (b) (i) and (ii) both view a design from any angle and to zoom in or out for
(c) Neither (i) nor (ii) (d) Only (i) a closure or a distant look respectively.
UPPCL TG-II 25-01-2019 (Morning)
284. An example is an optical disc.
Ans : (b) CD-R is a digital optical disc and it is a data
storage format and It can be written once and read many (a) ROM (b) Hard disc
times. Data can't be deleted from a CD-R disc and it (c) Floppy disc (d) Compact disc
can't formatted so statement (i) wrong. RRB Gorakhpur L.P.-2008
CD-RW stands for "Compact Disc Re-Writable so Ans : (d) A compact disc is a portable storage medium
statement (ii) wrong. that can record, store and play back audio, video and other
279. What is disk access time? data in digital form.
(a) Seek time 285. Which of the following is not a part of Floppy
(b) Seek time + latency time Disks?
(c) Rotation time (a) Actuator (b) Paper Ring
(d) Latency time (c) Magnetic Disk (d) Shutter
Punjab Wireman instructor-07.07.2013 DSSSB Craft Instructor (ESM) 06.10.2019
Ans : (b) Disk access time is Seek time + latency time. Ans. (a) : An actuator is a device that makes something
In the context of computes, time taken to receive data move or operate. It is not part of Floppy Disc but Paper
from a storage device or to obtain data from a Ring, Magnetic disc and shutter are part of Floppy Disc.
peripheral unit is known as access time.
280. The circular disks that make up a hard drive 286. Which among the following is an example of
are called Zip drives?
(a) Plates (b) Platters (a) Pen drives (b) CD/DVD
(c) Rings (d) Saucers (c) Hard disk (d) Memory Card
KPSC Instructor Electronic-25.06.2014 (UPPCL TG2 11-11-2016)
GSSSB Electronic Instructor-21.01.2014 Ans : (b) The zip drive is a removable floppy disk
Ans. (b) : Platters is a round circle made of metal in the storage. It is advance version of floppy disc, CD and
Hard Disc, which has a magnetic coating, it is used to DVD both are example of zip drive.
keep the data safe for the future. A Hard Disc consists 287. Which of the following is not a type of
of several platters (cycles) counted in a single spindle magnetic storage system?
hard disk is formed by the compilation of those which (a) Floppy disk (b) Compact disk
are in the form of tracks and sectors. (c) Hard disk (d) Magnetic tape
281. Which among the following is the full form of HSSC wireman Instructor -17.12.2019, Shift-I
DVD?
(a) Digital Value Disk Ans : (b) Floppy disk, Hard disk and Magnetic tape are
(b) Digital Versatile Disk example of magnetic storage system but compact disk
(c) Dual Versatile Disk is example of optical storage device.
(d) Direct Versatile Disk 288. An ___ has magnetic disc called platters, which
GSSSB Supervisor Electronic Instructor 18.01.2014 record and store data.
Ans. (b) : DVD is short form of digital versatile or (a) CD (b) Blu-ray disk
Digital Video Disc. It is an optical disc storage media (c) Hard disc drive (d) DVD
format. It was introduced in 1995 by Sony, Panasonic UPPCL (TG-II) 24-01-2019 (EVENING)
and Samsung. It's main function storage of video and Ans : (c) In a hard disk, a platters is a circular magnetic
data. plate that is used for storing data in a hard disk.
Computer 30 YCT
ye
p
289. Strength of Magnetic disk depends on 295. Which of the following statements are correct
A. Number of sides regarding the unit of computer memory?
B. Recording density (a) Basic unit of computer memory is ASCII
C. Number of tracks (b) 1 KB (kilo byte) = 1000 bytes
(a) only A (b) A & C (c) 1 bytes = 8 bits
(c) only C (d) A, B & C (d) 1 nibble=6 bits
(UPPCL TG2 11-11-2016) UPPCL Technical Grade-II (Shift- II) 27.03.2021
Ans : (d) Magnetic disk is a memory device, which is flat Ans. (c) : Regarding the unit of computer memory
in snape and covered with magnetic coating. The power of 1 bit = 0 or 1
a magnetic disk depends on the number of arms, the 1 nibble = 4 bits
recording density and the number of paths. 1 byte = 8 bits
290. Which of the following is a portable USB flash 1 kilobyte = 1024 bytes.
memory device that can be used to transfer 296. Arrange the following units of measurement of
data from one computer to another? computer memory, starting from lowest to
(a) DVD (b) Pen drive highest.
(c) CD (d) Floppy disc A) Yottabyte
UPPCL TG-II 25-01-2019 (Morning) B) Zettabyte
Ans : (b) Pen drive is a removable secondary storage C) Exabyte
unit. It is also called portable data storage device or flash D) Petabyte
drive. Which is connected via USB (Universal Serial Bus) E) Terabyte
connecter and plug-in play. With the help of pen drive we F) Megabyte
can carry data any ware. (a) F, E, D, C, B, A (b) F, E, D, B, C, A
291. Which of the following I/O devices is a block (c) F, E, A, B, C, D (d) F, E, D, C, A, B
device? KPSC Jr. Instructor 22.11.2018w
(a) Keyboard (b) Tape drive Punjab Wireman instructor-07.07.2013
(c) Mouse (d) USB port RRB Kolkata LP-2009
UPPCL JE 31-01-2019 (Batch-02) Ans.(a): Tabular representation of various memory sizes :
Ans: (b) Tape drive, Hard disk, Floppy disk and CD- Name Equal to Size (in Byte)
ROMs are example of block devices. Bit 1 Bit 1/8
Block devices are non-volatile devices which can store huge
data and whose information can be accessed in any order. Nibble 4 Bits 1/2 (rare)
292. With reference to SSHD memory, the full form Byte 8 Bits 1
of SSHD is Kilobyte 1024 Bytes 1024=210
(a) Silicon State Hybrid Drive Megabyte 1024 Kb 10,48,576 = 220
(b) Solid silicon Hybrid Drive Gigabyte 1024 Mb 10,73,741,824 = 230
(c) Solid State Hybrid Drive Terabyte 1024 Gb 10,99,511,627,7,76 = 240
(d) Solid State Hybrid Dish Petabyte 1024 Tb 11,25,899,906, 842, 624 = 250
KPSC Instructor Electronic-25.06.2014 Exabyte 1024 Pb 1,152,921,504,606,846,976= 260
Ans : (c) SSHD stands for Solid-State Hybrid Drive. It Zettabyte 1024 Eb 1,180,591,620,717,411,303,42
is a physical storage device that combines a faster 4 = 270
storage medium such as Solid State Drive SSD. 1024 Zb 1,208,925,819,614,629,174,70
Yottabyte
293. How many nibbles are there in 2 megabytes? 6,176=280
(a) 220 (b) 210 (c) 222 (d) 221 Hence we can say that the measurement of computer
GSSSB Electronic Instructor-21.01.2014 memory starting from lowest to highest is option (a).
Ans. (c) : 1 byte = 2 Nibble
297. In computing, 1 nibble is equal to ...............?
1 kilobyte = 1024 byte
1024 byte = 2 × 210 = 211 Nibble (a) 4 bit (b) 4 bytes
So, 2 Megabyte = 2 × 210 = 211×2 ⇒ 222 Nibble (c) 8 bytes (d) 4 kilo bytes
KPSC Instructor Electronics Mech.20.07.2018
294. Which of the following statements is GSSSB Electronic Instructor-22.01.2017
INCORRECT about unit of computer memory?
(a) Basic unit of computer memory is bits Ans. (a) : In computing 1 Nibble equal to 4 bit
(b) 1 bytes = 8 bits 1 bit = 0 or 1
(c) 1 KB (kilobyte) = 1024 bytes 4 bits = 1 Nibble
(d) 1 nibble = 6 bits 8 bits = 1 Byte
UKSSSC Tech. Electrical Instructor-21.11.2017 1024 Bytes = 1 KB
Ans. (d) : The Basic unit of a computer is the binary 1024 KB = 1 MB
digit, often referred to as a 'bit'. A bit can represent two 1024 MB = 1 GB
state, typically denoted as 0 and 1, and it forms the basis 1024 GB = 1 TB
of all digital data and computations in a computer. 1024 TB = 1 PB
1 Bytes = 8 bits 1024 PB = 1 EB
1 Nibble = 4 bits 1024 EB = 1 ZB
1 KB = 1024 bytes. 1024 ZB = 1 YB
Computer 31 YCT
ye
p
298. Arrange the following terms from lower to c) 1 Byte iii) 8 bits
higher units of memory measurement. d) 1 Gigabyte iv) 1,048,576 Bytes
a) Gigabyte b) Petabyte e) 1 Megabyte v) 1,073,741, 824 Bytes
c) Terabyte d) Zettabyte (a) a-ii, b-i, c-iii, d-iv, e-v
e) Exabyte (b) a-ii, b-iii, c-i, d-v, e-iv
(a) a, c, b, e, d (b) a, c, b, d, e (c) a-ii, b-i, c-iii, d-v, e-iv
(c) b, a, c, e, d (d) a, b, c, d, e (d) a-ii, b-iii, c-ii, d-v, e-iv
DSSSB Craft Instructor (ESM) 06.10.2019 HSSC wireman Instructor -17.12.2019, Shift-II
MP Electrician Instructor 07.11.2016, Morning Ans : (c) The matched options
Ans : (a) Arrange of term from lower to Gigabyte, (a) Bit - 0 or 1 (smallest unit of data)
Terabyte, Petabyte, Exabyte, Zettabyte. (b) Nibble = 4 bit
1024 MB = 1 GB (c) 1 Byte = 8 bits
1024 GB = 1 TB (d) 1 Gigabyte = 1,073,741,824 Byte
1024 TB = 1 PB (e) 1 Megabyte = 1,048,576 Byte
1024 PB = 1 Exabyte 304. How many bytes are in 4 kilobytes of memory?
1024 EB = 1 Zettabyte (a) 512 (b) 2048
299. How many bytes are there in 2 kilobytes (in (c) 4096 (d) 1024
binary)? UPPCL TG-II 28-3-2021 (Shift-I)
(a) 1024 (b) 2048
Ans. (c) : 1 KB = 1024 Byte
(c) 4096 (d) 512
UPPCL TG-II 19-03-2021 (Shift-II) 4 KB = 1024×4 = 4096 Byte
Ans. (b) : 1 KB = 1024 Bytes 305. Which of the following options is equal to 256
then 2 KB = 1024×2 bytes nibble?
= 2048 bytes (a) 128 bytes (b) 4 kilobytes
(c) 512 bits (d) 1 Kilobytes
300. What are the lowest and largest "whole"
UPPCL TG-II 19-03-2021 (Shift-I)
numbers that can be stored in 1-byte memory
space? Ans. (a) : 4 bits = 1 nibble
Note: Whole numbers, the basic numbers of 1×256 nibble = 4×256 bits
counting are 0, 1, 2, 3, 4, 5, 6, ......, etc. 256 nibble = 1024 bits
(a) 1,255 (b) 0,256 1 byte = 8 bits
(c) 0,255 (d) 1,256 256 nibble = 1024/8 bytes
UPPCL TG-II 27-03-2021 (Shift-II) = 128 bytes
Ans. (c) : There are 8 bits in byte. 306. How many bytes are there in 32 KB?
Each bit represents two states. (a) 32768 (b) 8192
28 = 256 or (0 to 255) (c) 16384 (d) 4096
The value of first byte will be 0, UPPCL TG-II 25-01-2019 (Evening)
the value of second byte is 1. Ans : (a) 1024 Bytes = 1 kilobyte
Similarly the value of 256th byte will be 255. 1024 × 32 = 32768 Byte
So the lowest number 0 and the maximum number 255
307. 1024 Terabyte is equal to which of the
will be stored.
following?
301. Which of the given options is the minimum (a) 10 Petabytes (b) 1 Gigabyte
amount of memory? (c) 1 Petabyte (d) 1 Exabyte
(a) Gigabyte (b) Terabyte
KPSC Jr. Instructor 22.11.2018w
(c) Megabyte (d) Petabyte
WBPSC Instructor-18.09.2021 Ans. (c) : In computing 1 Nibble equal to 4 bit
HSSC wireman Instructor -17.12.2019, Shift-I 1 bit = 0 or 1
4 bits = 1 Nibble
Ans. (c) : The minimum amount of memory is
megabyte among the given option. 8 bits = 1 Byte
1024 Bytes = 1 KB
302. Which of the following units of measurement is 1024 KB = 1 MB
the largest size? 1024 MB = 1 GB
(a) Petabyte (PB) (b) Megabyte (MB) 1024 GB = 1 TB
(c) Terabyte (TB) (d) Kilobyte (KB) 1024 TB = 1 PB
UPPCL Technical Grade-II-26.06.2016 1024 PB = 1 EB
Ans : (a) The increasing order of memory is as follows. 1024 EB = 1 ZB
kilobyte (KB) → Megabyte (MB) → Terabyte (TB) → 1024 ZB = 1 YB
Petabyte (PB) 308. What is a set of 8 bits?
The Petabyte is the largest unit of measurement in size. (a) petabyte (b) kilobyte
303. Match the following correctly. (c) megabyte (d) byte
a) 1 Bit i) 4 bits Punjab Wireman instructor-07.07.2013
b) 1 Nibble ii) 0 or 1 KPSC Instructor Electronic-25.06.2014
Computer 32 YCT
ye
p
Ans : (d) (c) 1024 KB
1024 KB = 1 MB (d) 1 thousand bytes
1024 MB = 1 GB (UPPCL TG2 Re-exam 16-10-2016)
1024 GB = 1 TB Ans : (c) 1 byte · 8 bit
1024 TB = 1 PB 1 kilobyte · 1024 byte
309. The largest unit of data measurement among 1 megabyte · 1024 kilobtye
following is
(a) Gigabyte (b) Terabyte 315. "In the Memory storage unit, one Zettabyte is
(c) Exabyte (d) Petabyte equal to.............
GSSSB Electronic Instructor-21.01.2014 A. 270 byte
B. 1024 Exabyte
Ans. (c) : 1024 MB = 1 GB (Gigabyte) C. 1024 Petabyte
1024 GB = 1 TB (Terabyte) (a) Only A (b) Only B
(c) Both A & B (d) Only C
1024 TB = 1 PB (Petabyte) (UPPCL TG2 11-11-2016)
1024 PB = 1 EB (Exabyte) Ans : (c)
1 Petabyte = 1024 Terabyte
1024 EB = 1 ZB (Zettabyte) = 250 byte
1024 ZB = 1 YB (Yottabyte) 1 Exabyte = 1024 Petabyte
= 260 byte
310. 1 Gigabyte is equal to ––––––. 1 Zetabyte = 1024 Exabyte
(a) 216 bytes (b) 1030 bytes = 270 byte
30 30
(c) 8 bytes (d) 2 bytes
316. How many nibbles are 1 kilobyte to memory?
UPPCL Technical Grade-II (Shift- II) 27.03.2021
(a) 2048 (b) 512
Ans. (d) : 1 GB = 1024 MB (c) 128 (d) 256
= 1024×1024 KB
UPPCL TG-II 27-03-2021 (Shift-II)
= 1024×1024×1024 bytes
= 210 × 210 × 210 bytes Ans. (a) : 1 byte · 8 bit
∴ 30
1 GB = 2 bytes 1 nibble · 4 byte
311. What is the full form of BIT _____? 1 KB = 1024 bit
1 byte = 2 nibble
(a) Bitcoin (b) Binary digit
1 KB = 1024×2 nibble = 2048 nibble
(c) Binary terminal (d) Big digit
UPPCL Technical Grade-II (Shift-I) 19.03.2021 317. One gigabyte is approximately
Ans : (b) A bit is smallest unit of data that an process (a) 1 ×103 bytes (b) 1 ×106 bytes
9
and store by computer. Binary digit is full form of BIT. (c) 1 ×10 bytes (d) 1 ×105 bytes
A bit can hold only one of two values: 0 or 1, (UPPCL TG-2 26.06.2016)
corresponding to the electrical values of on or off, Ans : (c) 1 Byte = 8 bit
respectively. 1 Megabyte = 1024 byte ≈ 103 byte
312. _____ nibble is equal to 4 bits.
1 Megabyte = 1024×1024 ≈ 106 byte
(a) 3 (b) 2
(c) 1 (d) 4 1 Gigabyte = 1024×1024×1024≈109 byte
RRB Bengaluru LP-2004 318. CD-ROM can store at least _____.
Ans : (c) (a) 800 MB (b) 1024 MB
Bit - 0 or 1 (smallest unit of data) (c) 700 MB (d) 2048 MB
Nibble = 4 bit WBPSC Instructor-18.09.2021
1 Byte = 8 bits Ans : (c) CD-ROM is an optical compact disc that
1 Gigabyte = 1073741824 Byte stores audio or other data. This device only. Its capacity
1 Megabyte = 1048576 Byte is up to 700 MB.
313. Which of the following is equal to 1 Kilobyte?
(a) 512 Nibble (b) 1 Megabyte V. Software
(c) 512 Bytes (d) 8192 Bits
UPPCL TG-II 20-03-2021 (Shift-I) 319. Which of the following is not a utility
DSSSB Craft Instructor (ESM) 06.10.2019 software?
Ans. (d) : 1 KB (Kilobyte) = 1024 bytes (a) Antivirus (b) Disk Defragmenter
1 Bytes = 8 Bits (c) File manager (d) Notepad
1 KB = 1024 × 8 Bits RRB Bengaluru LP-2004
= 8192 Bits Ans. (d) : Antivirus, disk defragmenter and file
314. One MB is equal to– manager are utility software, whereas notepad is a text
(a) the amount the RAM in every computer editor. It can edit text files and compatible formats, such
(b) 1 billion bytes as batch file.
Computer 33 YCT
ye
p
320. Patient monitoring system, pharma Ans:(c) Software is a set of instructions, data or programs
information system, lab-diagnostic system etc. that you can use to particular task. Hardware represents the
are applications of computer in which of the physical component of the computer. A processor is the
following fields? logic circuitry that responds to and process the basic
(a) Insurance (b) Banking instructions that drive a computer. Virtualization is the
(c) Marketing (d) Healthcare creation of virtual rather than actual version of something.
DSSSB Craft Instructor (ESM) 06.10.2019 325. Which of the following operating systems uses
Ans. (d) : Computers have become an integral part of Graphical User Interface?
providing efficient accountable effective and (a) Windows Server Core
transparent health services. Therefore computers are (b) MS-DOS
used in hospitals to store patient data, medical imaging (c) Microsoft Windows XP
and equipment, patient monitoring, medical laboratories (d) Linux Mint
and health care.
HSSC wireman Instructor -17.12.2019, Shift-I
321. Which of the following is not system software ?
Ans. (c) : Several operating systems use graphical user
(a) Operating system (b) Compiler
interface (GUIs) to provide a user friendly interaction
(c) Printer drive (d) MS-Office with the computer. Some well - known examples
MP Electrician Instructor 07.11.2016, Morning
include - Microsoft windows such as windows XP,
Ans. (d) : System software is a software, which is an windows 11, windows 10, iOS, Android, Chrome OS.
interface between computer hardware and application
326. OpenSUSE, Fedora and Debian are versions of
software. Operating system, compiler, Printer driver are
which of the following GUI based operating
examples of system software where as MS Office is an
systmes?
application software.
(a) Widows (b) MacOS X
322. Which of the following statements is false (c) Apple iOS (d) Linux
regarding windows OS?
KPSC Jr. Instructor 22.11.2018
(a) Windows operating system supports
graphical user interface (GUI) Ans. (d) : Linux is an open - source operating system
(b) Windows operating system has the ability to kernel initially created by Linux Torvalds in 1991. It
multitask serves as the core component of many different Linux
(c) Windows source code is owned by distributions (or versions) such as Ubuntu, Open SUSE,
Microsoft Debian, Fedora and more.
(d) Windows operating system are open source 327. Small shapes used to represent folders, files or
software programs in GUI - based systems are known
UPPCL Technical Grade-II (Re-exam) 16.10.2016 as _____.
Ans. (d) : Windows is an operating system but it is not (a) Folders (b) Icons
an open source operating system. It acts as an interface (c) Desktops (d) Ions
between the user and hardware components. Windows Punjab Wireman instructor-07.07.2013
operating system has the ability to multitask and also Ans. (b) : In GUI based systems, an icon is a small
supports graphical user interface (GUI). graphical representation of a program or file when we
323. Which of the following statements is/are true? double - click on an icon the corresponding file or
(i) Notepad ++ is an open-source editor for program opens.
Windows. 328. The word _____ means a collection of
(ii) A device driver enables the computer to programs.
use the hardware by providing an (a) Information (b) Hardware
appropriate interface. (c) Software (d) Compact
(a) Only (ii) (b) Both (i) and (ii) KPSC Instructor Electronic-25.06.2014
(c) Only (i) (d) Neither (i) nor (ii) GSSSB Electronic Instructor-21.01.2014
Punjab Wireman instructor-07.07.2013 Ans : (c) The word software means a collection of
GSSSB Supervisor Electronic Instructor 18.01.2014 programs. Because software is the collection of
Ans. (b) : Notepad ++ is an open source editor. It is used programs, set of instructions, data and procedure used to
by application and website developers on MS Windows. It operate computers and execute specific task.
is controlled by the General Public Licence.
329. The legal right to use software based on
A device driver is a piece of small software that enables specific restrictions is granted via a
the computer to use the hardware by providing an
appropriate interface. (a) Software privacy policy
(b) Software license
324. What is the name of set of programs and data
intended to perform various task on a computer (c) Software password manager
system? (d) Software log
(a) Hardware (b) Processor (UPPCL TG-2 26.06.2016)
(c) Software (d) Virtualization Ans : (b) The legal right to use software based on
UPPCL TG-II 25-01-2019 (Morning) specific restrictions is granted via a software license.
Computer 34 YCT
ye
p
330. _______ is a formal representation of facts, Ans : (c) Debugging is the process of detecting and
concept or instruction suitable for removing of error from the computer software. Both
communication, interpretation or processing compilers and interpreters are used to convert a program
by humans or automated means written in a high level language into machine code.
(a) Command (b) Database Interpreter translate one statement at a time while
(c) Data (d) Information compiler translate whole program at a time.
UKSSSC Tech. Electrical Instructor-21.11.2017 335. The quick–repair job provided as an
KPSC Jr. Instructor- 09.07.2014 immediate solution to a bug is called
Ans : (c) Data can be defined as representation of facts, (a) Patch (b) Bug–fix (c) Fix (d) Update
concept or instruction in a formalized manner, which UPPCL Technical Grade-II (Shift- II) 27.03.2021
should be suitable for communication interpretation, or Ans. (a) : A patch is quicker-repair job for a piece of
processing by human or electronic machine. programming designed to fill the error in the program
Information– Information is organized or classified usually called a bug, within an operating system or
data, which has some meaningful value for receiver. software program.
Database– A database is an organized collection of 336. The purpose of the program counter register is to
structured data which help in the efficient retrieval, (a) keep a count of the number of executing programs
insertion and deletion of data from the database.
(b) hold the address of the next instruction
331. The wildcard character for matching any (c) keep a count of the control registers
number of characters is. (d) hold the current executing instruction
(a) Hyphen Sign (b) Ampersand Sign RRB Kolkata LP-2009
(c) Asterisk Sign (d) Dollar Sign Ans. (b) : The program counter is a register in a computer
KPSC Instructor Electronics Mech.20.07.2018
GSSSB Electronic Instructor-22.01.2017 processor. Which contains the address of the next instruction
to be executed.
Ans. (c) : A wild card character is used to substitute one
or more characters in a string. The most commonly used 337. Which of the following statement(s) is/are true
wild card character is the asterisk(*). with respect to GUI based operating systems?
e.g. the will care query '*rm' will match all of the word (i) Both DOS and Linux are GUI based.
like 'alarm', 'bookworm', 'brainstorm'. (ii) Both DOS and Unix are GUI based.
Question mark (?) represent a single character. (a) Neither (i) nor (ii) (b) Only (ii)
e.g. h?t Finds hot, hat and hit. (c) Only (i) (d) Both (i) and (ii)
MP Electrician Instructor 07.11.2016, Morning
332. Which of the following is NOT a cause of WBPSC Instructor-18.09.2021
system hang?
(a) Prescience of virus Ans. (a) : MS DOS and Linux both are based on
(b) None of these Character User Interface (CUI). The other name of CUI
is command line user interface. It is a way in which the
(c) Excess power supply user can interact with the computer program. Hence
(d) Execution of corrupted file statement (i) is false unix is multi user, multitasking
Punjab Wireman instructor-07.07.2013 operating system that has a CUI interface, so statement
HSSC Electrician Instructor -17.12.2019
(ii) is also false.
Ans. (c) : Excess power supply is not a cause of system
hangs. 338. Which of the following is a function of
Cause of system hangs– operating system?
1. To many Apps Open (a) Security (b) All of the options
2. Driver Issue (c) File Management (d) Memory Management
HSSC wireman Instructor -17.12.2019, Shift-I
3. OS Issue
4. Excess Heating up Ans. (b) : The operating system is a system program that
5. Insufficient RAM acts as a interface between user and computer hardware.
6. BIOS Setting Following are the function of operating system–
7. External Device Memory Management
8. Virus Process Management
9. Execution of corrupt file Device Management
333. An error in a computer is also knows as File Management
(a) debug (b) bug Security
(c) cursor (d) none of these Job Scheduling
(UPPCL TG2 Re-exam 16-10-2016) Networking
Ans : (b) In a computer a bug is a coding error in a Command Interpretation
program most computer bugs are human error. A bug Example of OS–
produces unexpected result. The Y2K bug is one of the Windows
most famous bug. Android
334. The removal of errors from computer software iOS
is called Mac OS
(a) Interpreting (b) Translating Linux
(c) Debugging (d) Compiling Chrome OS
KPSC Jr. Instructor 22.11.2018 Ubuntu
(UPPCL TG-2 26.06.2016) Fedora
Computer 35 YCT
ye
p
339. Which of the following is/are NOT the function Ans. (c) : The kernel is a computer program at the core
(s) of an operating system? of a computer's operating system and generally has
i) Process management complete control over everything in the system. It is the
ii) Providing a user interface portion of the operating system code that is always
iii) Memory management resident in memory and facilities interactions between
iv) Translating a high-level language source hardware and software components.
code into a machine-level code 344. Which of the following operating system is
(a) Only ii, iii, and iv (b) Only iv almost similar and supports many common
(c) Only i, ii and iv (d) Only i and ii commands?
KPSC Jr. Instructor 22.11.2018 (i) Unix (ii) Linux (iii) MS - Windows
Ans. (c) : The functions of operating system are File (a) (i) and (iii) (b) (i) and (ii)
management, Disk management and Memory (c) (i), (ii) and (iii) (d) (i) and (iii)
management. Hence option (c) i, ii and iv are not the UKSSSC Tech. Electrical Instructor-21.11.2017
functions of operating system. Ans. (b) : Linux is an open source operating system and
340. Which of the following statements is incorrect Unix is a powerful and multitasking operating system.
about the Linux operating system? Linux and Unix is a case sensitive operating system and
(a) It is an open source operating system. also supports many commands.
(b) It was developed by Linus Torvalds. 345. Which of the following statements regarding
(c) It is a multi-tasking operating system. system software is incorrect?
(d) It is a single user operating system. (a) It provides services directly to the end user, or
Punjab Wireman instructor-07.07.2013 any other software.
Ans. (d) : Linux is a free, open source, and popular (b) It directly interacts with the hardware of the
multitasking operating system that was developed on computer.
September 17, 1991 by Linus Torvalds. Linux is a free (c) It provides basic functionality for the
and virus-free operating system. It is used in PCs, operation of the computer.
mobile device, super computer etc. (d) The printer is not a driver system software.
341. Which of the following is/are the service(s) KPSC Instructor Electronics Mech.20.07.2018
provided by system calls? Ans. (d) : System software is a type of computer
Services: program which is designed to run computer hardware
i) Process creation and management and application programs. Operating System (OS),
ii) Device handling (I/O) macOS, Linux, Android and Microsoft Windows are
iii) Protection examples of system software.
iv) Networking A printer driver is a piece of system software that
(a) Only ii, iii and iv (b) Only i allows your computer to interact with your printer by
(c) Only i and ii (d) All of i, ii, iii and iv translating instructions. It translates instructions so
UP PCL Technical Grade-II-11.11.2016 printer is a driver system software.
KPSC Jr. Instructor 22.11.2018 346. Which of the following operating systems is
Ans. (d) : There are many services provided by system not case sensitive?
calls- (a) Unix (b) Linux
Process creation and management, Main memory (c) Linux and Unix (d) Windows
management, Protection, Device handling (I/O), File RRB Gorakhpur L.P.-2008
access, Directory and File system management, Ans. (d) : Linux is an open source operating system and
Networking, Information maintenance, communication. Unix is a powerful and multitasking operating system
342. Which of the following statements is/are Linux and Unix are case sensitive operating system
correct about Linux operating system? while windows is not.
(a) It is a single tasking operating system 347. Which of the following statement(s) is/are true
(b) It is a single user operating system regarding the Macintosh Machine?
(c) It was developed by Linux Torvalds (i) It is a product of Apple.
(d) It is a product of Apple Incorporation (ii) It was developed in 1972
WBPSC Instructor-18.09.2021 (a) Neither (i) nor (ii) (b) (i) and (ii) both
HSSC Electrician Instructor -17.12.2019 (c) only (ii) (d) only (i)
Ans. (c) : Linux is an open source operating system that DSSSB Craft Instructor (ESM) 06.10.2019
acts as an interface between the computer and the user. MP Electrician Instructor 07.11.2016, Morning
It was invented and developed by Linux Torvalds in Ans. (d) : Macintosh or Mac is a name of a series of
1991. Anyone can use it for free and can also modify it. personal computers in which design, developing, and
343. Which of the following is the core of the Linux marketing are done by Apple Information Inc.
system, manages the CPU, memory, and peripheral company. The Macintosh was a widely sold personal
devices, and is the lowest level of the OS? computer with a graphical user interface (GUI) and a
(a) Bootloader (b) Desktop environment mouse. Macintosh was released by Apple Computer on
(c) Kernel (d) Daemons January 22, 1984 in an advertisement during the Super
Punjab Wireman instructor-07.07.2013 Bowl XVIII.
Computer 36 YCT
ye
p
348. Which of the following statements is/are true? 353. Which of the following is not a Linux distribution?
(i) System software facilitates the function of (a) Solus (b) Honeycomb
application software. (c) Fedora (d) Ubantu
(ii) MS-Word is both system and application RRB Kolkata LP-2009
software. HSSC wireman Instructor -17.12.2019, Shift-II
(a) (i) and (ii) both (b) Neither (i) nor (ii) Punjab Wireman instructor-07.07.2013
(c) Only (ii) (d) Only (i) Ans. (b) : Solus, Fedora, Ubuntu are all Linux
HSSC wireman Instructor -17.12.2019, Shift-I distribution operating systems while Honeycomb is the
UPPCL Technical Grade-II-26.06.2016 code name of the third version of the android operating
Ans.(d): System software provides the platform for system.
application software. Application software can not run 354. An ordered set of instruction is known as_____
without system software. MS Word is an application and a set of programs that controls the
software. operation of a computer system or its related
349. Which of the following functionalities of the devices is known as _____.
operating system allocates memory space to (a) Hardware, Software
different programs under execution? (b) Program, Software
(a) Security Management (c) Firmware, Hardware
(b) Processor Management (d) Software, Hardware
(c) Memory Management KPSC Instructor Electronics Mech.20.07.2018
(d) Device Management GSSSB Electronic Instructor-22.01.2017
UPPCL Technical Grade-II (Shift-I) 20.03.2021 Ans. (b) : An ordered set of instruction is known as a
Ans. (c) : Memory Management is the functionalities of program and a set of programs that controls the
an operating system that manages primary memory operation of a computer system or its related devices is
space to various programs under the execution. known as software.
355. Contiki is used as a/an ______.
350. Which of the following options represents a
(a) operating system
valid classification of user interface?
(b) software application
(a) Textual, Graphical and Virtual
(c) protocol for IoT systems
(b) Textual and Graphical
(d) cloud server
(c) Graphical and Virtual
KPSC Jr. Instructor- 09.07.2014
(d) Textual and Virtual
RRB Bengaluru LP-2004
Ans. (a) : Contiki is an open-source operating system
designed for resource-constrained Internet of Things
Ans. (b) : Textual and graphical options represents a (IoT) devices. Contiki is often used in various IoT
valid classification of user interface. applications, such as smart home devices, sensor
351. Which of the following is the subsystem of the networks, and industrial automation.
Linux operating system that displays graphics 356. What is the most popular OS for smart phones?
on the monitor and is commonly referred to as (a) Linux (b) Mac
a server or volume? (c) Windows (d) Android
(a) Init system (b) Daemons RRB Gorakhpur L.P.-2008
(c) Graphical server (d) Kernel Ans. (d) : Android is the most popular mobile operating
HSSC wireman Instructor -17.12.2019, Shift-II system based on a modified version of the linux kernal
Ans. (c) : A graphical server is a subsystem of the and other open source software, designed primarily for
Linux operating system that displays graphics on a touch screen mobile devices such as smart phones and
monitor. It is software that controls how graphics are tablets. It was unveiled in November, 2007 with the first
displayed on a computer. Users without a graphical commercial android device, the HTC Dream being
server can interact with the Linux system only through a launched in September 2008.
command-line interface. This is commonly referred to 357. Which of the following options is
as an X server. INCORRECT with respect to the comparison
352. Which of the following statements is correct between i) Windows OS and ii) Linux OS.
about Linux operating system? (a) i) Licensed ii) Open sourced
(a) It is a single user operating system (b) i) Less stable and less reliable ii) More stable
(b) It is a multi-tasking operating system and more reliable
(c) It is a product of Oracle Incorporation (c) i) Takes less resources to execute ii) Takes
(d) It was developed by Dennis Ritchie more resources to execute
UPPCL Technical Grade-II (Shift- II) 27.03.2021 (d) i) Menu/Icon-based ii) Command line based
HSSC Electrician Instructor -17.12.2019 DSSSB Craft Instructor (ESM) 06.10.2019
Ans. (b) : Linux is an open - source operating system Ans. (c) : Windows and Linux are two distinct
Kernel initially developed by Linus Torvalds in 1991. It operating system with several key differences-
is a multi - tasking operating system. It's the core 1. Microsoft window is a commercial (Licensed
component of various Linux distributions like Ubuntu, operating system whereas Linux is an open source
Debian, Centos and more. operating system.
Computer 37 YCT
ye
p
2. Windows is less stable and less reliable whereas 362. Which of the following is not correct about
Linux more stable and more reliable. Linux?
3. Windows takes more resources to execute while (a) It is an operating system
Linux takes less resource to execute. (b) Linux is also used in embedded system
4. Windows has graphical user interface (Menu/Icon (c) A unique feature of Linux is that it does not
based) and is known for its user-friendliness while have a Kernel.
Linux is the command line interface (CLI) which
offer more control and flexibility. (d) It can be installed on a computer without a
software license.
358. Which of the following does OS NOT manage?
UPPCL TG-II (20-03-2021) (Shift-II)
(a) File management and security
(b) Process management and synchronisation Ans. (c) : Linux is an open source operating system. Linux
(c) Memory management and CPU scheduling based on Kernel are used in embedded system. It can be
(d) Virus protection and management installed on a computer without a software license.
MP Electrician Instructor 07.11.2016, Morning 363. In an application window, there is a button
WBPSC Instructor-18.09.2021 that you can drag to the left or right to
Ans. (d) : Operating system (OS), program that increase or decrease the setting value,
manages a computer's resources, especially the respectively.
allocation of those resources among other programs. (a) Scroll bar (b) Spinner
Operating system management refers to the set of (c) Text box (d) Slider
activities and functions performed by an operating UPPCL TG-II 19-03-2021 (Shift-II)
system to efficiently control and coordinate the Ans. (d) : In an application window, a slider is a button
hardware and software resources of a computer system. that you can drag to the left or right to increase or
These task include - Process management, Memory decrease the setting value, respectively. Its setting does
management, File management. Device management,
not affect the font. Its zoom setting is minimum 10%
CPU scheduling, Security, Synchronization etc.
and maximum is 500%.
So, The operating system (OS) does not manage virus
protection and management. 364. True or False–
359. All of the following are the Process i. Operating system is the interface between
management activities handled by the a human and a machine.
Operating System EXCEPT: ii. Operating system is an application
(a) Product purchase, payments, and order program.
(b) control execution of applications (a) i) True ii) False (b) i) False ii) False
(c) Synchronisation, communication, and (c) i) True ii) True (d) i) False ii) True
deadlock handling for processes KPSC Jr. Instructor 22.11.2018
(d) Control access to shared resources like files, Punjab Wireman instructor-07.07.2013
memory, I/O, and CPU
Ans : (a) Statement (i) is true, Statement (ii) is false
HSSC wireman Instructor -17.12.2019, Shift-II because operating system is a system software hence
GSSSB Electronic Instructor-21.01.2014 option (a) is true.
Ans. (a) : All of the above are the process management
activities handled by Operating system Except Product 365. A/An ______ acts as an interface between the
purchase payments and order. users and the computer hardware resources.
360. Which component of operating system (a) Operating system
provides the user interface to interact with the (b) Utility software
kernel and hardware? (c) Compression software
(a) Device driver (b) Processor (d) Spreadsheet
(c) Shell (d) Register UPPCL TG-II 25-01-2019 (Evening)
KPSC Jr. Instructor 22.11.2018 UPPCL TG-II 25-01-2019 (Morning)
Punjab Wireman instructor-07.07.2013 Ans : (a) An operating system is a system software that
Ans. (c) : A shell is a program that provides an interface acts as an interface between the users and the computer
between a user and an operating system Kernel. hardware. It is responsible for the execution of all the
361. Which of the following is NOT a function of an processes, resource, allocation, file management etc.
operating system? 366. Which of the followings is not an Operating
(a) Security System?
(b) Memory management (a) Unix (b) Linux
(c) File management
(c) Java (d) Windows-11
(d) Control over user performance
HSSC Electrician Instructor -17.12.2019 UPPCL TG-II 27-03-2021 (Shift-I)
Ans. (d) : Operating system is an interface between the Ans. (c) : Java is not an operating system. It is an object
user and hardware. Operating system is a software oriented high level programming language. It is used in
which performs function like- File management, web based programming, mobile application
Memory Management, Security, Process Management, development, games development etc. Unix, Linux
Job scheduling etc. While control over user Windows 11, Ubuntu, MS DOS, Mint, Mac OS and
performance is not the function of operating system. Android is type of operating system.
Computer 38 YCT
ye
p
367. Operating System is a type of Ans. (d) : The program under execution is called
(a) Application Software (b) Utility Software process. Process goes through different state throughout
(c) System Software (d) Hardware the life cycle during the process execution. Which is
UPPCL TG-II (20-03-2021) (Shift-II) known as process states.
Ans. (c) : Operating system is types of system software. Ready– The process is waiting to be assigned to a
System software is designed for running the computer processor.
hardware parts and application programs. Application Waiting– The process is in waiting state until an event
software is designed for specific task. It help user in occurs like input/output operation completion.
creating document, presentation, database etc. Running– In this state the instructions are being
Utility software– It is system software that helps to executed. While starvation is the problem that occurs
maintain the proper and smooth functioning of a when high priority processes keep executing and low
computer system. priority processes get blocked for indefinite time.
373. Android is a kind of _____ software.
368. Which of the following is not a basic function
(a) utility (b) connectivity
of operating system?
(c) system (d) application
(a) Memory management
KPSC Jr. Instructor- 09.07.2014
(b) Control of computer hardware
GSSSB Electronic Instructor-22.01.2017
(c) Control input and output
(d) Data base management Ans. (c) : Android is an open-source mobile operating
system based on Linux. It is designed primarily for
UPPCL TG-II (20-03-2021) (Shift-II) touch screen mobile devices. Operating system is one of
Ans. (d) : An operating system is an interface between the best example of system software.
computer user and hardware. Database management is 374. The operation of storing, retrieval and deletion
not a function of operating system. Database manages of files during disk management is known as
by database management software. ____
An operating system is performs all the basic tasks like– (a) Network Management
1. Memory management (b) System Maintenance
2. Control of computer hardware (c) File Management System
3. Control input and output (d) User Space Administration
4. Process management UPPCL Technical Grade-II (Shift-II) 19.03.2021
5. Security UKSSSC Tech. Electrical Instructor-21.11.2017
6. Device management Ans : (c) The file management system is a software
7. Job scheduling which is used to create, delete, modify and save files.
8. Networking 375. Find out the odd one from the given options.
369. Windows 95 is an ______ (a) Windows (b) Linux
(a) GUI (b) Operating system (c) Microsoft Office (d) Unix
(c) Game (d) Computer UPPCL (TG-II) 24-01-2019 (Morning)
DSSSB Craft Instructor (ESM) 06.10.2019 Ans : (c) Microsoft office is an application software
UPPCL Technical Grade-II-09.08.2015 while others are operating system.
Ans : (b) Windows 95 is a GUI based single user 376. Which of the following is a GUI based operating
operating system. It was released on August 24, 1995. system?
370. The instant messaging application that comes (a) DOS (b) DOS and Linux both
in Windows OS is called (c) Unix and DOS both(d) Windows
(a) Windows Messenger (b) Windows Chat UPPCL (TG-II) 24-01-2019 (Morning)
(c) Talk! (d) Microsoft Outlook Ans : (d) The Graphical User Interface (GUI) is a form
MP Electrician Instructor 07.11.2016, Morning of user interface that allows one to interact with
electronics devices through secondary notation such as
Ans : (a) Microsoft Windows messenger is a graphical icons and visual indicators, rather than a text
discontinued instant messaging application. based user interfaces type command label or text
371. Which of the following is not an OS? navigation. Windows operating system is based on GUI.
(a) Apache (b) Android 377. What is the extended form of GUI?
(c) Linux (d) Windows (a) General User Interface
WBPSC Instructor-18.09.2021 (b) Geographical User Interface
Ans. (a) : Apache is the most commonly used free, (c) Graphical User Interface
open-source web server. While Android, Linux and (d) Good User Interface
Windows is an operating system. UPPCL TG-II (20-03-2021) (Shift-II)
372. With respect to operating systems, which of Ans. (c) : Graphical User Interface is the extended form
the following is NOT a valid process state? of GUI. It is the common user interface that includes
(a) Ready (b) Waiting graphical representation like icon, menus and button. In
(c) Running (d) Starving GUI communication can be performed by interacting
HSSC wireman Instructor -17.12.2019, Shift-I with these icons rather than the usual text based or
KPSC Instructor Electronics Mech.20.07.2018 command based communication.
Computer 39 YCT
ye
p
378. Which of the following files provides inter 383. Which of the following is a feature of Linux
process communication in Linux OS? system?
(a) Socket (b) Link (a) Real time and single user
(c) Block (d) Directory (b) Multiuser and multitasking
KPSC Instructor Electronics Mech.20.07.2018 (c) Multitasking and real time
Ans. (a) : Socket file is a special file, which is used to (d) Single user and multitasking
interconnect two different processes. It also provides UPPCL TG-II 20-03-2021 (Shift-I)
inter process communication in Linux OS. Ans. (b) : Linux is an operating system that evolved from
379. Which of the following is a part that users a Kernel created by Linux Torvalds.
interact with and has many options to choose Feature of Linux–
from in a Linux OS? 1. Linux is a multiuser, operating system
(a) Daemons (b) Bootloader 2. Multitasking operating system
(c) Desktop environment (d) Kernel 3. Portable
KPSC Jr. Instructor- 09.07.2014 4. Open source
6. Hierarchical File System
Ans. (c) : Desktop environment is the collection of 7. Shell
application and user interface controls with which users
interact when using Linux as a desktop platform. Access to 384. In Linux, which of the following files are
the desktop environment is usually controlled through the device files, which provide buffered access to
system hardware components and
X window system or another graphical system.
communicate with device drivers through the
380. Operating System based on Linux are files system provide a method?
(a) Debian (b) Fedora (a) Binary (b) Image
(c) Ubuntu (d) All of these (c) Block (d) Readable
GSSSB Electronic Instructor-22.01.2017 RRB Gorakhpur L.P.-2008
Ans. (d) : An operating system is software that manages Punjab Wireman instructor-07.07.2013
the communication between your software and hardware. Ans. (c) : Block files in Linux are device files that provide
Debian, Fedora and Ubuntu OS are based on Linux. buffered access to components comprising the system
381. Which of the following statement(s) is/are hardware and provide a method of communication with
false? device drivers through the file system.
(i) Both DOS and Linux are examples of 385. In Linux, each file or directory is uniquely
system software. identified by an identifier, called a/an ____.
(ii) Railway reservation system is an example (a) PID (b) Inode
of special purpose application software. (c) Tnode (d) Vnode
(a) Neither (i) nor (ii) (b) Only (ii) UPPCL TG-II 19-03-2021 (Shift-I)
(c) Only (i) (d) Both (i) and (ii) Ans. (b) : In Linux, whenever a new file is created, it is
UKSSSC Tech. Electrical Instructor-21.11.2017 given a file name and an Inode number. This number
GSSSB Supervisor Electronic Instructor 18.01.2014 works as the unique identifier for that file. An Inode
Ans. (a) : Both statements are true. number is just like an index number of a book. The
System software primarily control the internal working Inode table contains all the Inodes.
of computer through an operating system and also 386. Which of the following options is not an
controls devices. Whereas application software directs example of an operating system?
the computer to executes commands given by user. (a) MS-DOS (b) Safari
(c) Unix (d) Linux
382. Which of the following is an example of Linux
MP Electrician Instructor 07.11.2016, Morning
shell?
WBPSC Instructor-18.09.2021
(a) Baby (b) Korn
(c) GBU (d) GBT Ans. (b) : Safari is a web browser developed by Apple.
UPPCL Technical Grade-II (Shift- II) 27.03.2021 387. Full form of DOS is ___
RRB Kolkata LP-2009 (a) Data Object System
DSSSB Craft Instructor (ESM) 06.10.2019 (b) Database Operating System
(c) Data Operating System
Ans. (b) : The shell is the command interpreter in an
(d) Disk Operating System
operating system such as Unix or Linux, it is program
that executes other programs. Korn is an example of HSSC wireman Instructor -17.12.2019, Shift-I
Linux shell Korn shell was developed by David Korn at Ans : (d) Full form of DOS is Disk Operating System.
Bell Labs. It is also known as Ksh shell. DOS is an operating system that runs from a disk drive.
Some important shells– 388. Which of the following is the main component
i. Bash Shell of Linux which can interact with hardware?
ii. Tcsh/csh shell (a) GUI (b) Editor
iii. Ksh shell (c) Kernel (d) Shell
iv. Zsh shell UPPCL (TG-II) 24-01-2019 (Morning)
v. Fish Ans : (c) Linux Kernel is the main component of the
vi TENEX c shell operating system which can interact with hardware.
Computer 40 YCT
ye
p
389. Which of the following statements is/are Disadvantage–
FALSE? i. Priority cannot be set for the job.
(i) Linux kernel is the core part of the operating ii. Batch OS may lead to starvation.
system which establishes communication iii. CPU may remain idle for a long time because the
between devices and software. speed of the mechanical I/O devices is slow.
(ii) Linux may be a perfect operating system if iv. Large Turnaround time
you want to get rid of viruses, malware, v. More difficult to debug program.
slowdowns, crashes. vi. There is no direct interaction between the computer
(a) Both (i) and (ii) (b) Neither (i) nor (ii) system and user.
(c) Only (i) (d) Only (ii) 393. Which of the following is not a valid version of
HSSC Electrician Instructor -17.12.2019 windows 7?
Ans. (b) : The Linux Kernel is the main component of a (a) Learner (b) Professional
Linux operating system and the main interface between (c) Enterprise (d) Ultimate
a computer hardware and its processes. It communicates UPPCL TG-II 20-03-2021 (Shift-I)
between the two management resources as efficiently as Ans. (a) : Professional, Enterprise and Ultimate all are
possible. Linux can be an ideal operating system if you valid versions of Windows 7 while learner is not a valid
want to get rid of viruses, malware, slowdowns, crashes, versions of it.
costly repairs etc. Valid versions of Windows 7 are as follows.
390. Which of the following acts as a resource 1. Starter
manager that provides the interface between 2. Home basic
the user and the hardware? 3. Home Premium
(a) Translation software (b) Operating system 4. Professional
(c) Antivirus software (d) Word Processor 5. Interprise
UPPCL (TG-II) 24-01-2019 (Morning) 6. Ultimate
Ans : (b) Operating system acts as a resource manager 394. In Linux, a case insensitive sorting can be done
that provides the interface between the user and hardware. using the_____option with the ‘sort’ command.
Important function of an operating system– (a) -k (b) -r (c) -o (d) -f`
Memory Management KPSC Instructor Electronic-25.06.2014
Device Management
Ans. (d) : In Linux to sort mixed case text pass the –f
Process Management
option to sort. This will ignore case sensitivity when
File Management sorting and write the result to standard output.
Security, Control Over System, Performance, Job
• To sort by items done using –k option.
Accounting, Input /Output Management, Command
interpretation. The –r is an option of sort command which sorts the
input file in reverse order –0 option is use to write result
391. Which of the following is essential for the to file instead of standard output.
functioning of a computer system?
(a) Operating system (b) MS Office 395. Which of the following is the file extension for
ASCII Text file in windows operating system?
(c) MS World (d) MS Excel
(a) .TXT (b) .ZIP
(UPPCL TG2 Re-exam 16-10-2016)
Ans : (a) An operating system is the most important (c) .WAV (d) .BAT
software that runs on a computer. GSSSB Electronic Instructor-21.01.2014
392. Which of the following cannot be dedicated to Ans. (a) : .TXT is the file extension for ASCII Text file
the batch operating system? in windows operating system text file is a type of non-
(a) CPU idle time executable, digital file and contains only text. It may
(b) Low turnaround time contain numbers, letters, symbols and/or a combination
(c) Lack of interaction between user and job but does not contain special formatting such as italic
(d) Unable to define priority text, bold text, underline, image etc.
UPPCL (TG-II) 24-01-2019 (Morning) 396. Which of the following statement (s) is /are
Ans : (b) Batch operating system is a type of operating correct?
system. The users who using a batch operating system (i) In Linux system, 'file.txt' and 'FILE.txt'
do not interact with computer directly. In batch different file names will be considered.
operating system, the similar jobs are grouped into (ii) In a Windows system, 'file.txt' and
batches with the help of some operator and these 'FILE.txt' shall be treated as one file
batches are executed one by one. name.
Advantage– (a) Neither (i) nor (ii) (b) Only (ii)
i. It saves the time that was being wasted earlier for (c) Both (i) and (ii) (d) only (i)
each individual process. UPPCL TG-II 25-01-2019 (Morning)
ii. Multiple users can share the path system. Ans : (c) Window file system treats file and directory
iii. The idle time for the batch system is very less. name as case-insensitive.
iv. It is easy to manage large work repeatedly in batch Linux file system treats file and directory names as
systems. case-sensitive.
Computer 41 YCT
ye
p
397. Which of the following operating systems is (b) Multiprocessing OS
case-sensitive? (c) Multitiming OS
(i) Unix (d) Interactive OS
(ii) Linux UPPCL Technical Grade-II Shift-II, 28.03.2021
(iii) MS - Windows Ans. (c) : Multiprogramming OS– An operating
(a) (i), (ii) and (iii) (b) Only (i) and (iii) system that is capable of running multiple programs on
(c) Only (ii) and (iii) (d) Only (i) and (ii) a single processor is known as multiprogramming
UKSSSC Tech. Electrical Instructor-21.11.2017 operating system.
Ans. (d) : Unix and Linux operating systems are case - Multiprocessing Operating System– In
sensitive. multiprocessing operating system, there are more than
MS - Windows is not case - sensitive. one processor which work parallel to perform the
398. Which of the following is NOT a Common required operation. It allows the multiple processors and
Object File Format (COFF) specification they connected with physical memory, computer busses,
format for files used on Unix systems? clocks and peripheral devices. The main purpose of
(a) Static (b) Executable multiprocessor OS are to provide high execution speed
(c) Object code (d) Shared library at low cost.
GSSSB Supervisor Electronic Instructor 18.01.2014 Interactive Operating System– An interactive OS is
Ans. (a) : The Common Object File Format (COFF) is a one that allows the user to directly interact with the OS
format for executable, object code and shared library. multitiming is not a type of operating system.
While static is not a Common Object File Format.
403. Which of the following is not an operating
399. What is an a.out (file) in a computer running system?
Unix/Linux?
(a) Kali Linux (b) Windows
(a) A file suitable to display
(b) A file suitable to print (c) JVM (d) Mac OS
(c) An executable file RRB Bengaluru LP-2004
(d) A utility to output characters to a serial device Ans : (c) The java virtual Machine is called JVM. JVM
KPSC Instructor Electronics Mech.20.07.2018 is a engine that provides runtime environment to drive
GSSSB Electronic Instructor-22.01.2017 java code. It converts Java byte code into machines
Ans. (c) : a.out is a file format used in older version of language. While Kali linux, Windows and Mac OS all
unix-like computer operating system for executable file. these are operating system.
400. Which of the following is not a valid version of 404. Which of the following is not a system
an operating system? software?
(a) Windows 9 (b) Windows 7 (a) Kaspersky (b) Unix
(c) Windows 10 (d) Windows XP (c) DOS (d) Windows
UPPCL TG-II 27-03-2021 (Shift-II) UPPCL TG-II 25-01-2019 (Evening)
Ans. (a) : Windows is a graphical operating system Ans : (a) Kaspersky is a Russian Multinational
developed by Microsoft corporation. Windows makes it Company that provides cyber security and antivirus
possible to complete all type of everyday task on your software.
computer.
List of Microsoft Windows Versions– 405. Find out the odd one from the given options.
Windows 11 (a) Microsoft Word (b) Word Pad
Windows 10 (c) Operating System (d) Note Pad
Windows 8 UPPCL (TG-II) 24-01-2019 (EVENING)
Windows 7 Ans : (c) Microsoft Word, Word Pad and Note Pad are
Windows Vista application software. While operating system is a
Windows XP system software.
Windows 98 406. Which among them is not an example of
Windows 95 mobile operating system?
Windows NT (a) Android (b) Bada
401. Identify the in compatible among the following (c) Fedora (d) Symbian
options. (UPPCL TG2 11-11-2016)
(a) Linux (b) OpenBSD Ans : (c) Fedora is an open source Linux based
(c) Ubuntu (d) iOS computer operating system.
KPSC Jr. Instructor- 09.07.2014 407. Now..............is the owner of Mobile Operating
Punjab Wireman instructor-07.07.2013 System "Android"
Ans : (d) Among the above option (a), (b) and (c) are (a) Android Inc. (b) Samsung
open source Linux based operating system while iOS is (c) Yahoo (d) Google
a mobile operating system developed by Apple inc. (UPPCL TG2 11-11-2016)
402. Which of the following is NOT a type of Ans : (d) In preset time Google is the owner of android
Operating System? mobile operating system. Android Inc, was bought by
(a) Multiprogram OS the Google Inc in 2005.
Computer 42 YCT
ye
p
408. Which option best describes the truth of the 413. BIOS is a type of system software, which is
following statement? stored in ____ located on the motherboard.
(i) Virus, Trojan and Key logger are (a) Cache memory
examples of utility software. (b) SRAM
(ii) Windows and Linux are examples of (c) Read Only Memory (ROM)
system software. (d) DRAM
(a) (i) False (ii) True (b) (i) True (ii) False RRB Bengaluru LP-2004
(c) (i) True (ii) True (d) (i) False (ii) False Punjab Wireman instructor-07.07.2013
UPPCL (TG-II) 24-01-2019 (Morning) Ans. (c) : BIOS is a type of system software, which is
Ans : (a) (i) Virus, Trojan and Key logger are example stored in a non-volatile. ROM located on the
of malware. motherboard. In modern computer systems, the BIOS
(ii) Windows and Linux are examples of system software. contents are stored on flash memory so it can be
Hence statement (i) is false and statement (ii) is true. rewritten without removing the chip from the
409. Which of the following statements about an motherboard.
operating system is FALSE? 414. Booting is a term used to denote:
(a) It ensures that computer system components like (a) installation of an application
hard disk and RAM never crash or malfunction. (b) loading of the OS programs from the disk to
(b) It works as a resource manager. memory
(c) It provides efficient and fair sharing of hardware (c) hardware reset
resources among users and or programs. (d) power on
(d) It hides details of hardware resources from KPSC Instructor Electronic-25.06.2014
programmers and other users. UKSSSC Tech. Electrical Instructor-21.11.2017
DSSSB Craft Instructor (ESM) 06.10.2019
MP Electrician Instructor 07.11.2016, Morning
Ans : (b) Booting is a term used to denote loading of
the OS programs from the disk to memory.
Ans. (a) : It cannot ensures that computer system
components like hard disk and RAM never crash or mal 415. Select the correct option that indicates the file
function. Hence the (a) is false and statements (b), (c) containing the Linux file systems to be
and (d) are true. installed automatically at booting.
410. Which of the following statements is/are true? (a) /etc/anacrontab (b) /etc/crontab
(i) Without software hardware is generally of (c) /etc/fstab (d) /etc/mtab
no use. KPSC Instructor Electronics Mech.20.07.2018
(ii) Compiler is an example of both hardware Ans : (c) The /etc/fstab file is one of the most important
and software. files in a Linux based system. Since it stores static
(a) Both (i) and (ii) (b) Only (ii) information about file systems. Each entry line in the
(c) Neither (i) nor (ii) (d) Only (i) fstab file contains six fields each one of them describes
WBPSC Instructor-18.09.2021 a specific information about a file system.
UPPCL Technical Grade-II (Shift-I) 19.03.2021 416. Which of the following correctly describes the
Ans. (d) : The hardware and software of the computer windows operating system?
are interconnected with each other. Hardware cannot (a) Single-tasking
function without the software. Further more without the (b) Only multitasking
hardware the software cannot perform the required task. (c) Only multiprogramming
Compiler is an example of system software. (d) Multitasking and multiprogramming both
411 Which of the following is used by the UPPCL TG-II 27-03-2021 (Shift-II)
microprocessor of a PC to keep the computer Ans. (d) : Windows operating system is a type of
system running after it is turned on? system software, which acts as interface between the
(a) Antivirus (b) Application software user and the computer. Windows operating system is a
(c) Device Driver (d) BIOS multitasking and multiprogramming operating system.
HSSC wireman Instructor -17.12.2019, Shift-I 417. In job scheduling, if C is the job completion
UKSSSC Tech. Electrical Instructor-21.11.2017 time and D is the deadline for a job, then the
Ans. (d) : BIOS stands for Basic Input Output System. deadline over–run K is calculated as–
It is program a computer's microprocessor uses to start (a) K = C – D (b) K × C = D
the computer system after it is powered on. It also (c) K = C × D (d) K – C = D
manages data flow between the computer's operating GSSSB Electronic Instructor-22.01.2017
system and attached devices, such as the harddisk, video KPSC Jr. Instructor- 09.07.2014
adapter, keyboard, mouse and printer. Ans. (a) : If in a job scheduling, C is the time taken to
412. The instruction about booting your system is complete the work.
stored in: D is the deadline for a job, then the deadline over-run K
(a) RAM (b) BIOS is calculated as
(c) CPU (d) Registers Total time – Deadline = Deadline over run
KPSC Jr. Instructor 22.11.2018 ∴ K=C–D
Punjab Wireman instructor-07.07.2013
418. A computer system that permits multiple users
Ans. (b) : The instruction about booting your system is to run programs at the same time is a
stored in BIOS. (a) real time system
Computer 43 YCT
ye
p
(b) multi programming system 423. Which of the following is an open source
(c) time sharing system operating system?
(d) multi tasking system (a) Unix (b) Windows
RRB Gorakhpur L.P.-2008 (c) Linux (d) DOS
DSSSB Craft Instructor (ESM) 06.10.2019 UPPCL (TG-II) 24-01-2019 (EVENING)
MP Electrician Instructor 07.11.2016, Morning Ans : (c) Linux is an open source operating system.
Ans. (d) : Multitasking operating systems allow 424. Linux is a portable operating system. Which of
multiple users to perform multiple task at the same time.
the following best describes the portability
The allocation of system resources can be easily
feature of Linux?
managed by multitasking operating system.
There are two main types of multitasking - (a) Linux can work on different types of hardware.
(i) Preemptive multitasking (b) Linux can support multiple programs at the
(ii) Cooperative multitasking same time.
(c) Linux can support GUI.
419. In Linux, the terminal I/O characteristics may (d) Linux can support multiple users at the same
be configured using the command: time
(a) ktty (b) ltty
UPPCL (TG-II) 24-01-2019 (EVENING)
(c) itty (d) stty
UPPCL Technical Grade-II (Shift-II) 19.03.2021 Ans : (a) The main features of the Linux operating
RRB Bengaluru LP-2004 system are–
HSSC Electrician Instructor -17.12.2019 i. Portable– Linux operating system can work on
KPSC Jr. Instructor 22.11.2018 different types of hardware as well as Linux Kernel
Ans. (d) : STTY (Set Tele type) command allows a user supports the installation of any kind of hardware
to make change and print terminal line setting. Basically platform.
this command shows or changes terminal characteristics ii. Open source
of the terminal. iii. Multiuser
420. Which of the following options is an advantage iv. Multiprogramming
of multiprogramming? v. Shell
(a) Low operating overhead vi. Security
(b) High CPU usage vii. Hierarchical File System
(c) Moderate throughout 425. Which of the following is NOT a valid
(d) Low peripheral usage characteristic of the Linux operating system?
HSSC Electrician Instructor -17.12.2019 (a) Multiuser (b) Real-time
KPSC Jr. Instructor 22.11.2018 (c) Multitasking (d) Multiprogramming
Punjab Wireman instructor-07.07.2013 UKSSSC Tech. Electrical Instructor-21.11.2017
Ans. (b) : Multiprogramming makes efficient use of the Ans. (b) : Linux is not a Real-time operating system. It
CPU by overlapping the demands for the CPU and its input is a general purpose operating system.
Output devices from various users. It attempts to enhance
CPU utilization by always having something for the CPU to 426. The command to create a new directory in
execute. Linux is
421. Which of the following operating systems do NOT (a) new (b) mkdir
support multitasking? (c) open (d) newdir
(i) Windows (ii) Linux GSSSB Supervisor Electronic Instructor 18.01.2014
(iii) MS-DOS Ans. (b) : To create a new directory in Linux using the
(a) Only (iii) (b) Both (i) and (iii) mkdir command
(c) Only (ii) (d) Both (ii) and (iii) C:\md<DirectoryName> or
KPSC Instructor Electronic-25.06.2014 C:\mkdir<DirectoryName>
Ans. (a) : An operating system that allows a single user to 427. In the Linux operating system, what is the
perform only one task at a time is called single tasking or operation performed by the following
single user. For example MS-DOS, palm OS etc. Windows command?
is single user multitasking operating system. Linux is a cd..
multitasking or multi user operating system. (a) show the current directory or the present
422. Which of the following types of operating working directory
systems allows multiple users to work (b) Change the current directory to the parent
simultaneously? directory of the current
(a) Multiprocessor operating system (c) Change the current directory to a sub-
(b) Multiuser operating system directory of the current
(c) Multitasking operating system (d) Change the current directory to your HOME
(d) Desktop operating system directory
GSSSB Electronic Instructor-21.01.2014 KPSC Instructor Electronics Mech.20.07.2018
Ans : (b) A multi-user operating system is an operating Ans. (b) : The cd (change directory) command is used
system that allows multiple users to use/access a single to change the current working directory in Linux and
system running to a single operating system. other Unix-like operating system.
Computer 44 YCT
ye
p
428. Which of the following is not a version of 434. Which among them is an example of system
Linux operating system? software?
(a) Fedora (b) Linux Mint (a) MS-Word (b) Unix
(c) Leopard (d) Ubuntu (c) Anti-virus (d) Mozila Firefox
GSSSB Electronic Instructor-22.01.2017 (UPPCL TG2 11-11-2016)
Ans. (c) : Linux is the most famous and most used open Ans : (b) Unix is an example of system software. MS-
source operating system. Fedora, Linux Mint and Word is the example of application software.
Ubuntu are all three version of Linux, while leopard is 435. Unix/Linux is a –––
the MacOS version. (a) Time-sharing operating system
429. The Linux OS was developed by Linus (b) Batch processing operating system
Torvalds in ____. (c) Real time operating system
(a) 1980 (b) 1995 (d) Single-User operating system
(c) 1991 (d) 1988 WBPSC Instructor-18.09.2021
KPSC Jr. Instructor- 09.07.2014 Punjab Wireman instructor-07.07.2013
Ans. (c) : The Linux OS was developed by Linus GSSSB Electronic Instructor-21.01.2014
Torvalds in 1991. Ans. (a) : Unix and Linux is time sharing operating
430. Linux is a/an_________. system allowing multiple individuals at different
(a) Word Processor (b) Language terminals to access the same computer system
Processor simultaneously. In a time-sharing operating system each
(c) Adware (d) System software task uses the CPU in such a way that the response time
UPPCL TG-II, 19-03-2021 (Shift-II) of the CPU is minimized. Each task takes the same
Ans. (d) : Linux is an open source operating system. An amount of time.
operating system is the software that directly manages a 436. In Unix, a process is a
systems hardware and resource, like CPU, that's why it (a) tool (b) daemon
is called system software. (c) running program (d) stderr
431. Linux is a popular web server set of programs- DSSSB Craft Instructor (ESM) 06.10.2019
LAMP where 'A' stands for _______. MP Electrician Instructor 07.11.2016, Morning
(a) Apache (b) Android Ans : (c) In Unix, a process is a running program. The
(c) Adobe (d) Apple operating system tracks processes through a five digit ID
RRB Bengaluru LP-2004 number known as the pid or the process ID. Each process
Ans. (a) : LAMP (Linux, Apache, MySQL, in the system has a unique pid.
PHP/Perl/Python) is an acronym denoting one of the 437. Open SUSE, Fedora, Debian etc are versions
most common software stacks for many of the web's of which of the following GUI based operating
most popular application. Each letter in the acronym systems?
stands for one of its four open source building blocks: (a) Apple iOS (b) Linux
• Linux for the OS (c) MacOS X (d) Windows
• Apache HTTP Server HSSC wireman Instructor -17.12.2019, Shift-I
• MySQL for the relational database management Ans. (b) : Open SUSE , Fedora, Debian, Ubuntu, Mint
system. etc are versions of Linux GUI based operating systems.
• PHP, Perl or Python programming language. 438. Operating system based on Linux are
432. Which of the following options correctly (a) Debian (b) Fedora
describes Linux operating system? (c) Ubuntu (d) All of these
(a) It is only multitasking KPSC Jr. Instructor 22.11.2018
(b) It is only multiprogramming Ans : (d) Operating system based on Linux are Ubuntu,
(c) Multiprogramming, multitasking and multiuser. Debian, Linux Mint, Fedora, Kali Linux, Manjaro, Solus.
(d) It is only multiuser. 439. The default editor that comes with the UNIX
UPPCL TG-II 28-3-2021 (Shift-I) operating system is called:
Ans. (c) : Linux is a multitasking, multiprogramming (a) di editor (b) mi editor
and multiuser operating system. (c) xi editor (d) vi editor
433. Palm operating system is an example of _____. Punjab Wireman instructor-07.07.2013
(a) multiuser/multitasking KPSC Instructor Electronic-25.06.2014
(b) single-user/multitasking Ans. (d) : vi editor is a screen-oriented text editor
(c) single-user/single tasking created for the Unix Operating system. It has two modes
(d) real time command mode: and insert mode. It is known for its
DSSSB Craft Instructor (ESM) 06.10.2019 efficiency and versatility.
MP Electrician Instructor 07.11.2016, Morning 440. Unix is a .......... operating system.
Ans. (c) : The palm operating system is an example of (a) Multiuser and Multi function
single user or single tasking. Palm OS is a discontinued (b) Single user and multi function
(c) Multiuser and single function
mobile operating system initially developed by Palm
(d) Single user and single function
inc. GSSSB Electronic Instructor-21.01.2014
Computer 45 YCT
ye
p
Ans : (a) Unix is a multiuser and multi function (c) (0A + 0D); (0D + 0A)
operating system. (d) (0A); (0A)
GSSSB Electronic Instructor-21.01.2014
Ans. (a) : Different operating system use a different
format of text files. The common formats are Unix and
Windows on Unix, its LF characters (\n, 0A or 10 in
decimal). On Windows, its a sequence of two characters,
CR and LF (\r +\n, 0D + 0A or 13 + 10 in decimal).
447. MS-DOS is an OS that supports _____user
____and ______thread/s.
Unix Architecture (a) single, thread, OS
441. In Unix, an i-node stands for: (b) single, process, single
(a) interim node (b) index node (c) single, process, multi
(c) intermediate node (d) internal node (d) multi, process, multi
HSSC wireman Instructor -17.12.2019, Shift-II UKSSSC Tech. Electrical Instructor-21.11.2017
Ans. (b) : An i-node is an index node. The i-node stores Ans : (b) MS-DOS is an operating system with a
all the metadata of the Linux file system. It will store all command line interface used on PC. MS-DOS does not
the information of the file and directory. An i-node is provide Graphical User Interface (GUI) and does not
unique identifier. accept mouse input. It is a single user process and a
442. What will be the output of the following command? single thread. Single thread process contain the
$cd execution of instruction in a single sequence. In other
(a) Returns to home directory words, one command is process at a time.
(b) Returns to parent directory 448. Which of the following is NOT a version name
(c) Returns to root directory of the MAC operating system?
(d) Returns to child directory (a) Catalina (b) Sierra
HSSC Electrician Instructor -17.12.2019 (c) Mojave (d) Blue
Ans : (a) The $cd command will allow you to change GSSSB Supervisor Electronic Instructor 18.01.2014
directories. To move around the file system you will use cd. Ans. (d) : MAC OS is an Unix operating system
1. To navigate into the root directory, use "cd/". developed by American computer company apple Inc.
2. To navigate to your home directory, use "cd" or "cd~" Blue is not a version name of the MAC OS. The latest
3. To navigate up one directory level, use "cd.." version of MAC release on 26 October 2023.
4. To navigate to the previous directory (or back)use "cd–" 449. Which of the following is not an essential
443. Which of the following is the core part of Linux feature of the operating system?
and is responsible for all major activities? (a) File management
(a) Editor (b) GUI (b) Download management
(c) Shell (d) Kernel (c) Process management
UPPCL (TG-II) 24-01-2019 (EVENING) (d) Memory management
Ans. (d) : The Kernel is the core part of Linux operating MP Electrician Instructor 07.11.2016, Morning
system and serves as the main interface between the Ans : (b) Download management is not a function of
computers physical hardware and processes running on it. the operating system. Operating system is a type of
444. In Unix system, a static library is created using system software. Which is acts as an interface between
the ______ instruction. hardware and software. It is a platform for application
(a) ar (b) ping software on which they are installed. The operating
system controls the functioning of the computer and its
(c) ps (d) creat
Punjab Wireman instructor-07.07.2013
various resources some of its main feature are–
• Memory management • Process management
Ans : (a) In Unix system, a static library is created
using the ar instruction. • Device management • File management
• Job scheduling
445. Using which of the following commands, will
all the source files be archived to build a static • Security
library in Unix? 450. In disk scheduling algorithms, FIFO stands for
(a) Sl (b) Arl _____.
(c) ar (d) Sll (a) Few In Few Out
KPSC Instructor Electronic-25.06.2014 (b) First In First Out
Ans. (c) : Using ar command all the source file will be (c) Frequently In Frequently Out
archived to build a static library in Unix. (d) Fast In Fast Out
446. For text files to signify the end of line, Unix WBPSC Instructor-18.09.2021
uses _________ and Windows uses_______ for Ans : (b) First in, first out (FIFO), also known as first
the same purpose. Note that the values come, first served (FCFS), is the simplest scheduling
indicated within parenthesis are in hex. algorithm. In this type of scheduling algorithm, the CPU
(a) (0A); (0D + 0A) is first allocated to the process which requests the CPU
(b) (0D); (0D + 0A) First.
Computer 46 YCT
ye
p
451. Which of the following is an intermediate 456. Which one of the following is not property of
system software through which programmers interpreter?
convert high-level language programming into (a) An interpreter takes each source line to
machine - level language code? interpret each execution
(a) Firmware (b) Device drivers (b) Interpreters are slower than compilers
(c) Utilities (d) Language translator (c) Interpreters are basically translator
RRB Kolkata LP-2009 (d) Interpreter takes source files and creates an
Ans. (d) : Translator is a program processor that object file
converts a computer program from one language to RRB Bengaluru LP-2004
another. It takes the program written in source code and Punjab Wireman instructor-07.07.2013
converts it into a machine program. HSSC Electrician Instructor -17.12.2019
Like - Compiler, Interpreter, Assembler. Ans : (a) An interpreter not takes each source line to
452. ____ converts High level language into interpret each execution.
machine language and execute it in one go. • An interpreter is small program compare to compiler.
(a) Assembler (b) Interpreter 457. Which of the following is an example of
(c) None of these (d) Compiler application software?
RRB Gorakhpur L.P.-2008 (a) Email clients (b) Device driver
GSSSB Electronic Instructor-22.01.2017 (c) BIOS (d) Boot program
GSSSB Supervisor Electronic Instructor 18.01.2014 UKSSSC Tech. Electrical Instructor-21.11.2017
Ans. (d) : A compiler is a computer program that change KPSC Jr. Instructor- 09.07.2014
source code written in a high-level language into low-level Ans. (a) : Email clients is an example of application
machine language and execute it in one go. The term software. Device driver, BIOS and boot program all
compiler was coined by American computer scientist Grace these are example of system software.
Hopper, who designed one of the first compiler in the early 458. Which of the following application software is
1950. a monitoring program that allows the user to
453. Which among the following is not a hardware? observe without performing it?
(a) Assembler (b) Printer (a) Simulation (b) Word Processing
(c) Magnetic Tape (d) VDU terminal (c) Web browser (d) Presentation
UKSSSC Tech. Electrical Instructor-21.11.2017 KPSC Instructor Electronics Mech.20.07.2018
Ans. (a) : An assembler converts assembly level Ans. (a) : Simulation is an attempt to model a real - life
language code into machine language code. or imaginary situation on a computer in order to study
454. In operating system/compiler parlance, RTL how the system works.
stands for 459. What is the use of bulk email software?
(a) Run-Time Library (a) To send an email to a couple of people
(b) Real-Time Load (b) To send an email in large numbers
(c) Register Transistor Logic (c) To send an email with large-sized media files
(d) Random Time Locks (d) To send an email with a large number of
RRB Gorakhpur L.P.-2008 media files
Ans : (a) The runtime library is primarily the software it GSSSB Electronic Instructor-22.01.2017
consist of many different programs or functions that are Ans. (b) : Bulk email software is a type of software
commonly used in various programs. At program designed to sent a large number of emails to a list of
runtime, the respective runtime library or function is recipients simultaneously. It is commonly used for
loaded in the memory. email marketing newsletters and other communications
455. An Interpreter translates program into purpose.
machine code:- 460. Which of the following is NOT a text editor?
(a) Not responsible for translating (a) Notepad
(b) Entire program at once (b) Visual Studio Code
(c) One line at a time (c) Snipping Tool
(d) One module at a time (d) Sublime Text
UPPCL Technical Grade-II-09.08.2015 HSSC wireman Instructor -17.12.2019, Shift-II
Punjab Wireman instructor-07.07.2013
Ans. (c) : An interpreter translates program high level
language to machine level language line-by-line. If an Ans. (c): Notepad, Visual Studio Code and Sublime
error is found on any line the execution stop till it is Text are popular text editor while snipping tool is a
corrected. Microsoft windows screenshot utility included in
windows vista and later. It can take still screenshots of
an open window, rectangular areas, a free form area, or
the entire screen.
461. What is Sublime Text?
(a) A photo editor for text formatting
Interpreter is executed line by line which helps users to (b) Font family with various text inputs
find error easily. It is take more time compare to (c) An office automation tool for text,
compiler. documents and images
Computer 47 YCT
ye
p
(d) A sophisticated text editor for code markup Ans : (b) Notepad is a basic text editor, it creates and
and prose. edits plain text of document developed by microsoft.
KPSC Instructor Electronic-25.06.2014 Text editors are used to create programs edit the source
Ans. (d) : Sublime Text is a shareware text and source code of programming language and edit HTML page.
code editor available for Windows. MacOS and Linux. 467. CAD stands for
It natively supports many programming Languages and (a) Computer Aided Design
markup languages users can customize it with themes (b) Computer Application in Design
and expand its functionality with plugins. (c) Computer Algorithm Design
462. Which of the following is NOT a text editor (d) None of these
used for programming? (UPPCL TG-2 26.06.2016)
(a) Rocket (b) Sublime Tex Ans : (a) CAD stands for computer aided design CAD is
(c) Visual Studio Code (d) Atom the use of computer based software to aid in design
HSSC wireman Instructor -17.12.2019, Shift-II processes. computer aided design is a way to digitally
Ans. (a) : A text editor is a software application used to create 2D and 3D drawings models of real-world product.
write and edit code. 468. Which of the following is a special purpose
Some popular text editors: - application software?
• Visual Studio code (a) Windows
• Subline text (b) Payroll system
• Atom (c) Database management system
• Notepad ++ (d) Linux
• Vim UPPCL (TG-II) 24-01-2019 (EVENING)
•Emacs Ans : (b) Payroll system is a special purpose application
• Atom software, this software has all the things that are
463. Which of the following options best describes required to pay the salary and taxes of the employees.
the truth of the following statement? 469. Which shortcut keys are used to move the cursor
(i) Word-processing software is system to the beginning of the next word in Notepad?
software. (a) Ctrl + Left arrow (b) Ctrl + up arrow
(ii) Notepad is a word processing software. (c) Ctrl + Down arrow (d) Ctrl + Right arrow
(a) (i)-True, (ii)-False (b) (i)-False, (ii)-False UPPCL Technical Grade-II-26.06.2016
(c) (i)-False, (ii)-True (d) (i)-True, (ii)-True HSSC wireman Instructor -17.12.2019, Shift-I
UPPCL TG-II 19-03-2021 (Shift-II) Ans : (d) Ctrl + Right arrow shortcut keys are used to
Ans. (c) : Word processing software is an application move the cursor to the beginning of the next word in
software hence statement (i) is false. Notepad is a word Notepad, Word pad and Word.
processing software hence statement (ii) is true. 470. Which shortcut key is used to enter the
464. Which of the following software collects current time and date in a document created
information from a computer and transmits it using Notepad?
to Man-in-the-middle? (a) Ctrl + F5 (b) Shift + F5
(a) Fork Bomb (c) F6 (d) F5
(b) Boot Sector Virus HSSC wireman Instructor -17.12.2019, Shift-II
KPSC Jr. Instructor 22.11.2018
(c) Memory Resident Virus
(d) Spyware Ans : (d) F5 keys used to insert current date and time
UPPCL JE 31-01-2019 (Batch-02) in Notepad.
Ans: (d) Spyware is a type of Malware that tries to 471. Which shortcut key is used for find and
keep itself hidden while it secretly records information replace in notepad?
and tracks your online activities on your computers. (a) Ctrl + R (b) Ctrl + F
Spyware installed on your device without your (c) Ctrl + H (d) Ctrl + S
knowledge or permission. KPSC Jr. Instructor 22.11.2018
Punjab Wireman instructor-07.07.2013
465. Which of these is an Anti-Virus software?
(a) Avira (b) LYFcare Ans : (c) Ctrl + H shortcut key is used in Notepad for
(c) Hangouts (d) Xender display the replace dialog box, to find and replace text.
WBPSC Instructor-18.09.2021 472. The Microsoft Paint program is used for
Ans. (a) : Avira operations GmbH&Co. KG is a ______.
German multinational computer security software (a) calculations (b) saving text
company mainly known for their antivirus. (c) presentations (d) drawing pictures
466. Which of the following Windows application KPSC Instructor Electronic-25.06.2014
allows you to edit text files? GSSSB Electronic Instructor-21.01.2014
(a) Files and settings transfer Wizard Ans : (d) The Microsoft Paint program is used for
(b) Text editor drawing picture. Microsoft paint is a simple raster
(c) Windows explorer graphics editor. The program opens and saves file in
(d) Internet explorer windows bitmap, JPEG, GIF, PNG and single-page
RRB Gorakhpur L.P.-2008 TIFF Formats.
Computer 48 YCT
ye
p
473. In MS Paint, the text tool option in the menu 480. ______ is a memory management scheme that
has got the letter____on it. helps the programmer to visualize the memory.
(a) B (b) T (c) C (d) A (a) Segmentation (b) Virtual Addressing
UPPCL Technical Grade-II-09.08.2015 (c) Paging (d) Demand paging
RRB Bengaluru LP-2004 KPSC Instructor Electronic-25.06.2014
Ans : (d) We can write text in any image using the text Ans : (a) Segmentation is a memory management
tool given in the Home tab of MS paint, it is represented scheme that supports the programmer view of memory
by the English letter A in the Home tab. to the programmer.
474. Software package which provides advertisements 481. Which of the following is NOT antivirus software?
is called? (a) Norton (b) McAfee
(a) Spam (b) Adware (c) Cobol (d) Kaspersky
(c) Spyware (d) Malware GSSSB Electronic Instructor-21.01.2014
(UPPCL TG2 11-11-2016) Ans. (c) : Cobol is a high-level programming language.
Ans : (b) Adware or advertising supported software, is Cobol stands for common business oriented language. It
software that displays unwanted advertisements on your is imperative, procedural and object- oriented.
computer.
482. Anti-virus software must be regularly updated
475. Which shortcut key is used to access the help else:-
option in Notepad? (a) New viruses wouldn’t be recognized
(a) F2 (b) Ctrl + F1
(b) None of these
(c) Ctrl + F2 (d) F1
DSSSB Craft Instructor (ESM) 06.10.2019
(c) Software will become corrupt
MP Electrician Instructor 07.11.2016, Morning (d) Both of these
UKSSSC Tech. Electrical Instructor-21.11.2017
Ans : (d) The F1 to F12 keys are called enhanced
function keys. Ans. (a) : Anti-virus software must be regularly
F1 → Open the help option in Notepad. updated because computers are regularly threatened by
new viruses. The anti-virus updates contain the latest
476. Which one of the following is system software? files needed to combat new viruses and protect your
(a) Adobe Reader (b) MS-Office computer.
(c) Printer driver (d) Web browser
WBPSC Instructor-18.09.2021 483. A malware that secretly collects information
about users without their consent is called:-
Ans. (c) : System software is a type of computer
software that acts as an intermediary between the (a) Spyware (b) Virus
hardware of a computer and the application software (c) Bootware (d) Adware
that users interact with. System software includes GSSSB Supervisor Electronic Instructor 18.01.2014
operating systems, utility programs, device drivers and Ans. (a) : Spyware is a type of malicious software that is
system libraries. installed on your computer or mobile device without your
477. Which of the following is not antivirus consent. It can gain access to your sensitive personal
software? information and forward it to a third party without your
(a) Symantec Norton (b) FileZilla consent.
(c) Kaspersky (d) McAfee 484. Which of the following is not an example of
HSSC wireman Instructor -17.12.2019, Shift-I utility software?
Ans. (b) : FileZilla is a free open source file transfer (a) Anti-virus (b) Backup Software
protocol that allows its user to setup an FTP server or (c) Browser (d) Disk tools
connect to another FTP server to exchange files. (UPPCL TG2 11-11-2016)
Whereas Symantec Norton, Kaspersky and McAfee are Ans : (c) Browser is not an example of utility software.
an antivirus software. It is an application software.
478. How many different types of paint brushes are
there in MS Paint? VI. Programming Languages
(a) 7 (b) 8 (c) 9 (d) 10
KPSC Jr. Instructor 22.11.2018 485. Which of the following statements is/are false?
Ans : (c) 9 types of paint brushes available in MS Paint. (i) Compiler generates executable codes.
479. Which of the following is a compression (ii) Assembler can be used to translate high
software? level language code into machine code.
(a) WinZip (b) Windows 7 (a) Neither (i) nor (ii) (b) Only (i)
(c) MS-Word (d) Acrobat writer (c) (i) and (ii) both (d) Only (ii)
UPPCL TG-II 19-03-2021 (Shift-II) GSSSB Electronic Instructor-22.01.2017
Ans. (a): Some important file compression software list– Punjab Wireman instructor-07.07.2013
1. WinZip KPSC Jr. Instructor 22.11.2018
2. WinRAR Ans. (d) : The compiler converts high-level language
3. 7 Zip into machine language and executes the entire code
4. Zip Archiver program in one go.
5. Pea Zip An assembler is a kind of language processor. It is used to
6. Bandizip translate the assembly language into machine language.
Computer 49 YCT
ye
p
486. Which of the following functions are performed Ans. (*) : Every value belongs to a specific data type in
by a user interface? Python. Data type identifies the type of data values a
(i) Accepting user input variable can hold and the operations that can be
(ii) Displaying output performed on that data. The following figure enlists the
(a) Both (i) and (ii) (b) Neither (i) and (ii) data types available in Python.
(c) Only (ii) (d) Only (i)
KPSC Instructor Electronic-25.06.2014
Ans. (a) : A user interface enables the user to interact
with a system or application.
A user interface accepts input from the user and
displays output.
487. Which of the following codes provides a way
through which an individual character can be Note:- UPPCL has considered option (b) as the answer
represented in the form of web pages, text files to this question.
and other documents, which can be used to 491. Find the correct output of the following
represent characters from all languages around program snippet.
the world? import numpy
(a) Unicode (b) Extend ASCII sDATA =[34, 56, 78, 34, 93, 102, 34, 75]
(c) ASCII (d) Binary print (numpy.median(sDATA))
GSSSB Electronic Instructor-21.01.2014 (a) 102 (b) 66.5 (c) 67 (d) 65.5
Ans. (a) : The Unicode standard provides a unique HSSC Electrician Instructor -17.12.2019
number for every character, no matter what platform, KPSC Jr. Instructor 22.11.2018
device, application or language. It has been adopted by Ans. (d) : The given program snippet imports the
all modern software providers and now allows data to 'numpy' library and defines a list called 'sDATA'
be transported through many different platform, devices containing a set of numbers. It then calculates and prints
and applications without corruption. the median of the numbers in the 'sDATA' list using
488. Which of the following scientists introduced the 'numpy.median'.
concept of stored program? Steps of calculate the median -
(a) Sophie Wilson (b) John von Neumann 1. We need to sort the list in ascending order : [34, 34,
(c) Judea Pearl (d) Claude Shannon 34, 56, 75, 78, 93, 102].
GSSSB Electronic Instructor-21.01.2014 2. Since there are 8 numbers in the list, which is an even
GSSSB Electronic Instructor-22.01.2017 number, the median will be the average of the two
KPSC Jr. Instructor- 09.07.2014 middle values, which are 56 and 75.
RRB Bengaluru LP-2004 3. The median is (56 + 75)/2 = 131/2 = 65.5
Ans. (b) : The idea was introduced in the late 1940s by So, the correct output of the program is 65.5.
John von Neumann, who proposed that a program be 492. Python is a/an ______ programming language
electronically stored in binary - number format in a that supports ____ programming.
memory device so that instructions could be modified (a) high-level; object-oriented
by the computer as determined by intermediate (b) machine-level; functional
computational results. (c) low-level; high-level
489. What is the output of the following Python (d) assembly-level; object-oriented
print statement? Punjab Wireman instructor-07.07.2013
print (hex(127)+oct(132)) Ans. (a) : Python is a high-level, versatile and
(a) 790203 (b) Oo2030x790 dynamically typed programming language known for its
(c) 203790 (d) 0x7f0o204 readability and ease of used and that supports object-
DSSSB Craft Instructor (ESM) 06.10.2019 oriented programming. It was created by Guido Van
MP Electrician Instructor 07.11.2016, Morning Rossum and first released in 1991.
Ans. (d) : The given Python print statement print 493. Find the correct output of the following
(hex(127) + Oct (132)) program snippet.
Here's 'hex (127)' converts the decimal number 127 to
its hexadecimal representation, which is '0x7f'. And 'oct import numpy
(132)' converts the decimal number 132 to its octal sDATA = [34, 36, 34, 36]
representation, which is '0o204'. So, when you print(numpy. std(sDATA))
concatenate them using '+', you get '0x7f0o204'. The (a) 1 (b) –2 (c) 2 (d) 0
output of the this Python print statement would be KPSC Instructor Electronic-25.06.2014
'0x7f0o204'. Ans. (a) : The Given Python program snippet calculates
490. Python does NOT have _____ as a basic data the standard deviation of the 'sDATA' list using the
type. 'numpy.std' function from the Numpy library. The
(a) integer (b) list standard deviation of the 'sDATA' list, which contains
(c) complex (d) Boolean the values [34, 36, 34, 36] is approximately 1. 0.
WBPSC Instructor-18.09.2021 The actual output might be a decimal number, but it will
HSSC wireman Instructor -17.12.2019, Shift-II be around 1.
Computer 50 YCT
ye
p
494. How many correct statements in regard to a Ans. (c) : JSON stands for JavaScript Object Notation,
CSS framework scenario are given below? is a light weight data- interchange format. It is easy for
1. A CSS framework is used for advanced humans to read and write and it is easy for machines to
visual elements. parse and generate.
2. A CSS framework helps in quick 498. What is an algorithm NOT?
generation of a UI. (a) A graphical representation of programming
3. Bootstrap is a CSS framework. logic
(a) 2 (b) 3 (c) 1 (d) 0 (b)A step-by-step procedure to solve the problem
GSSSB Electronic Instructor-21.01.2014 (c) A pseudo code the program
UKSSSC Tech. Electrical Instructor-21.11.2017 (d) Easy to debug
RRB Kolkata LP-2009 Punjab Wireman instructor-07.07.2013
Ans. (b) : A CSS framework is a pre-designed set of Ans. (a) : Algorithm is a set of finite rules or
CSS rules and styles that you can use to expedite and instructions to be followed in calculations or other
standardize the process of styling web pages. It is used problem solving operations.
for advanced visual elements. It helps in quick Algorithm support step by step procedure to solve the
generation of a User Interface (UI). Popular CSS problem, Easy to understands and debug, It is easier for
frameworks include Bootstrap, Foundation, and Bulma. the programmer to convert it into an actual program.
495. In Python, modules are simply files with the Flow chart is a graphical representation of programming
'________' extension, containing Python code logic hence option (a) is not related to algorithm.
that can be imported inside another Python 499. In Web Designing and Publishing, what does
programme. CSS stand for?
(a) .lst (b) .txt (c) .py (d) .dat (a) Cascading style systems
RRB Gorakhpur L.P.-2008 (b) Cascading style sheets
DSSSB Craft Instructor (ESM) 06.10.2019 (c) Colorful share sheets
Ans. (c) : In Python, the module contains definitions and (d) Colorful style systems
implementations of classes, variables and functions that UPPCL Technical Grade-II (Shift-II) 20.03.2021
can be used inside another program. These modules are KPSC Jr. Instructor- 09.07.2014
simply files with the '.py' extension containing Python Ans. (b) : CSS stands for Cascading Style Sheet. It is a
code that can be imported inside another Python program. language used to describe the presentation of a
The name of the Python file becomes the module name. document written in a markup language such as HTML.
496. Identify whether the following statements are CSS is used to control the appearance of HTML
true or false. element Such as the Font, color, size and spacing of text
i) In the Python language, tuples are data the Background color of page and layout.
type that belongs to the sequence data type 500. With reference to the sequence data types of
category. Python, ____ is a sequence of items separated by
ii) Sequence data types are used to store data commas and items are enclosed in parenthesis().
in containers in the Python computer (a) Tuple (b) String
language. (c) List (d) Flow
iii) In Python, strings are arrays of bytes HSSC wireman Instructor -17.12.2019, Shift-I
representing Unicode characters. Ans. (a) : A tuple is a built in python data structure that
(a) i-True, ii-True, iii-True stores multiple comma - separated values. Tuples are an
(b) i-True, ii-False, iii-True immutable sequence type that can store value of any
(c) i-False, ii-True, iii-True data type. It is defined by enclosing elements in
(d) i-False, ii-True, iii- False parenthesis.
MP Electrician Instructor 07.11.2016, Morning 501. Which among the following is NOT an
WBPSC Instructor-18.09.2021 arithmetic operator in python?
Ans. (a) : Tuples are data type that belongs to the (a) not in (b) Floor division
sequence data type category. They are similar to lists in (c) Exponent (d) Modulus
Python language. The different types of containers used HSSC wireman Instructor -17.12.2019, Shift-II
to store the data are List, Tuple and String. In this KPSC Jr. Instructor 22.11.2018
container, sequence data types are used to store data in Ans. (a) : Arithmetic operators are used in python to
the Python computer language. Strings in Python are perform mathematical operations such as addition
arrays of bytes representing unicode characters. Hence subtraction, multiplication, and division python has the
all statements are true. following types of arithmetic operators. They are
addition, subtraction, division; modulus, exponentiation,
497. Python allows using the popular data and flour division, not in operator is a member operator
interchange format called JSON. What does not arithmetic operator in python language.
JSON stand for?
(a) Java Server Open Notation 502. In any language sequential flow of the
(b) Java Server Object Notation statement is default, A part from sequential
(c) JavaScript Object Notation there are types of flow of execution available
(d) JavaScript Open Navigation which are?
HSSC wireman Instructor -17.12.2019, Shift-II A. Conditional
KPSC Jr. Instructor 22.11.2018 B. Looping
Computer 51 YCT
ye
p
(a) Only A (b) Only B Ans : (c) Float data types contains decimal values. For
(c) Neither A nor B (d) Both A and B example 35.3, – 2.34 or 3597.3498...... etc. the type of float
HSSC Electrician Instructor -17.12.2019 to choose, depends on the value the variable has to store.
KPSC Instructor Electronics Mech.20.07.2018 508. Which of the following enables us to pass data
Ans. (d) : The flow of execution basically refers to the between a program and a class?
order in which statements are executed. Execution (a) Functions (b) Properties
always begins at the first statements of the program. (c) Procedures (d) Variables
Hence conditional and looping are low of execution of DSSSB Craft Instructor (ESM) 06.10.2019
the program which decides the flow. RRB Kolkata LP-2009
503. With reference to file processing in python, Ans. (b) : Properties in a program are a special type of class
identify the correct order of file operation? member in Object-Oriented Programming Languages.
A. Read or write- Performing operation Similar in syntax to fields for reading and writing properties
intermediate in functionality between a field and a method,
B. Open a file but translating properties, it is called by setter & getter
C. Close a file properties, it is called by Setter & Getter method.
(a) C, A, B (b) B, C, A Properties are attributes or features that characterise
(c) A, B, C (d) B, A, C classes. While classes are groups of objects, an instance
GSSSB Electronic Instructor-22.01.2017 is a specific object that actually belongs to a class.
Ans. (d) : In the context of file processing a python. a 509. _______ is a program that is being executed.
file operation occurs in the following order open a file, (a) Process (b) Knowledge
read or write operation, close a file so the correct order (c) Information (d) Data
well be (B, A, C) according to given option. UPPCL TG-II 25-01-2019 (Morning)
504. CSS stands for: Ans : (a) Process is a program that is being executed it
(a) Creative Style Sheets contains many instructions.
(b) Cascading Style Sheets 510. In programming languages, one set of names
(c) Cascading Style Structure can be kept different from other sets using
(d) Cascading Style Sets (a) Identifiers (b) Namespaces
KPSC Jr. Instructor- 09.07.20148 (c) Packages (d) Directories
Ans. (b) : CSS stands for Cascading Style Sheets. MP Electrician Instructor 07.11.2016, Morning
WBPSC Instructor-18.09.2021
• CSS is the language we use to style an HTML
document. Ans. (b) : A namespace is used to uniquely identify
one or more names from other similar names of
• CSS describes how HTML elements should be different objects groups or the namespace in general
displayed. namespace makes it possible to distinguish objects with
505. A set of instructions is called similar names but different origins.
(a) Script (b) Extension 511. A/An ______ is a step-by -step procedure which
(c) Flowchart (d) Program defines a set of instructions to be executed in
KPSC Instructor Electronics Mech.20.07.2018 certain order to get the desired output.
Ans. (d) : A set of instructions is called Program. (a) order (b) protocol
Where as in computer programming, a script is a (c) sequence (d) algorithm
program or sequence of instructions that is interpreted HSSC wireman Instructor -17.12.2019, Shift-I
by a program other than the computer processor. The Ans. (d) : An algorithm is a step-by-step procedure,
extension indicates that the related file can be opened which defines a set of instructions to be executed in a
on which application of a file. certain order to get the desired result or output.
506. Which of the following statements is used to Algorithms are generally created independent of
make a selection from more than two choices? underlying languages and used for solving a problem or
(a) if-else (b) switch performing a computation. Algorithm acts as an exact
(c) else-if (d) None of these list of instructions.
GSSSB Electronic Instructor-22.01.2017 512. Which of the following terms is defined by "A
Ans : (b) The Switch statement is similar to ''if ........ step by step description of how to arrive at a
else'' in that it is used when we need to execute a block solution to a given problem"?
of code based on case value the term ''Switch'' is (a) Algorithm (b) Program
sometimes used to refer to the modern or efficient (c) Software (d) Hardware
KPSC Jr. Instructor 22.11.2018
version of the ''if ..... else if .... else'' statement because
instead of writing multiple if ....... else conditions. we Ans. (a) : An algorithm is a technique in which the
can put the expression in one place and match and steps of a program are written in sentence to write the
execute a block of code based on the value evaluated by logic or method of the program. The algorithm of
the expression. program is in the form of a series of sentence. This
507. Which of the following data types contains category is made in such a way that if we write the
decimal values? instruction of the programming language relative to the
(a) Date (b) Character sentence of that category and execute them in the
(c) Float (d) Integer sequence mentioned in the algorithm, then we will get
RRB Bengaluru LP-2004 the solution to computer program problem.
Computer 52 YCT
ye
p
513. Which of the following properties of an Ans : (b) Assembly language is the only language that
algorithm ensures that each step of the can be read directly by the computer, for which
algorithm is properly defined and the actions to mnemonic codes are required.
be performed are clearly specified? 518. Which of the following is used to store date and
(a) finiteness (b) Effectiveness time with milliseconds and time zone?
(c) Input and Output (d) Definiteness
HSSC Electrician Instructor -17.12.2019
(a) int (b) date
(c) float (d) timestamp
Ans. (d) : An algorithm is a step by step approach to
UKSSSC Tech. Electrical Instructor-21.11.2017
solve a problem. A step represents one operation.
Algorithms have characteristics such as definiteness this Ans : (d) Timestamp is used to store date and time with
algorithm can be written in fixed time & less space. millisecond and time zone.
514. Which among the following is/are benefits of 519. In------instructions are written in 0 and 1
flowchart? (a) C- Lanuage
A. Makes Communication Better (b) Machine Language
B. Effective Analysis (c) Java
C. Simplifies the Logic (d) Visual Basic
(a) Both C and B (b) Both A and C UPPCL Technical Grade-II (Shift- II) 27.03.2021
(c) Both A and B (d) All of the options
Ans : (b) The language used for computer programs in
KPSC Jr. Instructor 22.11.2018
Punjab Wireman instructor-07.07.2013 which instructions are written in the form of numbers so
that the computer can understand them and act
Ans. (d) : Flow-Chart is a type of pictorial diagram
accordingly is called machine language. Instruction in
which represents to algorithm work process.
machine language are written in 0’s and 1's.
Benefits of flowchart–
(1) Flow charts are better way of communication the 520. Which of the following translates a program
logic of the system. written in high-level language into machine
(2) Using Flow chart problem can be analyzed more code?
efficiently. (a) Assembler (b) Compiler
(3) The Flow chart helps in debugging and testing process. (c) Convertor (d) Translator
Demerits of Flowchart– KPSC Instructor Electronics Mech.20.07.2018
(1) It is a time consuming process. Ans. (b) : Compiler is a special program that converts
(2) Difficult to understand for people who don't know source code written in high level language. The code
flowchart symbols. converted into machine language is known as object
515. With respect to OLE, ______ Establishes a code.
connection between two objects, and _____ 521. ______ Language is not a high level language .
puts data into the application.
(a) Embarking, Learning (a) Pascal (b) Java
(b) Linking, Embedding (c) Assembly (d) C
(c) Embedding GSSSB Electronic Instructor-22.01.2017
(d) Linking, Embarking. Ans : (c) Assembly language is not a high level language.
UPPCL TG-II 25-01-2019 (Morning) It is a computer language, in other words that computer
Ans : (b) OLE Means that objects created from programming language in which alphabets or symbols are
different formats that can be linked and embedding used in place of digital symbols used in machine language.
application data. OLE is a mechanism that allows users Assembly language is called symbol language.
to create and edit documents containing items or 522. Which of the following statement(s) is/are true
objects. created by multiple application. about programming languages?
516. Which of the following language can a (i) Assembly language is not machine
computer understand directly? dependent.
(a) Low-level (b) Medium level (ii) Python is a low-level programming
(c) High-level (d) Object level language.
KPSC Instructor Electronic-25.06.2014 (a) Neither (i) nor ( ii) (b) Only (ii)
Ans. (a) : A low level language is machine friendly (c) Both (i) and (ii ) (d) Only ( I )
language. A computer can understand it easily. It needs KPSC Jr. Instructor- 09.07.2014
assembler for translation.
Low Level Language are machine dependent and thus Ans. (a) : Assembly language is a type of low-level
very difficult to understand by a normal user. Some programming language. Whose purpose is to
examples of low level languages include the machine communicate directly with the computer hardware.
languages and assembly language. Assembly language statements translate a single line of
517. Mnemonics codes (as symbolic codes) are used text into a machine instruction. Python is an interactive,
in ______. object-oriented and high-level programming language.
(a) Machine Code (b) Assembly Language Guddo was created by Bane Rossum (fuido van
(c) Scripting (d) TCP/IP Protocol Rassum) during the 19th century. It was developed
GSSSB Electronic Instructor-21.01.2014 during 1985-1990 AD.
Computer 53 YCT
ye
p
523. Match the columns 527. Which of the following is an example of a fifth
Programming Their Types generation programming language?
Languages (a) FOCUS (b) PROLOG
(i) C++ (a) Markup (c) FORTRAN (d) SQL
MP Electrician Instructor 07.11.2016, Morning
(ii) HTML (b) Procedural Ans. (b) : PROLOG stands for "Programming in Logic".
(iii) C (C) Object oriented It is a high - level programming language often used for
(a) A.(i)-(c),(ii)-(b),(iii)-(a) artificial intelligence and symbolic reasoning language.
(b) B.(i)-(c),(ii)-(a),(iii)-(b) FORTRAN is the first high - level programming language
(c) C.(i)-(a),(ii)-(b),(iii)-(c) developed by John Backus in 1957. It is used for numerical
(d) D.(i)-(a),(ii)-(c),(iii)-(b) calculations and scientific computing.
UPPCL Technical Grade-II (Re-exam) 16.10.2016 528. The Python interpreter prompt consist of ___
Ans. (b) : C++ is an object-oriented programming '>' symbol(s).
language, which gives a clear structure to the program (a) 3 (b) 2 (c) 0 (d) 1
and allows code to be reused. C++ is portable and is KPSC Jr. Instructor 22.11.2018
used to develop such applications that are adapted for Punjab Wireman instructor-07.07.2013
multiple platforms. Ans. (a) : The Python interpreter prompt, often referred
C ⇒ The C programming language is a procedural and to as the Python REPL (Read-Eval-Print-Loop), is an
general-purpose language that provides low-level access interactive command line interface where you can enter
to system memory. It was developed in the 1970s by python code and immediately see the results. Python
Dennis Ritchie. interpreter consists of 3 '>' symbols. It is represented by
HTML - The full form of HTML is Hyper Text Markup ">>>".
Language. HTML is the standard markup language for 529. If a = –1 and b = 1, then what will be the output
creating web pages. HTML describes the structure of a of 'Print (a ^ b)' ?
web page. (a) 0 (b) 2 (c) 1 (d) –2
524. Which of the following is an example of KPSC Instructor Electronic-25.06.2014
procedural language? Ans. (d) : The expression "a ^ b" typically represent the
(a) C++ (b) Python XOR (Exclusive OR) operations in many programming
(c) Ruby (d) C languages. It compares corresponding bits of two
DSSSB Craft Instructor (ESM) 06.10.2019 integers XOR returns 1 for each position where the bits
UKSSSC Tech. Electrical Instructor-21.11.2017 differ and 0 where they are the same.
Punjab Wireman instructor-07.07.2013 Given a = –1 and b = 1, their binary representation are -
Ans. (d) : C is the procedural language and example of a (binary) = 1111 (due to – 1's two's complements
computer procedural language are BASIC, FORTRAN, representation)
and Pascal. b (binary) = 0001
525. Which of the following statements is/are Apply Bitwise XOR operator -
correct about the Python programming a ^ b =1 1 1 1
language?
(i) It supports OOP concept. 0 0 01
(ii) It is a low programming language. 1 1 1 0
(a) Neither (i) nor (ii) (b) Both (i) and (ii) Use (1110) two's complement
(c) Only (ii) (d) Only (i) a ^ b = 0010
WBPSC Instructor-18.09.2021 so, the output of "print (a ^ b)' is –2.
Ans. (d) : Python is a high - level, general purpose 530. Which of the following points is/are valid for
programming language know for its simplicity and the Python programming language?
readability. It was created by Guido van Rossum and first Points:
released in 1991. It supports multiple programming i) An interpretation-based language
paradigms, including procedural. Object-Oriented (OOP)
ii) An object-oriented language
and functional programming. So statement (i) is correct.
iii) A high-level programming language
526. Which of the following was developed by iv) A machine-dependent language
Google as an efficient, readable and secure (a) Only i (b) All of i, ii, iii and iv
language for system - level programming? (c) Only i and ii (d) Only i, ii and iii
(a) Swift (b) Python GSSSB Electronic Instructor-21.01.2014
(c) C++ (d) Golang
Ans. (d) : Python is interpreted, object oriented,
HSSC wireman Instructor -17.12.2019, Shift-I structured and functional language that comes under
Ans. (d) : Go, often referred to as Golang is a statically high level programming language. The code of Python
typed, compiled programming language developed by is executed directly by an interpreter without
Google. It is efficient, readable and secure for system compilation that is known as Python is platform or
level language. machine independent language.
Computer 54 YCT
ye
p
531. What is the expected output of the following (a) Only i and iii (b) All of i, ii and iii
Python Programme? (c) Only i (d) Only i and ii
def my_function (fname): RRB Kolkata LP-2009
print(*fname + "Refsnes") Ans. (b) : In Python, a module is a file containing
my_function("Emil") Python definitions and statements. A module can define
my_function ("Tobias") functions, classes and variables. A module can also
my_function("Linus") include runnable code. A module will be a Python script
(a) E m i l R e f s n e s or a package that has some functions or methods
TobiasRefsnes available like 'random'. Hence all statements are true.
LinusRefsnes 534. What is the expected output of the following
(b) Emil Refsnes Python code?
Tobias Refsnes import numpy as npymat
Linus Refsnes temparr=npymat.array([[1, 2, 3],
(c) *Emil Refsnes [4, 2, 5]])
*Tobias Refsnes print("No. of dimensions:", temparr.ndim)
* Linus Refsnes print(''Shape of array:", temparr.shape)
(d) * E m i l R e f s n e s print("Size of array:", temparr. size)
*T o b i a s R e f s n e s (a) No. of dimensions: 2
*L i n u s R e f s n e s
Shape of array: (2, 3) size of array: 6
UKSSSC Tech. Electrical Instructor-21.11.2017
KPSC Instructor Electronics Mech.20.07.2018 (b) No. of dimensions: 2
Ans. (a) : Inside the parentheses, arguments are specified Shape of array: (2, 3) size of array : 2
after the function name (here fname). Information can be (c) No. of dimensions: 1
passed into the function as arguments. You can add as Shape of array: (2, 3) Size of array : 6
many arguments as you want, just by separating them with (d) No. of dimensions: 2
a comma. When the function fname is called, we pass Shape of array: (3, 2) Size of array: 6
along a first name which is used inside the function to print DSSSB Craft Instructor (ESM) 06.10.2019
the full name as output: Ans. (a) : The code creates a numpy array 'temparr' and
EmilRefsnes then prints the number of dimensions, shape (number of
TobiasRefsnes rows and columns), and size (total number of elements)
L i n u s R e f s n e s. of the array, i.e. output is :–
532. Which of the following programming codes
expresses imperative programming/declarative
programming?
i)
total = 0
List 1 = [9,10,11,12,13,14] 535. A/An______ is an integrated development
for x in List 1: environment (IDE) that comes with Python.
total + = x (a) Datagrip (b) NetBeans
print(total) (c) Visual Studio (d) IDLE
ii) MP Electrician Instructor 07.11.2016, Morning
list1 = [9,10,11,12,13,14] Ans. (d) : An IDLE (Integrated Development and
total = sum(list1) Learning Environment) is an IDE that comes with
print(total) Python. It is a default editor that accompanies Python.
(a) i) Imperative programming, ii) Declarative 536. What is the output of the following Python
programming lambda function statements?
(b) i) Imperative programming, ii) Imperative x = lambda a, b : a * b
programming print(x(5*2, 6*2))
(c) i) Declarative programming, ii) Imperative (a) 30 (b) 10
programming (c) 34 (d) 120
(d) i) Declarative programming, ii) Declarative WBPSC Instructor-18.09.2021
programming
UPPCL Technical Grade-II-11.11.2016 Ans. (d) : A lambda function can take any number of
arguments, but can only have one expression.
Ans. (a) : The given first programming code expresses
imperative programming while the second code Syntax:
expresses declarative programming. lambda arguments : expression
533. Which of the following statements is true about The expression is executed and the result is returned.
the module in Python? Example:-
i) It is file containing Python definitions and x = lambda a, b : a * b
statements. print(x(5*2, 6*2))
ii) It can define functions, classes and variables. The lambda function takes two parameters 'a' and 'b' and
iii) It can contain runnable codes. returns their product. so the output will be 120.
Computer 55 YCT
ye
p
537. What is the expected output of the following (a) Continue (b) If...else
Python programme? (c) Assert (d) Break
for n in range (2, 5): HSSC wireman Instructor -17.12.2019, Shift-II
for x in range(2, n): Punjab Wireman instructor-07.07.2013
if n% x == 0: Ans. (d): The while loop starts only if the condition
print (n, 'equals', x, '*', n//x) evaluates to true. If a break statement is found at any
break point during the execution of the loop, the loop stops
else : immediately. Else, if break is not found, the loop
print(n, 'is a prime number') continues its normal execution and if stops when the
(a) 3 is a prime number condition educates to false.
4 equals 2 * 2 541. In Google's AngularJS, what does MVC stand
(b) 4 equals 2 * 2 for?
(c) 3 is a prime number (a) Model-variable-controller
3 is a prime number (b) Model-view-container
4 equals 2 * 2 (c) Micro-variable-constant
(d) 5 is a prime number (d) Model-view-controller
5 is a prime number KPSC Instructor Electronic-25.06.2014
5 is a prime number MP Electrician Instructor 07.11.2016, Morning
HSSC wireman Instructor -17.12.2019, Shift-I Ans. (d) : MVC stands for Model View Controller. It is
Ans. (*) : The range() function returns a sequence of a software design pattern for developing web
numbers, starting from 0 by default, and increments by applications. It is very popular because if isolates the
1 (by default), and stops before a specified number. application logic from the user interface layer and
Syntax:- supports reparation of concerns.
range(start, stop, step) 542. In Python, which keyword can you use to
Example:- create an alias when you import a module?
for n in range (2, 5); (a) In (b) From
for x in range (2, n): (c) As (d) Import
if n%x = = 0: MP Electrician Instructor 07.11.2016, Morning
print(n, 'equals', x, '*', n//x) HSSC Electrician Instructor -17.12.2019
break Ans. (c) : The keyword 'as' is used to create an alias in
else: Python. It is useful where we cannot use the assignment
print (n, 'is a prime number') operator such as in the import module.
Output:- 543. Which of the following is NOT a rule for
3 is a prime number Python variables?
4 equals 2 * 2 (a) A variable name cannot start with a number.
For 'n=2: it doesn't enter the inner loop because the (b) A variable name can only contain
range is (2, 2). alphanumeric characters and underscores.
For 'n=3: it doesn't find any factors in the range (2, 3) so (c) Variable names are case insensitive.
it prints that is a prime number. (d) A variable name must start with a letter or the
For n = 4, it finds a factor (20). so it prints the underscore character.
factorization and breaks out of the loop. Punjab Wireman instructor-07.07.2013
So option (a) is correct. UKSSSC Tech. Electrical Instructor-21.11.2017
538. To delete a file in Python, you must import the Ans. (c) : Python variable rules.
OS module and run which function? 1. A variable name must start with a letter or the
(a) os.remove() (b) os.del() underscore character.
(c) os.put() (d) os.delete() 2. A variable name can't start with a number
KPSC Jr. Instructor 22.11.2018 3. A variable name can only contain alphanumeric
Ans. (a) : The os.remove() function and the pathlib characters and underscores (A-Z, 0-9, and_)
module can remove a single file. While the os.rmdir() 4. Variable names are case sensitive (age, Age and AGE
function removes an empty directory and the shutil are three different variables).
module remove the non empty directory in python. 544. Which of the following is a Python
539. What do all classes in the W3.CSS framework Membership Operator?
begin with? (a) Is (b) In
(a) File names (b) class- (c) Or (d) And
(c) w3- (d) .css UKSSSC Tech. Electrical Instructor-21.11.2017
HSSC wireman Instructor -17.12.2019, Shift-II KPSC Instructor Electronics Mech.20.07.2018
Ans. (c) : All classes in the W3.CSS framework begin Ans. (b): Python Membership Operators are operators
with w3- used to validate the membership of a value. It test for
540. In Python, by using which statement can we membership in a sequence, such as strings, lists, or
stop the loop even if the while loop condition is Tuples, in operator: The 'in' operator is used to cheek if
true? a value exists in a sequence or not.
Computer 56 YCT
ye
p
545. What is an unordered set of key-value pairs in Ans. (b) : A function is a block of code which only runs
python called? when it called the append () method is used in python to
(a) Set (b) List add an item to the end of list.
(c) Tuple (d) Dictionary Add an element to the fruits list-
KPSC Jr. Instructor- 09.07.2014 Fruits= ["Apple", "Banana", "Cherry"]
Ans. (d): A dictionary is a set of unordered key, value Fruits.append ("Orange")
pairs. It a dictionary the keys must be unique and they Syntax-:
are stored in an unordered manner. The contents of a List.append (element)
dict can be written as a series of key: value Pairs within 552. Which is true for "x in y" membership
braes {}, e. g dict = { key 1: value1, key2 : value 2,.....}. operator expression used in Python?
546. In Python, a function is defined using which (a) Returns true if a sequence with the specified
keyword? value is not present in the object
(a) Def (b) my_function() (b) Returns true if both variables are not the same
(c) Function (d) Del object
RRB Kolkata LP-2009 (c) Returns true if both variables are the same
HSSC wireman Instructor -17.12.2019, Shift-II object
Ans. (a) : In Python you define a function with the def (d) Returns true if a sequence with the specified
keyword, then write the function identifier (name) value is present in the object
followed by parentheses and a colon. UPPCL Technical Grade-II Shift-I, 28.03.2021
547. In NumPy, what are dimensions called? Ans. (d) : Membership operators are used to test if a
(a) Lines (b) Columns sequence is present in an object.
(c) Axes (d) Bars In Operator -: In opertor returns true if a seqence with
DSSSB Craft Instructor (ESM) 06.10.2019 the specified value is present in the object.
MP Electrician Instructor 07.11.2016, Morning ex- X in Y
X = ["apple", "Banana"]
Ans. (c): In NumPy, dimensions are called axes. For print ("Banana" in X)
example, the array for the coordinates of a point in 3D
Output - True
space, [1,2,1], has one axis. That axis has 3 elements in
it, so we say it has a length of 3. Hot in oprator :- Not in Operator return true if a
sequence with the specified value is not present in the
548. Which of the following CSS frameworks is used object.
to create a responsive design? ex-:
(a) HTML (b) W3.CSS x = ["Apple", "Banana"]
(c) JavaScript (d) Django print ("Pineapple" not in X)
Punjab Wireman instructor-07.07.2013 Output - True
Ans. (b) : W3⋅CSS CSS frameworks is used to create a 553. Why do we need to translate an algorithm into
responsive design. a programming code?
549. Which of the following is an INVALID NumPy (a) So it can be made into a story
ndarray attribute? (b) So a computer can understand it
(a) Shape (b) length (c) So it can be converted in to a flowchart
(c) ndim (d) dtype (d) So it can be converted back to algorithm again
KPSC Instructor Electronic-25.06.2014 RRB Gorakhpur L.P.-2008
Ans. (b) : Array attributes are essential to find out the Ans. (b) : We need to translate an algorithm into a
shape, dimension item size etc. programming code because computer understands
Length is an invalid NumPy ndarray attribute. machine language so a computer understand it.
550. Select the option to create list in Python. 554. Select the INVALID options for comments in
(a) thislist = ["apple", "banana", "cherry"] programming languages.
(b) thislist = ("apple", banana", "cherry") (a) Python does no support single line comment
(c) thislist = {"apple", banana", cherry"} like // or #
(d) thislist = <"apple", "banana", cherry"> (b) CSS support multi-line comment /*.....*/
GSSSB Electronic Instructor-21.01.2014 (c) JavaScript support both /*.....*/ and //
Ans. (a) : List are used to store multiple items in a (d) HTML comments are enclosed inside <!--....--->
single variable List are rated using square brackets. DSSSB Craft Instructor (ESM) 06.10.2019
This list = [ " apple", "Banana", "Cherry"] Ans. (a) : Python supports single line comment like //
List items- or # comment start with #, and python will ignore them.
List items are indexed, the first items has index [0], the Python does not really have a syntax for multiline
second item has index [1] etc. comments. To add a multiline comment you could
551. Which function is used in Python to add an insert a # for each line.
item to the end of a list? 555. Select the INCORRECT options with respect to
(a) add() (b) append() Numpy ndarray attributes.
(c) index() (d) range() (a) Nadarray.ndim will tell you the number of
UKSSSC Tech. Electrical Instructor-21.11.2017 axes, or dimensions, of the array.
Computer 57 YCT
ye
p
(b) ndarray.size will display data-type of the Ans. (d) : W3.CSS provides the following border
array's elements. classes.
(c) ndarray.shape will display a tuple of integers W3-border - Adds borders to an element
that integers the numbers elements stored W3- border-top - Adds a top border to an element
along each dimension of the array. W3-border-right - Adds a right border to an element
(d) ndarray.size will tell you the total number of W3-border-bottom- Adds a bottom border to an element
elements of the array. W3-border-feft - Adds a left border to an element.
RRB Bengaluru LP-2004 W3-border-o - Remove all the borders.
Ans. (b) : Numpy ndarray attributes are properties of W3-border-center-border classes w3.css does not provide.
numpy arrays that provide information about the array's
shape, size, datatype, dimension and so on. ndarray.size 561. Which CSS selector is used to specify a
will display datatype total number of elements in the particular unique element?
array. (a) Class selector (b) Type selector
(c) Universal selector (d) ID selector
556. Which of the following functions is used to Punjab Wireman instructor-07.07.2013
close a file in Python?
(a) empty() (b) close() Ans. (d) : The id selector uses the id attribute of an
HTML element to select a specific element .
(c) discard() (d) end()
DSSSB Craft Instructor (ESM) 06.10.2019 The id of an element is unique within a page so the id
selector is used to select one unique element to select an
KPSC Jr. Instructor 22.11.2018
element with a specific id write a hash (#) character
Ans. (b) : The close() method in Python is used to close follow by the ID of the element.
an open file.
562. Which among the following is/are NOT true
557. What are Python files containing Python with reference to Python?
definitions and statement called?
A. Python is NOT case-sensitive
(a) Flowcharts (b) Algorithms
B. Python uses indentation for blocks and
(c) Modules (d) Sequences
MP Electrician Instructor 07.11.2016, Morning nested blocks
Ans. (c) : A Python module is a file contain Python (a) Neither A nor B (b) Only B
definitions and statement. A module can define (c) Both A and B (d) Only A
functions classes and variables. A module can also KPSC Instructor Electronic-25.06.2014
include runable code. Ans. (d) : Python is a case sensitive language. This
558. Select the INVALID comparison operation means variable & variable are not same.
used in Python. Python Indentation: Indentation refers to the space at
(a) == (b) >= the beginning of a code line python uses indentation to
(c) & = (d) < indicate code blocks and nested blocks.
WBPSC Instructor-18.09.2021 If 5 > 2:
Ans. (c) : Python has several comparison operators that Print (Five is greater than two)
are used to compare two values. 563. Which among the following is NOT a function
Name operator example rule in Python?
Equal == X==Y (a) The first statement of a function is a
Not equal != X!=Y compulsory statement
Greater than > X>Y (b) Function blocks begin with the keyword def
& = is an invalid comparison operator used in python. followed by the function name and parentheses
559. In Python, to get the last item in a list, no (()).
matter how long the list is, you can use an (c) The code block within every function starts
index of : with a colon (:) and is indented.
(a) –1 (b) 1 (d) Any input parameters or arguments should be
(c) 0 (d) ∞ placed with specific context.
RRB Gorakhpur L.P.-2008 GSSSB Electronic Instructor-21.01.2014
Ans. (a) : Last indexing in Python is a way to access the Ans. (a) : Following are the function rules in python.
last element of a list using a negative index. In Python 1. Function blocks begin with the keyword def and
list are zero- indexed, which means that the first are followed by the function name consist of
element of a list has an index of 0, the second element parentheses.
has an index of 1, and so on. To access the last element 2. The first statement of a function can be an optional
of a list using negative indexing, you use the index-1. one.
This index refers to the last element of the list. 3. The code block within each function begins with a
560. Which of the following border classes does colon 1:)
W3.CSS NOT provide? 4. The statement return (expression) exits a function
(a) W3-border-top (b) W3-border-left optionally passing an expression back to the caller.
(c) W3-border-right (d) W3-border-center A return statement with no arguments is similar to
HSSC Electrician Instructor -17.12.2019 return.
Computer 58 YCT
ye
p
564. The java source code is initially converter to a-- 569. Which of the following file extensions does not
------. represent an executable program file?
(a) Object Code (b) Unicode (a) .obj (b) .bat
(c) Byte code (d) ASCII Code (c) .exe (d) .bin
UKSSSC Tech. Electrical Instructor-21.11.2017 UPPCL Technical Grade-II (Shift- II) 27.03.2021
Ans : (c) Java byte code is a set of instructions for the HSSC Electrician Instructor -17.12.2019
java virtual machine, it acts like an assembler, in some Ans. (a) :.bat, .exe, .bin etc. are executable program
special cases java byte code is machine code in the files but obj is not an executable file.
form of class files. 570. Which of these is a scripting languages?
565. In programming, which among the following (a) Pascal (b) Perl
is/are the parts of function header? (c) X86 (d) C#
A. Return type DSSSB Craft Instructor (ESM) 06.10.2019
B. Function name MP Electrician Instructor 07.11.2016, Morning
C. Parameter list Ans : (b) Perl is an embedded dynamic programming
(a) Both C and B (b) Both A and C language. It is mainly used in network programming,
(c) Both B and A (d) All A, B, C finone and bioinformatics. It is scripting language.
GSSSB Supervisor Electronic Instructor 18.01.2014 571. Which of the following statement true about
Ans. (d) : In programming, Return type, Function name the FORTRAN programming language?
and Parameter list are the parts of function header. (i) Full form of FORTRAN formula
566. With reference to function arguments in Python, translation.
_____ allow you to skip arguments or place them (ii) It is the first high level programming
out of order because the Python interpreter is language.
able to use the keywords provided to match the (a) Only (i) (b) Both (i) and (ii)
values with parameters. (c) Only (i) (d) Neither (i) nor (ii)
(a) Required arguments WBPSC Instructor-18.09.2021
HSSC wireman Instructor -17.12.2019, Shift-I
(b) Variable-length arguments RRB Gorakhpur L.P.-2008
(c) Keyword arguments
Ans. (b) : The full form of FORTAN is 'Formula
(d) Default arguments
Translation'. This language was developed by John
KPSC Instructor Electronics Mech.20.07.2018
Barkus and IBM in 1954. It is the first high - level
Ans. (c) : In python, the keyword argument is related to programming language specifically suited to numerical
a function call. When you use the keyword argument in computation and scientific computing.
a function call, the caller identifies the argument by
parameter name. This allows you to skip the arguments 572. Find the odd option out of the following?
or order them out of order as the python interpreter is (a) Pascal (b) Fortran
able to use the supplied keywords to match the value of (c) Python (d) Basic
the parameter. HSSC Electrician Instructor -17.12.2019
567. Time Complexity of DFS is? (V-number of Punjab Wireman instructor-07.07.2013
vertices, E- number of edges)? Ans : (c) Pascal, FORTRAN, Basic all there are
(a) O(V + E) (b) O(V) compiled that means compiler is used in all three but
(c) OC (d) None of these interpreter is used in python.
GSSSB Electronic Instructor-22.01.2017 573. Which among the following is/are NOT a ways
UPPCL Technical Grade-II-09.08.2015 to use python interpreter?
Ans. (a) : If implemented using a graph’s adjacency A. Interactive mode
list in which each node maintains a list of all its B. Script mode
adjacent edges then one can search all neighbors for (a) Neither A nor B (b) Only A
each node only once in linear time. (c) Only B (d) Both A and B
For a given graph, if the sum of the size of the adjacent KPSC Jr. Instructor 22.11.2018
list of all no des is ER. The total number of edges, and Ans. (a) : The way to use the python interpreter is
E is the number of vertices, then the complexity of DFS Interactive mode
is O (V) + O (E) = O will be (V + E) Script mode
568. Which among the programming language is In interactive mode the code is run directly on the
written in the form of stream of bits? python cell. Which can be accessed from on the python
(a) BASIC cell. Which can be accessed from the terminal of the
(b) Assembly language operating system. Whereas in script mode extension.
(c) High level language We write the code in a text Editor and save the file with
(d) Machine language extension and then run that file.
KPSC Jr. Instructor- 09.07.2014 574. VB.NET is ________ programming language.
Ans. (c) : High Level Language (HLL) is the language (a) Object supported (b) Object oriented
used in computer in which English letters numbers and (c) Structured (d) None of these
symbols are used. It can work on any type of processor. Punjab Wireman instructor-07.07.2013
This programming language is written as a stream of bits. GSSSB Electronic Instructor-22.01.2017
Computer 59 YCT
ye
p
Ans. (b) : VB.NET is an object-oriented programming Ans. (a) : MS corlib. Dll and system.dll: This assembly
language through which software is designed. Under contains the corset of .NET common exception types. Data
which languages like C++, JAVA, C#, . NET etc. types and other basic building blocks.
575. Visual Basic .NET is System. Data.dll: It contains the data container classes for
(a) an assembly language ADD .NET along with 90 server data provider classes.
(b) a machine language System.web.dll: It contains the core ASP .NET classes
(c) an object oriented programming language involved in creating forms managing state handing security
(d) none of these and more.
UPPCL Assist. Acct. 2016 (Exam date 20.11.2016 ) System configuration. Dll:- It contains classes to
read/write configuration information in the web
Ans. (c) : Visual Basic .NET is an object-oriented configuration fill, including custom settings.
programming language developed by Microsoft. Which
means it supports the features of object-oriented 580. In ASP.NET, each session uses a unique _____
programming including encapsulation, polymorphism, bits identifier.
Abstraction and inheritance. (a) 60 (b) 180
(c) 120 (d) 30
576. In VB.NET___is a conversion class with no
possibility for data loss or erroneous result. HSSC wireman Instructor -17.12.2019, Shift-I
(a) mass conversion Punjab Wireman instructor-07.07.2013
(b) Hierarchical transformation Ans. (c) : The session is identified by a unique
(c) Depth conversion identifier. This is a 120 bit identifier.
(d) Narrow conversion The session ID property is used to locate the session
identifier.
KPSC Instructor Electronic-25.06.2014
RRB Kolkata LP-2009 581. In C#, a variable name can start with
______and _______only
Ans. (a) : In VB.NET mass conversion is a conversion (a) digit, white space character
class with no possibility for data loss or erroneous result.
(b) alphabet; digit
577. Which of the following option handles memory (c) alphabet; underscore
management and security checks in. NET (d) underscore, digit
frameworks? KPSC Jr. Instructor 22.11.2018
(a) CTS (b) CLR
Ans. (c) : Variable names in the C# programming
(c) CT (d) CLS
language can only begin with English letters (Alphabets
RRB Gorakhpur L.P.-2008 A. B. C------Z) or with an underscore.
HSSC wireman Instructor -17.12.2019, Shift-II No white space character (space. Tab etc) is allowed
Ans. (b) : CLR: The CLR (Common Language in the variable name.
Runtime) manages the execution of .NET programs.
The CLR does memory management exception
Some valid variable names are _vikas45, Vikas_45
handling. Debugging security checks. Thread execution; Vikas_m
code execution code safety verification on compilation All these variable names allow some illegal
etc. variables which are not valid in C# and C, C++ Like
578. .NET framework was designed and developed 45vikas, @ vikas, _Vikas_45.
by ........... 582. In C#, there are _____relational operators and
(a) Microsoft (b) IBM ______logical operators.
(c) Oracle (d) Google (a) 4; 3 (b) 6; 3
MP Electrician Instructor 07.11.2016, Morning (c) 3; 6 (d) 5; 6
WBPSC Instructor-18.09.2021 KPSC Instructor Electronic-25.06.2014
Ans. (b) : There are 6 types of relational operators in
Ans. (a) : .NET is a framework for developing software
applications, which is designed & developed by programming language (1) = = (2) ! = (3) > (4) < (5) >
Microsoft company. Its first beta version was released = (6) < = is used by all these operators to measure the
in 2000. It is used to develop applications for web equality of two values. And the number of logical
winders phone. operators is 3
(1) & & (2)||(3) ! Logical operators are used to
579. Which of the following assembly includes the core determine the logic between variables or values.
set of .NET common exception types, data types
and numerous other fundamental building 583. Which of these is NOT an object Oriented
blocks? language?
(a) mscorlib.dll and System.dll (a) C (b) Ruby
(b) System.Data.dll (c) VB.Net (d) C++
(c) System.Web.dll KPSC Instructor Electronic-25.06.2014
(d) System.Configuration.dll Ans. (a) : C is a type of high level and structural
HSSC wireman Instructor -17.12.2019, Shift-I programming language while Ruby. VB. Net and C++
Punjab Wireman instructor-07.07.2013 are object oriented programming language.
Computer 60 YCT
ye
p
584. HLL is not necessary the programmer to know to the backup device if you have a 2000 or later OS you
about the ISA (Industry Standard can also monitor remote systems for changes. The
Architecture) of the processor, but it is option to watch files with specific accents can be set
using the file system watcher's filter property.
necessary for the --------- programmer.
589. In C#, which of the following option is not an
(a) Python (b) JAVA access modifier?
(c) C++ (d) Assembly Language (a) Private (b) Protected Internal
GSSSB Electronic Instructor-21.01.2014 (c) Protected External (d) Public
Ans : (d) High-level programming language– A KPSC Jr. Instructor- 09.07.2014
high-level programming language has a significant Ans. (c) : There is no protected External access
abstraction from the details of computer operation. It is modifier in C# language. Access modifier in C# is used
designed to be easily understood by humans and for to specify the scope of accessibility of a class or class
this reason they must be translated by another software, type member. It is a keyword. Which are mainly of four
But an assembly language is a type of low-level types-
programming language that is intended communicate (i) Public
directly with computer's hardware. (ii) Private
585. Which of the following is not a type of loop in (iii) Protected
C? (iv) Internal
(a) Do-While (b) If-Else But there are also some combinations of these like-
(c) For (d) While (v) Protected Internal
UKSSSC Tech. Electrical Instructor-21.11.2017 (vi) Private Protected
Ans. (b) : When we have to take a decision on the basis 590. Which of the following statements related to
of two or more conditions then we use if-else whereas the 'C' language is FALSE?
Do-While" for and while are types of loops. (a) Every function definition must have a 'return'
586. C is ........... level programming language statement.
(a) A high (b) A low (b) The parameter values used to call a function
(c) An assembly (d) A machine are called 'actual' parameters.
GSSSB Supervisor Electronic Instructor 18.01.2014 (c) Function prototype specifies a function's
(UPPCL TG2 Re-exam 16-10-2016) name, return type, and parameters.
Ans : (a) C is a high level programming language in (d) A function may and may not return a value.
general use. It was developed with the aim of adding RRB Gorakhpur L.P.-2008
assembly language capabilities to a high-level GSSSB Electronic Instructor-21.01.2014
language. It is the language used for general works. The Ans. (a) : The statement that every function definition
Unix operating system was the first major program should have a return statement is absolutely wrong. In
written in the C language. C programming language, the value return statement in
587. Which of the following options is correct a function is used according to the feature of the
regarding 'boxing' in C#? function. If the function only needs to return a value
(a) It converts value type to reference type then the return statement can be used it is always
(b) It converts the value type to XML necessary to specify the data return type while
indicating the return statement.
(c) It coverts the reference type to XML
The return statement is not required in the function then
(d) It converts reference type to value type
you have to void the return type of function which means
KPSC Instructor Electronics Mech.20.07.2018 that the function will not return any kind of data.
Ans. (a) : The process of converting a value-type (char, 591. Which of the following is a valid keyword in 'C'
int etc) into a reference type is called boxing. The language?
process of converting reference type to a value type is (a) Floating (b) Enumeration
called unboxing. (c) Integer (d) Void
588. In C#, which of the following class is used to MP Electrician Instructor 07.11.2016, Morning
monitor the files on your system by Ans. (d) : In C programming language pre-defined
programming?/ keyword void which used when the function is called
(a) FileSystemWatcher Class and we have to return nothing. Then at that time we use
(b) FileSystemMonitor Class the data type of the function void is an empty data type
(c) FileWatcher Class that does not have any value. For example void sum (int
(d) SystemWatcher Class a, int b); This function does not return any value to the
GSSSB Electronic Instructor-22.01.2017 calling function.
Ans. (a) : The class listens to the file system ! monitors 592. The lifetime (longevity) of the static variables
a directory and its subdirectories and files. This class is in a 'C' program is:
useful when it notifies you when changes are made to (a) till the end of the first function
directory when you need to update or auto-update a
directory. For example you want to create an auto (b) till the end of the main program
backup of a folder. So you which looks at a directory or (c) till the time first ten statements get executed
the whole machine and can figure it out. See when and (d) with in the function in which they are defined
what changes have been made and see copy the changes WBPSC Instructor-18.09.2021
Computer 61 YCT
ye
p
Ans. (b) : The space for a static variable is allocated Static : It can retain the value of a local variable
only once and is used throughout the program. The life between multiple function calls.
time of a static variable is till the end of the main Register : Resister storage class is used to define local
program runs then the life time of the static variable is variables which are stored in register instead of RAM.
there. This type of variable does not require memory location
593. Which of the following characters is/are NOT so unary operator. '&' is not used in it.
allowed for variable names in 'C'?
(a) Alphabets (b) White space characters 597. Which of the following option is not a valid
(c) Underscore (d) Digits keyword in 'c' language?
UPPCL AC 2020 (Exam Date 13.09.2021) (a) type (b) auto
Ans. (b) : Variable name white space in C (c) break (d) enum
programming language characters like - space (' '), tab Punjab Wireman instructor-07.07.2013
'\t', carriage return '\r', newline '\n' etc are not allowed. Ans. (a) : In 'C' language keyword is a reserved word
(i) Variables names must begin with letters (A, B, ---- which can not be used as variable name, Constant name
--Z or a, b, ------- z) or underscore ( _ ) but not etc. The total number of keyword is 32.
with numbers.
auto, break, enum, int, char etc. There is an example of
(ii) No other special character is allowed in the
variable name except underscore. this types does not come under keyword.
(iii) Marks are allowed. 598. Which of the following statements related to 'C'
594. ______ key is pressed to compile a program in language is/are FALSE?
C language. (i) A function must be declared globally in a C
(a) Alt + F5 (b) Alt + F program to tell the compiler about the
(c) Alt + F9 (d) Alt + C function name, function parameters, and
HSSC wireman Instructor -17.12.2019, Shift-I return type.
Ans. (c) : 'Alt + F9' shortcut key is pressed to compile (ii) The parameter list must not differ in
a program is C language. function calling and function declaration.
595. The total number of keywords available in C is (a) Only (ii) (b) Neither (i) nor (ii)
(a) 24 (b) 28 (c) Only (i) (d) Both (i) and (ii)
(c) 32 (d) 36 UPPCL Technical Grade-II (Shift-II) 19.03.2021
KPSC Jr. Instructor 22.11.2018
Ans. (b) : Statement (i) In 'C' language the variable is
Ans : (c) The total number of keywords available in C
declared globally to tell the compiler about function
is 32. All keywords have a definite meaning and these
meanings can not be changed. These are also called name function parameter and return type. Hence the
reserve words. these are- above statement is true.
auto double int struct Statement (ii) In 'C' language the parameter list must not
break else long switch differ in function calling and function declaration. If it
case enum register typedef would be separated from function then function cannot
char extern return union be it. That is we should pass the same parameters as the
const float short unsigned function declared in the program. The function can be
continue for signed void called form anywhere in the program. Hence the above
default goto sizeof volatile statement (i) & (ii) are true.
do if static while 599. Which of the following can be used to find the
596. In the 'C' language, by making local variables data type or storage size of a variable in "C"
_____, they can retain their values between language?
function calls.
(a) size_of (b) void
(a) register (b) extern
(c) static (d) auto (c) const (d) typedef
HSSC Electrician Instructor -17.12.2019 RRB Gorakhpur L.P.-2008
Ans. (c) : Register, extern, static, auto are all storage Ans. (a) : The size_of operator is the most common.
classes. Which are used in programming language to Operator in "C". It is a compile-time unary operator. It
define the attributes of variable function like scope, is used to calculate the size_of an operand. It gives or
visibility and life time etc. tells the size_of a variables. When size_of is used with
Auto : It is the default storage class for all the declared data types. So it just returns the amount of memory
variables, of a function, or block so the use of auto allocated to that data type.
keyword is not necessary while writing a program in c
language 600. Which of these is NOT a valid keyword used in
Extern : This storage class just lets us know that the C language?
variable is defined somewhere else and not within the (a) while (b) public
same block where it is used. It can be accessed from any (c) break (d) int
function block. DSSSB Craft Instructor (ESM) 06.10.2019
Computer 62 YCT
ye
p
Ans. (b) : C is a high level programming language Ans. (a) : 'fclose()' Function closes the file. which is
with 32 keywords, while, break, int all come under pointed by the file pointer Fb. Declaration: - int fclose
keywords while public is not a keyword. (file * fb);
auto double int struct 606. In "C" language, if the storage class of a
break else long switch variable is specified as 'register' then which of
case enum register typedef the following operator cannot be applied to it?
char extern return union (a) ! (b) --
const float short unsigned (c) & (d) ++
continuefor signed void UKSSSC Tech. Electrical Instructor-21.11.2017
default goto sizeof volatile Ans. (c) : The & operator cannot be applied because
do if static while register storage class is used to define local variables.
601. The logical NOT operation in performed by This type of variable does not require a memory
which of the following operators in C? location so the address of operator '&' is not used.
(a) < > (b) # 607. For which of the following non-graphic
(c) = = (d) ! = character is escape sequence '\t' used in C++
MP Electrician Instructor 07.11.2016, Morning language?
Ans : (d) Use of logical operation NOT in C language (a) Carriage return (b) Vertical tab
is done as "!=" in the use of this operation it the values (c) Horizontal tab (d) Backslah
are not equal, then the result is true. GSSSB Supervisor Electronic Instructor 18.01.2014
602. We can insert pre written code in a C program Ans. (c) : In C++ language '\t' is used for horizontal tab
by using space.
(a) # read (b) #get 608. Which of the following operators is used as an
(c) #include (d) #put address operator in C?
WBPSC Instructor-18.09.2021 (a) " (b) &
Ans. (c) : We use the #include library to use previously (c) % (d) /
written code in the "C" programming language. The KPSC Instructor Electronics Mech.20.07.2018
#include library directive in the C programming Ans : (b) In C language, Ampersand operator (&) is
language tells the preprocessor to insert the contents of used to hold the address of the variable like-
another file at that point in the source code. Where the Int a = 4;
#include directive is found. Include directives are
typically used to include "C" header files for "C" printf("%d", &a);
functions held outside the correct source file. Output: 931630116
This output is the address of the variable a.
603. All preprocessor commands is C begin with a
(a) & (b) # (c) 1 (d) $ 609. Which of the following is a pointer variable in C?
HSSC wireman Instructor -17.12.2019, Shift-II (a) int P; (b) Char P;
(c) int * P; (d) int & P;
Ans. (b) : #include< stdio.h> includes this type of file
(Pre-Processor) in each header area of C Program. They GSSSB Electronic Instructor-22.01.2017
start with # and it is called Pre processor, in which semi Ans : (c) Pointer variable is such a variable whose
colon (;) is not given like statement. Preprocessor value is the address of another variable '*' is used to
contains a program that executes even before the source declare pointer variable, This is the same symbol which
code is compile. is used in C programming to multing. Here * indicates
604. Which of these is NOT a keyword used in C that the variable is a pointer.
language? 610. The pointers are used to store only the
(a) myfile (b) do (a) value of variables
(c) case (d) register (b) address of variables
KPSC Instructor Electronic-25.06.2014 (c) sign of variables
Ans. (a) : In C language myfile is not a keyword while (d) power of variables
do, case and register are keywords. KPSC Jr. Instructor- 09.07.2014
auto double int struct Ans : (b) Pointer is a variable, which holds the memory
break else long switch address of another variable. Pointer is used to store the
case enum register typedef address of variable.
char extern return union 611. Consider the following function definition in a
const float short unsigned C language:/
continue for signed void int f(int x, int y)
default goto sizeof volatile {x = x+y; y = x-y; x=x-y; print("%d, %d", x,
do if static while y);}
605. Which of the following is a valid library If the function is called as f (3, 9) in the main
function in 'C' language to close an opened file? program, then what will be output?
(a) fclose() (b) closefile() (a) 3, 9 (b) 12, 9
(c) closef() (d) fileclose() (c) 3, 12 (d) 9, 3
GSSSB Electronic Instructor-21.01.2014 RRB Gorakhpur L.P.-2008
Computer 63 YCT
ye
p
Ans. (d) : If the function is called as f(3,9) then the 615. Which of the following C statements can also
function int f(intx, inty) is passed as (x = 3, y = 9) be used in place of num[i]?
So, (i) *(num + i)
x=x+y (ii) i[num]
x=3+9 (iii) *(i + num)
x = 12 (a) Only (ii) (b) (i), (ii) and (iii)
Now 12 will assign in x (c) Only (i) (d) Only (iii)
MP Electrician Instructor 07.11.2016, Morning
So,
x = 12, y = 9 Ans : (b) In place of num[i] the statement *(num+i) or
*(i+num) and i[num] can be used.
y=x–y
y = 12 – 9 616. What is the output of the following C program
code?
y=3 int i = 0;
Now 3 will assign in y again for (; i < = 5; i++);
x = 12, y = 3 printf ("%d", i);
x=x–y (a) 0, 1, 2, 4, 5 (b) 6
x = 12 – 3 (c) 5 (d) 1,2,3,4,5
x=9 WBPSC Instructor-18.09.2021
Hence x = 9 and y = 3 will be shown as output This Ans : (b)
program is called swapping . C program code
612. Start int i = 0;
Read n for (; i < = 5; i++);
Initialize i to 1. printf ("% d", i);
In the above code, the result will be reassigned to i by
while i < n do: adding 1 to the value of i in each interaction, this
write i process will continue till the condition (i< = 5) is turn.
Increment i Since the print statement is outside the loop, i = 5+1 = 6
end while will be printed based on the post increment.
Stop 617. What will be the output of
What of the following options is CORRECT ? #include
(a) Read number n and print the integers void main()
counting up to (n-1) {
(b) Read number n and print the integers char test = 'S';
counting up to i printf ("\n%c", test);
(c) Read number n and print the integers }
counting up to (n+1) (a) S (b) Garbage value
(d) Read number n and print the integers (c) Error (d) None of these
counting up to n Punjab Wireman instructor-07.07.2013
DSSSB Craft Instructor (ESM) 06.10.2019 Ans. (a) : The code to print a character is written in the
UPPCL Technical Grade-II (Shift-I) 19.03.2021 above 'C' program where %c is used. '%c' is used to
display a character in a program, just as %d is used to
Ans : (a) The above programming code means to read the print an integer value.
number n and print the integers counting up to (n-1). Similarly %f is used for float, %s is used to print a
In the above code, read n, initialize the variable i with the string and %x is used to print hexadecimal, '%f ' is used
value. Run a while loop up to n-1, and print i at the end of for print the double.
each loop, adding to the value of i. 618. What is the output of the following C program
613. What happens when an attempt is made to code?
read an element from an empty queue? for (i = 1 ; i < 5; i + = 3)
(a) Underflow (b) Queuefull {}
(c) Onflow (d) Overflow printf ("%d", i);
RRB Gorakhpur L.P.-2008 (a) 1 (b) 4
Ans : (a) When we search for an element in an empty (c) 7 (d) Syntax error
queue that is not there, the output will print underflow. HSSC wireman Instructor -17.12.2019, Shift-II
Ans : (d) The above code will throw a compilation
614. In C, statements are terminated by: error because the type of variable 'i' is not declared if 'i'
(a) Comma was of int type, the output would be 7.
(b) No need for termination symbol 619. The function of C programs always.
(c) Semicolon
(a) Call by reference (b) Call by address
(d) period
(c) Call by value (d) Call by stock
DSSSB Craft Instructor (ESM) 06.10.2019 KPSC Jr. Instructor 22.11.2018
Ans. (c) : In C programming language, when the RRB Kolkata LP-2009
statement of a program is to be terminated by the Ans : (c) By default, call by value is used to pass
semicolon ';'. arguments in C - programming
Computer 64 YCT
ye
p
620. What is the value of the following "C" 624. What is the right way of declaring constant in C?
language expression in which x is an integer (a) const int size = 10; (b) constint size;
variable whose value is 4? (c) const size = 10; (d) int size
(x-5) ? 15 : 25 MP Electrician Instructor 07.11.2016, Morning
(a) 0 (b) 25 (c) 15 (d) -1 Ans. (a) : To declare a variable as a constant in c
KPSC Instructor Electronic-25.06.2014 language, the 'const' keyword is used before the data
UKSSSC Tech. Electrical Instructor-21.11.2017
type or the # define preprocessor or the # define
Ans. (c) : In the above "C" program the statement is preprocessor directive is used.
checked using ternary operator where x = 4 and Or
subtracting 5 returns –1 where the statement is true, if
true the ternary operator will print 15. const int size = 10; #include<stdio.h>
Ternary operator : - Ternary operator is used to #define size10
execute code based on the result of a binary condition. int main( )
It takes a binary condition as input which makes it {
similar to an if else control flow block. Although it is a ________
function also returns a value, treating it the same. The }
ternary operator allows you to set a value (expression 2) 625. Which of the following statements related to
to a variable if the condition is true, and also set another 'C' languages is true?
value (expression 3) if the condition is false (i) Structure is a user defined data type, which
enables us to store a collection of different
data types.
(ii) Both 'struct' and 'union' are keywords
and they are used to define structure and
union respectively.
(a) Only (i) (b) Neither (i) nor (ii)
621. What happens if you execute pseudo code?. (c) Only (ii) (d) Both (i) and (ii)
While (1) UPPCL Technical Grade-II (Re-exam) 16.10.2016
/begin Ans. (d) : Statement (i) and (ii) both are true because
print ''Hello" both structure and union are a user-defined data types in
/end which a collection of different data types can be stored
(a) You will see syntax error for structure, the struct keyword & for union, the union
(b) Hello is printed zero times keyword is used before the name.
(c) Hello is printed infinitely many times
(d) Hello is printed only once 626. Special files define devices for the system or are
GSSSB Electronic Instructor-21.01.2014 temporary files created by processes. FIFO is a
RRB Kolkata LP-2009 special types of file, which –––––.
Ans : (c) In the above code while (1) condition is true. (a) Acts as an input/output channel between
The while loop continues to run, that is, the statements processes
written in the while loop block will continue to run until (b) As an intermediary to store information like
the condition is true. It would be correct to have a non- text, graphics, images works.
zero value in the condition. Hence it will be printed (c) Acts as an intermediary between the operating
infinite number of times. system and the hardware
622. Which of the following is a collection of (d) Works as a locator where the details of files
different elements having similar data type? are stored
(a) Array (b) Structure RRB Kolkata LP-2009
(c) Union (d) Pointer Ans. (a) : Special files define devices for temporary
HSSC Electrician Instructor -17.12.2019 files created by the system or processes. Special files are
KPSC Jr. Instructor- 09.07.2014 generally of three types FIFO (First In First Out). Block
RRB Gorakhpur L.P.-2008 and character. FIFO files are also called pipes. FIFO files
Ans : (a) Storage of different elements with same data act as input/output channels between processes. As the
types is called array like integer or string array is name indicates, it maintains the order of request and
generally used to organize data in computer programs. response of files by the user or any other device.
623. Which of the following is the correct form of an 627. Which of the following operators is used for
array declaration in C? making comparison between different operands?
(a) int marks [10]; (b) int marks (10); (a) Logical operator (b) Relational operator
(c) int marks (10); (d) All of these (c) Arithmetic operator (d) Assignment operator
DSSSB Craft Instructor (ESM) 06.10.2019
DSSSB Craft Instructor (ESM) 06.10.2019
Ans. (a) : Array declaration : -
Syntax – Ans : (b) Relational operators are used to make
data_type array_Name [size of array]; comparisons between different operands. As includes
Example- numerical equality (5 = 5) and inequality (4 ≥ 3)
628. Which of the following Statement (s) is/are
correct regarding 'c' language?
(i) The 'Union' in 'C' allows storing different
types of data at the same memory location
Computer 65 YCT
ye
p
(ii) 'Union' in 'C' can have many members but 631. Which of the following statements regarding
only one member can have a value at one time 'C' language is/are correct?
(iii) The word 'Union' is an operator in 'C' (i) A part of the array can be passed to the
language function instead of the whole array
(a) only (iii) (b) Only (i) and (ii) (ii) Numeric array elements cannot be assigned
(c) Only (ii) and (iii) (d) Only (i) and (iii) initial value if the array is defined as a
MP Electrician Instructor 07.11.2016, Morning pointer variable
Ans. (b) : Union is defined as a user defined data type (a) Neither (i) nor (ii) (b) Both (i) and (ii)
which is a collection of different variables of different (c) Only (ii) (d) Only (i)
data types in the same memory location. Union can be KPSC Instructor Electronic-25.06.2014
defined as having many members. That is union can Ans. (b) : Statement (i) The C language does not allow
have many members but only one member can have any passing of entire arrays as arguments inside a function.
value at any point of time. There is no union operator in Some part of the array ( array name) is passed inside the
‘C’ language. function as an argument so the above statement is true.
629. Consider the following array declarations in C Statement (ii) Numeric array elements can not be
language: initialized if the array is defined as a pointer variable
int array1[] = {2, 3}; Because a pointer variable. Stores the address of the
int array2[3] = {9}; next element and it has NULL pointers. When an array
What will be the output of the following print is defined as a pointer, its initial value becomes NULL.
statement? 632. What is the size of the following array
printf("%d, %d", array1[1], 2[array2]); declaration in 'c', if character requires one-
(a) 2, 0 (b) 3, 0 byte memory space?
(c) 2, 9 (d) 3, 9 char name [] = abcde";
WBPSC Instructor-18.09.2021 (a) 4 bytes (b) 6 bytes
HSSC wireman Instructor -17.12.2019, Shift-I (c) 7 bytes (d) 5 bytes
Ans. (b) The output of the given print statement will be GSSSB Electronic Instructor-21.01.2014
3, 0. If you leave the initialize list empty in the array is Ans. (b) : The array contains a special character (\0) at
initialized with the default value of 0. the end of a string which indicates that the string is over
array2[3] = { 9 } and this character takes 1 byte so the size of array
would be 6 instead of 5
Char name [] = "abcde"
array1[] = {2, 3}
633. Consider the following array declaration in 'C'
language:
int array[] = {2, 3, 4, 5};
The output of 2[array2] in a given print statement will What will be the output of the following
be the same as array 2[2] because the GCC compiler statement?
treats both syntaxes as the same. The compiler converts printf("%d", 2[array]);
array operations to pointers before accessing the array (a) 4 (b) 3
elements. (c) 2 (d) 5
630. Consider the following union variable UKSSSC Tech. Electrical Instructor-21.11.2017
declaration in C language Ans. (a) : In C the compiler equates 2[array] to array
union data { [2].
int a;
float b;
char string [20];
} data1; So, array [2] stores value 2. Hence the output of
print("%d", 2[array] ); Statement will be 4.
if 1, 2 and 4 bytes of memory are allcoated to
char, int and float variables respectively, then 634. If integer requires two bytes space, then what
what will be memory size of union variable will be the size of the following 'C' array?
data1? int array [3][4] = (0);
(a) 20 bytes (b) 2 bytes (a) 24 bytes (b) 12 bytes
(c) 4 bytes (d) 1 byte (c) 7 bytes (d) 14 bytes
HSSC Electrician Instructor -17.12.2019 GSSSB Supervisor Electronic Instructor 18.01.2014
KPSC Jr. Instructor 22.11.2018 Ans. (a) : The size of the byte is determined for the C
Ans. (a) : Storing 20 elements in char array string [20] programming language integer value So in the above
will take 20 bytes of memory space because byte of code array of int type has been declared which has 3
memory space is allocated for char data type 20×1 bytes row & 4 column, 4 elements are being stored in each
20 bytes. So the memory = Size of union variable data 1 row i.e., 3×4 = 12 elements. So each elements will take
will be 20 bytes. memory of 2 byte for total array will be 12×2= 24 byte.
Computer 66 YCT
ye
p
635. If X, Y, and Z are pointer variables of type char, (c) a-i, b-v, c-iv, d-iii, e-ii
int, and float, respectively, in 'C' language, then (d) a-iii, b-i, c-iv, d-v, e-i
which of the following statements is true? KPSC Jr. Instructor- 09.07.2014
(a) Size of X, Y, and Z are same Ans. (a) :
(b) Size of Z is greater than the size of X JavaScript Event : Description
(c) Size of Y is greater than the size of X Oncanplay : (ii) This event occurs when media the
(d) Size of Z is greater than the size of Y browser has buffered enough to begin. It means media
KPSC Instructor Electronics Mech.20.07.2018 can start playing but might have to stop for buffering.
Ans. (a) : The address is started in a pointer. Variable Onchange : (iii) This attribute fires/triggers when the
which is an Unsigned integer type number. Thus pointer value of the element is changed.
variable of all different data types take up the same size of Ondragend : (iv) This event occurs/triggers when a
memory. user has finished dragging a selection.
636. Which of the following is a user defined data Onblur : (v) This event occurs/triggers when an HTML
type, which is used to represent a group of data element or window loses focus.
items of different types under a single name? Onbeforeonload : (i) This event occurs/triggers when a
(a) Array (b) Structure document is about to be unloaded.
(c) Function (d) Pointer 639. Which among the following is the key difference
GSSSB Electronic Instructor-22.01.2017 between javascript and java?
Ans. (b) : A structure is a user defined data type in (a) All of these
C/C++, that is used to refer to a group of different types (b) Javascript interpreter is inbuilt into the
of data under the same name, while array same type of browser
data is stored in (matrix). (c) Javascript can be combined directly with
In structure data type, we can store all type of data group HTML
like int, float, char string etc. It uses the struct keyword. (d) Javascript language is simpler than Java
For example:- HSSC wireman Instructor -17.12.2019, Shift-II
struct variable_name
{ Ans. (a) : Following are the main differences
char_name[10]; between JavaScript & Java.
int pin; 1. It is an interpreted - It is compiled
char city[50]; programming language
}; 2. It is an object oriented - It is an object oriented
637. C' & 'C++' languages are the example of........ programming language. programming language
(a) First Generation Programming Languages. 3. Javascripts files have - Java program has file
(b) Second Generation Programming Languages
the file extension “Js”. extension “Java”.
(c) Third Generation Programming Languages.
(d) Fourth Generation Programming Languages. 4. Javascript requires low - Java program uses
(UPPCL TG2 11-11-2016) space memory. more memory.
Ans : (c) 'C','C++', C#, Java, BASIC and Pascal are third 640. "double" data type in VB.NET gets a storage
generation programming language. allocation of _________ bytes.
638. Match the points under the column 'JavaScript (a) 2 (b) 8 (c) 6 (d) 4
Event' with those under the column ' UPPCL Technical Grade-II (Shift-I) 27.03.2021
Description'.
Ans. (b) : Java is an object-oriented language in which
JavaScript Event Description the “double” data type is provided with a storage
a) oncanplay i) This event trigger allocation of 8 bytes.
before a document
loads. 641. The conditional operator (? :) is also known as
b) onchange ii) This event triggers (a) loop operator (b) control operator
when media can start (c) case operator (d) ternary operator
playing but might have RRB Bengaluru LP-2004
to stop for buffering. Ans : (d) In computer programming the (? :) conditional
c) ondragend iii) This event triggers operator is a ternary operator that is part of the syntax for
when an element basic conditional expressions in many programming
changes. languages. This is known as the ternary or conditional
d) onblur iv) This event triggers operator.
at the end of a drag 642. State which of the following statements are
operation. true:-
e) onbeforeonload v) This event triggers (i) WinZip does not do any compression
when a window loses (ii) Linux is an operating system.
focus. (a) (i)-True (ii)- True (b) (i)- True (ii)-False
(a) a-ii, b-iii, c-iv, d-v, e-i (c) (i)- False (ii)- False (d) (i)- False (ii)- True
(b) a-ii, b-i, c-iii, d-iv, e-v UPPCL TG-II 19-03-2021 (Shift-I)
Computer 67 YCT
ye
p
Ans. (d) : WinZip is a go-to-zip tool that compresses Ans : (a) VB script and JavaScript are client-side
files to reduce their size. scripting languages that are prototypes based & used with
Statement – (ii) True. most web browser.
Linux is an open source operating system. It is such a 645. Select the odd one out from the following options:
operating system that directly manages the hardware & (a) Mat lab (b) Safari
resources (such as CPU memory & storage) of the (c) Chrome (d) Firefox
system. It was first released on September 1991. WBPSC Instructor-18.09.2021
643. Which of the given validations is expected from Ans : (a) Mat lab is a programming language where as
the following JavaScript function? safari, Chrome, Fire Fox all are there web browsers.
<script> 646. ..............was the first computer language
function validateemail() developed for electronic computer in 1949?
{ (a) Short Code (b) FORTRAN
var x=document.theform.email.value; (c) COBOL (d) Pascal
var attheposition=x.indexOf("@"); (UPPCL TG2 11-11-2016)
var dotposition=x.lastIndexOf("."); Ans : (a) In the year 1949, the first computerized
if (attheposition<1 ǁ language of short codes was developed for electronic
dotposition<attheposition+2 ǁ computers. Short code is the first high level language
dotposition+2>=x.length) { alert ("Please enter for the development of electronic computers.
a valid e-mail address"); 647. Indentify the odd one out from the following.
return false; (a) ORACLE (b) LINUX
} (c) MSDOS (d) WINDOWS
HSSC wireman Instructor -17.12.2019, Shift-I
}
</script> Ans : (a) ORACLE is a database management system
<body> software while LINUX, MSDOS, WINDOWS are all
three operating system.
<form name="theform" method="post"
action="#"onsubmit="return alidateemail();"> 648. Identify whether the following statement are
Email: <input type="text' true or false.
name="email"><br/> i) The CSS class selectors are used to specify a
group of elements.
<input type="submit" value="register"> ii) The 'Internal' CSS can be added by using
</form> the <style> element in the <head> section.
(a) The email ID must contain '@' and '.' iii) The 'External' CSS can be added by using a
characters, with at least one character placed <link> element to link to an external CSS file.
before and after '@' and at least four (a) i-True, ii-True, iii-True
characters placed after '.' (dot). (b) i-False, ii-True, iii-False
(b) The email ID must contain '@' and '.com' (c) i-False, ii-True, iii-True
characters, with at least one character placed (d) i-True, ii-False, iii-True
before and after '@' and at least two KPSC Jr. Instructor 22.11.2018
characters placed after '.' (dot). Ans. (a) : The CSS id selector specifies a particular
(c) The email ID must contain '@' and '.' unique element while CSS class selectors are used to
characters, with at least three characters specify a group of elements. CSS can be added to
placed before and after '@' and at least two HTML documents in 3-ways :
characters placed after '.' (dot). ⇒ Inline – by using the style attribute inside HTML
element.
(d) The email ID must contain '@' and '.' ⇒ Internal– by using a <style> element in the <heads>
characters, with at least one character placed section.
before and after '@' and at least two ⇒ External– by using a <link> element to link to an
characters placed after '.' (dot). external CSS file. Hence all statements are true.
DSSSB Craft Instructor (ESM) 06.10.2019 649. Which of the given options best describes the
Ans. (d) : The email ID must contain '@' and '.' truthfulness of the following statements?
characters with at least one character placed before and (i) ASP.NET is a web framework designed
after '@' and at least two characters placed after '.' (dot). and developed by Microsoft.
A valid e-mail address consists of two main parts;– first (ii) ASP.NET provides fantastic integration of
one is email prefix that the characters written before '@' HTML, CSS and JavaScript.
character while second one is email domain that the (a) (i)-False, (ii) - False
characters written after '@' character. By the help of (b) (i) - True, (ii) - False
JavaScript, an email can be validated. (c) (i) - False, (ii)- True
644. VB script and JavaScript are (d) (i) - True, (ii) - True
(a) client-side scripting languages Punjab Wireman instructor-07.07.2013
(b) server-side scripting languages Ans. (d) : ASP.NET is a web framework designed &
(c) markup languages developed by Microsoft company which provides a
(d) Programming languages good integrator of HTML, CSS & JavaScript. Hence
MP Electrician Instructor 07.11.2016, Morning both statement (i) & (ii) are true.
Computer 68 YCT
ye
p
650. Which of these is a scripting languages? 656. A table, when joined with itself, is called a ___ .
(a) Pascal (b) Perl (a) Null Join (b) Self Join
(c) X86 (d) C# (c) Redundant Join (d) Nil Join
KPSC Instructor Electronic-25.06.2014 KPSC Jr. Instructor- 09.07.2014
Ans. (b) : Perl is a scripting Language. It’s first version Ans : (b) Self join is a regular join but it's table join
was created in 1987 by programmer Lary Wall. Perl
includes many popular Unix features. Pascal is an itself.
imperative & procedural programming language. It was 657. Columns of a relation are generally referred to
designed by Niklaus Wirth in 1968-69. It is named in as ______.
honor of Blaise Pascal, a French mathematician, (a) Couple (b) Degree
philosopher and physician. (c) Tuples (d) Attributes
651. An example for external DBMS is : RRB Kolkata LP-2009
(a) Operating system (b) Microsoft Excel Ans. (d) : In DBMS, an attribute is a piece of data that
(c) Oracle (d) Microsoft Word describes an entity. In database table column is referred
GSSSB Electronic Instructor-21.01.2014 as attribute.
Ans : (c) Oracle is an external DBMS Example in which 658. Which of the following option is not a function
database related work is performed, while operating system of database management?
runs a computer and excel is an application software. (a) Database design
652. Which of the following statements are FALSE (b) Data Recovery
about private keys in cryptography? (c) Receiving DBMS
i) It is a key to be given to the public. (d) Maintaining System Security
ii) It is a key that opens a secret door. RRB Gorakhpur L.P.-2008
iii) This key is also known as a secret key. Ans : (c) Database Management System in an
iv) This key should only be shared with its Application Software Whereas the main task of
generator or the parties authorised to decrypt database management is to design database, recover,
the data.
data, maintain system security.
(a) Only i, ii and iii (b) All of i, ii, iii and iv
(c) Only iii and iv (d) Only i and ii 659. For the relational database ______ Constitute
UKSSSC Tech. Electrical Instructor-21.11.2017 the basic set of operations.
Ans. (d) : A private key, also known as a secret key, is (a) Relational Algebra
a variable in cryptography that is with an algorithm for (b) Relational Calculus
encryption and decryption of data. This key should only (c) Predicate Calculus
be shared with the key's generator or parties authorised to (d) Relational tabular Operations
decrypt the data. These type of keys play important role in DSSSB Craft Instructor (ESM) 06.10.2019
symmetric, asymmetric cryptography. Hence statements MP Electrician Instructor 07.11.2016, Morning
(iii) and (iv) are true while (i) and (ii) are false. Ans : (a) Relational Algebra is a procedural query
653. A candidate key that is not the primary key is language because we use it to query databases. There
a/an _______. are different ways to access the table.
(a) Master key (b) Alternate key 660. Which of the following is NOT a table
(c) Unique key (d) Foreign key relationship?
GSSSB Supervisor Electronic Instructor 18.01.2014 (a) One-to-key (b) Many-to-many
Ans. (b) : Alternate key or Secondary key is the key (c) One-to-many (d) One-to-one
that has not been selected to be Primary key. There can WBPSC Instructor-18.09.2021
be only one primary key for a table. Therefore all the
remaining candidate keys are known as alternate or Ans : (a) One-to-key does not belong to a table while
Secondary keys. many-to-many, one-to-many and one-to-one belong to
a table.
654. Which of the following is NOT an example of
DBMS? 661. The row of the table is known as
(a) SQL Server (b) MySQL (a) record (b) field
(c) Microsoft Outlook (d) Microsoft Access (c) table (d) relation
KPSC Instructor Electronics Mech.20.07.2018 HSSC wireman Instructor -17.12.2019, Shift-II
Ans. (c) : Microsoft outlook is an application of MS KPSC Instructor Electronic-25.06.2014
Office package which have no any relation with DBMS Ans : (a) A row of a table is called a record. Row
whenever SQL server, MySQL, MS Access etc. are the represents a single item in relational database context.
examples of DBMS (Database management system). In table a row contains different kinds of field data.
These software are used to manage the database. 662. _______are used to speed up searching.
655. In a database, another name for a tupple is (a) Vectors (b) Indices
(a) row (b) column (c) Lists (d) Maps
(c) file (d) table KPSC Jr. Instructor 22.11.2018
GSSSB Electronic Instructor-22.01.2017 KPSC Jr. Instructor- 09.07.2014
Ans. (a) : Tupple is a limited command list of Ans : (b) In indices is a copy of selected columns of
elements. In a database, record of one row is also called data from a table that are used to speed up the search
'Tupple'. Hence another name for tupple is row. for any topic.
Computer 69 YCT
ye
p
663. The process of reducing data redundancy in a VII. Data Representation and
relational database is called_____.
(a) Trigger (b) Normalisation Number System
(c) Relationship (d) Data Type
KPSC Instructor Electronics Mech.20.07.2018 669. Which of the following is a variable - length
GSSSB Electronic Instructor-22.01.2017 coding system that uses 7 bits for normal
Ans : (b) Database normalization is the process of ASCII characters but uses 16 - bit Unicode as
preserving a relational database according to a series of needed to represent data?
staled normal forms in order to reduce data redundancy (a) Extended ASCII (b) UTF-8
and improve data integrity. (c) EBCDIC (d) BCD
664. A _______ is the primary unit of physical RRB Kolkata LP-2009
storage for data in a database. KPSC Jr. Instructor 22.11.2018
(a) table (b) trigger KPSC Instructor Electronics Mech.20.07.2018
(c) stored procedure (d) page Ans. (b) : UTF-8 is variable - length encoding system.
KPSC Jr. Instructor- 09.07.2014 Which uses 7 bits for normal ASCII characters, but it
HSSC wireman Instructor -17.12.2019, Shift-II uses 16-bit Unicode as needed to represent data.
Ans : (a) The table stores the intermediate query rules 670. Which of the following registers is used for
generated by DBMS during the processing of the storage of data, either coming to the CPU or
Application in the database. data being transferred by the CPU?
665. Which option does not indicate the object in (a) Program counter
Microsoft Access Database? (b) Memory Buffer register
(a) Column (table) (b) Form
(c) Memory Address register
(c) Module (d) Worksheet
KPSC Instructor Electronic-25.06.2014 (d) Accumulator
MP Electrician Instructor 07.11.2016, Morning
Ans : (d) Worksheet does not indicate the object in
Microsoft Access Database. Ans. (b) : A memory buffer register or memory data
666. Set of one or more attributes that can uniquely register is the register in a computers CPU that stores
identify tuples within a relation is called _______. the data being transferred to and from the immediate
(a) Candidate key (b) Foreign key access storage. If contains a copy of the value in the
(c) Master key (d) Primary key memory location specified by the memory address
GSSSB Electronic Instructor-21.01.2014 register.
HSSC Electrician Instructor -17.12.2019 671. What does the term 2 Gigaflops indicate?
Ans. (d) : A primary key is a special relational database (a) CPU is running at 2 GHz
table column (or carbonation of columns) that is named (b) CPU memory data transfer speed is 2Gb/s
to uniquely identify all table records. The main (c) Secondary memory space is equal to 2×230
characteristic of a primary key is that it contains a unique bytes
value for each row of data. It cannot curtain null value.
(d) The system can perform 2 ×230 floating point
667. What is the full form of SQL? operations per second.
(a) Simple Query Language
WBPSC Instructor-18.09.2021
(b) Structured Queuing Language
(c) Structured Query Language Ans : (d) Gigaflops is a unit of measurement used to
(d) Structured Queuing Lexicon measure the performance of a computers floating point
GSSSB Supervisor Electronic Instructor 18.01.2014 unit. Commonly referred to as the FPU. One gigaflops
KPSC Jr. Instructor- 09.07.2014 is one billion (1000,000,000) FLOPS or floating point
RRB Kolkata LP-2009 operations per second.
Ans. (c) : The full form of SQL is Structured Query 672. The Extended ASCII code uses __________ bits
Language. It is widely used to manage data in relational to represent each character.
database managements systems. (a) 7 (b) 4
Initially, it was known as SEQUEL (Structured English (c) 16 (d) 8
Query Language). It is designed to update, remove, HSSC wireman Instructor -17.12.2019, Shift-I
insert and delete data in a database. KPSC Instructor Electronic-25.06.2014
668. The number of rows in a relation (table) is Ans. (d) : Extended ASCII (American Standard Code
called _______ of the relation.
for Information Interchange) is a version that supports
(a) Degree (b) Tuples
(c) Attribute (d) Cardinality the representation of 256 different characters. This is
HSSC wireman Instructor -17.12.2019, Shift-I because Extended ASCII uses eight bits to represent a
UPPCL Technical Grade-II (Re-exam) 16.10.2016 character as opposed to seven in Standard ASCII where
Ans. (d) : Cardinality in the context of database refers 8 bits are used for error checking.
to the uniqueness of the data values. Contained in the 673. The ASCII code for the LF (Line Feed) in
column. High cardinality means that the column hexadecimal is
contains a large percentage of completely unique (a) 0D (b) 0A
values. Low cardinality means that the column has (c) 0C (d) 0B
many ''Repeats'' in its data range. The number of tables UPPCL Technical Grade-II (Shift-I) 27.03.2021
in a relation is called the Cardinality of the relation. KPSC Jr. Instructor 22.11.2018
Computer 70 YCT
ye
p
Ans. (b) : Line feed has ASCII code (\n or 0A) in Ans : (a) The basic ASCII codes use 7-bits for each
hexadecimal. \n is hexadecimal in string and 10 in character. This gives a total of 128 possible unique
decimal. CR (Carriage Return) has hexadecimal (\n or symbols. The extended ASCII character set uses 8-bits,
0D) and is 13 in decimal. which gives an additional 128 characters (i.e. 256 in total).
674. If the ASCII code of U is 01010101, then what 679. How many bits are required for each character
will be the ASCII code of V? to represent data in ASCII format in a
computer system?
(a) 01010100 (b) 01010110
(a) 7 (b) 5
(c) 01000110 (d) 01010111
(c) 9 (d) 10
UPPCL TG-II 25-01-2019 (Evening)
RRB Kolkata LP-2009
Ans : (b) The ASCII code of U is 85 in decimal system MP Electrician Instructor 07.11.2016, Morning
and the binary code of 85 is 01010101. While the Punjab Wireman instructor-07.07.2013
ASCII Code of V is 86 in decimal and the binary code Ans. (a) : American standard code for Information
of 86 is 01010110, so the ASCII of V is 01010110. Interchange (ASCII) is a standard for encoding
675. If the ASCII code of W is 01010111, then what characters in computer system.
will be the ASCII code at X? Standard ASCII code values range from 0 to 127.
(a) 01011001 (b) 01101000 ASCII uses 7 bits to represent a character.
(c) 01011000 (d) 01011100 Extended ASCII represents 256 characters.
UPPCL TG-II 20-03-2021 (Shift-I) 8 bits are required to represents it.
680. ASCII-7 is a 7 bit code and it can typically
Ans. (c) : The ASCII code of W is 01010111 then the
represents a maximum of _______ characters.
ASCII code of X is.
(a) 64 (b) 127
(c) 256 (d) 128
HSSC wireman Instructor -17.12.2019, Shift-II
Ans. (d) : The American Standard Code for Information
Interchange (ASCII) is a 7-bit character set consisting
In binary addition 1 + 0 = 1 and the value of 1 + 1 of 128 characters. It includes numbers 0-9 upper and
would have been 0 but a carry is left in them which is lower case English letters from A to Z and some special
added to the next digit. characters. Whereas the extended ASCII code is 8 bits
676. If the ASCII code of E is 01000101, then what long and its range is from 128 to 256.
will be the ASCII code of F? 681. ASCII-7 is a 7-bit code and can uniquely
(a) 01010110 (b) 01000110 represent a maximum of _____ classes.
(c) 01000111 (d) 11000110 (a) 128 (b) 256
UPPCL (TG-II) 24-01-2019 (EVENING) (c) 127 (d) 64
UPPCL (TG-II) 24-01-2019 (Morning)
Ans : (b) The ASCII code of E is 69 in decimal. When
we convert decimal to binary then it will be 01000101. Ans : (a) The 7 bit ASCII code definitely denotes 128
Whereas the ASCII code of F is 70. It is 01000110 characters. In this each number is expressed as a 7 digit
when we convert decimal to binary. binary number. Like 0000000, 1111111 will be binary
i.e (2)7 = 128.
677. The ASCII code of 7 is 00110111. What will be 682. Considering binary, octal, decimal and
the ASCII code of 8? hexadecimal, which of the following is a valid
(a) 00111000 (b) 00111001 number in all system?
(c) 11001000 (d) 00110010 (a) 8090 (b) A100
UPPCL TG-II 19-03-2021 (Shift-I) (c) 3030 (d) 1010
Ans. (a) : ASCII stands for American Standard Code KPSC Jr. Instructor 22.11.2018
for Information Interchange. ASCII code was created by Punjab Wireman instructor-07.07.2013
"American standards Association" committee. This Ans. (d) : In the above option 1010 will be correct
code was already used by the Bell Company in because binary is in the form of 0, 1 octal range from 0
telegraphy at that time. Previously only uppercase to 7 decimal is from 0 to 9 and hexadecimal is from 0 to
9 and A to F. Hence option (d) is valid in all.
letters and numbers were included, but in 1967
lowercase letters were added. It has a character set from 683. The computer code for interchange of
0 to 127, than later ASCII characters from 128 to 255 information between terminals is:
were added to it. So, ASCII code of 7 is 55 in decimal (a) ASCII (b) BCD
and binary representation is 00110111. ASCII code of 8 (c) BCDIC (d) Hollerith
is 56 in decimal and binary representation is 00111000. KPSC Instructor Electronic-25.06.2014
678. ASCII-8 is an 8-bit code and can uniquely Ans : (a) The computer code for the interchange of
information between terminals is ASCII. ASCII stands
represent a maximum of ____ characters for American Standard Code for Information
(a) 256 (b) 127 Interchange. Computers can only understand numbers,
(c) 255 (d) 128 so an ASCII code is the numerical representation of a
UPPCL (TG-II) 24-01-2019 (EVENING) character such as 'a' or '@' or an action of some fort.
Computer 71 YCT
ye
p
684. Which of the following is a non-weighted code. Ans : (a) Given the standard is 32 bit sign in 32 bit
(a) BCD (b) Binary floating point format S = 1 exponent E = 8, M = 23.
(c) Excess-3 (d) Decimal 689. Select the odd option.
GSSSB Electronic Instructor-21.01.2014 (a) Decimal (b) Binary
Ans : (c) The excess-3 code is a non-weighted coded (c) Octal (d) Hexadecimal
used to express code used to express decimal numbers. GSSSB Electronic Instructor-22.01.2017
It is a self complementary Binary Coded Decimal KPSC Jr. Instructor- 09.07.2014
(BCD) code and numerical system which has biased
Ans. (a) : Binary, Octal and Hexadecimal are all
representation. Gray code is also non weighted code.
number systems that are not commonly used for day-to-
685. Which of the following techniques of data day human calculations, whereas Decimal is the number
presentation typically presents the least sysetm we used in our daily lives.
number of character? 690. How many different addresses can be created
(a) EBCDIC (b) ASCII-8 using an 8-bit address line?
(c) BCD (d) ASCII - 7 (a) 128 (b) 256
UPPCL TG-II 25-01-2019 (Morning)
(c) 64 (d) 512
Ans : (c) BCD Stands for Binary Coded Decimal. In UPPCL TG-II 19-03-2021 (Shift-II)
this each decimal number is expressed as a 4-digit
binary code. Ans. (b) : There are 256 different unsigned 8-bit
numbers. The smallest unsigned 8-bit number is 0 and
686. The range of integer values that can be the largest is 255. For example 000010102 is 8+2 or 10.
represented using 16-bit 2's complement form
is 691. _______ is used to display binary data in a
(a) –32768 to + 32767 computer.
(b) –32767 to + 32767 (a) 0 and 1 (b) positive and negative
(c) –32767 to + 32768 (c) 0 and 2 (d) 1 and 2
(d) –32768 to + 32768 RRB Kolkata LP-2009
UKSSSC Tech. Electrical Instructor-21.11.2017 Ans : (a) In computer systems, a binary digit or bit is the
Ans : (a) A 16 bit integer can store 216 (or 65536) smallest unit of data. Each bit has a single value of either 1
distinct values. In an unsigned representation, these or 0, which means it can't take another value. Computers
values are the integers between 0 and 65535 using 2's can represent numbers using binary code in the form of
complement possible values range form –32760 to digital 1's and 0's inside the central processing unit and
32767. RAM.
687. Convert decimal –65 (negative 65) to 2's 692. For any number (e.g. 15), which of the
complement representation using 8-bit. following number system will use the largest
(a) 10101010 (b) 10101011 number of numbers (symbols) for
(c) 10111111 (d) 10001111 representation?
GSSSB Supervisor Electronic Instructor 18.01.2014 (a) Octal (b) Hexadecimal
Ans : (c) (c) Decimal (d) Binary
UPPCL TG-II 25-01-2019 (Evening)
Ans : (d) The binary number system uses the largest
number of digits for its representation in which the
number 1 and 0 are used.
693. The number of unique symbols used in the binary
number system is
(a) Sixteen (b) Ten
To extract 8 bit 2's complement, first the given number (c) Eight (d) Two
is converted into binary. If you change 0 to 1 in binary, DSSSB Craft Instructor (ESM) 06.10.2019
then if turns into is compliment. Adding 1 to 1's HSSC wireman Instructor -17.12.2019, Shift-I
compliment. If the number is negative then 2's is Ans. (d) : The binary number system is one such
increased by 1 before compliment. But if it is positive number system. In which 0 and 1 are used to represent
2's compliment is further increased to 0. numbers. The processor in the computer can easily
688. There are three fields in a standard 32 bit understand only binary numbers. The number formed
floating point format. Sign (S), Exponent (E) using 0 and 1 is a binary number whose base is 2.
and significant (M) which option represents the
correct bit width of these three fields. 694. What is the size of the following binary
(a) S = 1, E = 8, M = 23 sequence in nibbles?
(b) S = 3, E = 5, M = 24 1100101011010011
(c) S = 1, E = 5, M = 26 (a) 4 (b) 16
(d) S = 1, E = 10, M = 21 (c) 8 (d) 2
KPSC Instructor Electronics Mech.20.07.2018 UPPCL TG-II 25-01-2019 (Evening)
Computer 72 YCT
ye
p
Ans : (a) These are total 16 digits in Ans. (c) : Conversion of base B number 2020 to
1100101011010011, the size of each digits is 1 bit, so Decimal Number 60
there will be a total binary number of 16 bits. There are (2020)B = (60)10
4 bits in 1 nibble. So the size of the binary sequence 2×B3 + 0×B2 + 2×B1 + 0×B0
16 2B3 + 2B
will be 4 nibbles when divided into = 4 parts.
4 if B=3
695. In the Gray code, successive numeric values 2×33 + 2×3 = 54 + 6 = (60)10
differ only by _____bit. So base B = 3
(a) 1 (b) 3 701. To represent a 31-digit binary number, we need a
(c) 2 (d) 4 maximum of ______ digits in the decimal number
KPSC Jr. Instructor 22.11.2018 system.
Punjab Wireman instructor-07.07.2013 (a) 7 (b) 10
Ans : (a) A gray code is a coded binary representation (c) 11 (d) 15
of a decimal digit with a 1 bit position change for UKSSSC Tech. Electrical Instructor-21.11.2017
consecutive digits. MP Electrician Instructor 07.11.2016, Morning
Decimal digit Binary Gray code WBPSC Instructor-18.09.2021
0 000 000 Ans. (b) : To represent a 31-digit binary number, we need
1 001 001 a maximum of 10 digits in the decimal number system.
2 010 011 Given, n = 31
696. Which number system can computers (1……n)2 = (2n–1)10
understand? (111……..1(31))= (231–1)10
(a) Binary (b) Hexadecimal = (2147483648–1)10
(c) Octal (d) Decimal = (2147483647)10
UPPCL Technical Grade-II (Shift- II) 27.03.2021 = 10 digits
RRB Gorakhpur L.P.-2008
Punjab Wireman instructor-07.07.2013 702. Convert 89 into binary notation.
(a) 1100110 (b) 101110
Ans : (a) A computer can understand only the 'on' and
'off' state of a switch. These two states are represented (c) 1011011 (d) 1011001
by 1 and 0. The combination of 1 and 0 form binary HSSC Electrician Instructor -17.12.2019
numbers. KPSC Jr. Instructor 22.11.2018
697. How many different numbers can be Ans. (d) : (89)10 = (?)2
represented by one byte in the binary number
system?
(a) 255 (b) 264
(c) 263 (d) 256
UPPCL TG-II (20-03-2021) (Shift-II)
Ans. (d) : 1 byte = 8 bit
So 28 = 256 numbers can be represented.
698. How many unique binary codes can be (89)10 = (1011001)2
generated using 8 bits. 8 bits can represent a 703. Convert 13 to binary:
positive number from 0 to 255. (a) 1102 (b) 1011
(a) 255 (b) 128 (c) 1101 (d) 1111
(c) 256 (d) 512 Punjab Wireman instructor-07.07.2013
UPPCL TG-II 28-3-2021 (Shift-I) RRB Kolkata LP-2009
Ans. (c) : A maximum of 28 = 256 unique binary codes Ans : (c) (13)10 = (?)2
can be generated using 8 bits. 8 bits can represent a
positive number from 0 to 255.
699. Decimal Number System has a base of _______.
(a) 2 (b) 10
(c) 8 (d) 16
GSSSB Supervisor Electronic Instructor 18.01.2014
Ans. (b) : Decimal Number System is the number (13)10 = (1101)2
system in which a total of 10 numbers (0, 1, 2, 3, 4, 5, 6, 704. Select the option which gives the correct
7, 8, 9) are used to count calculate. So its base is 10. decimal equivalent result of 1001, 10011, 101
700. If the decimal number 60 is shown as 2020 in the and 110.
base B number system, then what will be B? (a) 9, 19, 4, 3 (b) 10, 19, 5, 6
(a) 2 (b) 5 (c) 9, 18, 5, 6 (d) 9, 19, 5, 6
(c) 3 (d) 4 UPPCL Technical Grade-II-09.08.2015
KPSC Instructor Electronics Mech.20.07.2018 RRB Gorakhpur L.P.-2008
Computer 73 YCT
ye
p
Ans : (d) Binary to decimal conversion
(1001)2 = (?)10
(1001)2 = 1 ×23 + 0 ×22 + 0 × 21 + 1 ×20
=8+0+0+1=9
(10011)2 = (?)10 So, gray code (1000).
(10011)2 = 1×24+ 0×23 + 0×22 + 1×21 + 1×20
= 16 + 0 + 0 + 2 + 1 = 19 709. The integer 89 is encoded in BCD format and
(101)2 = (?)10 stored in a single byte (8-bit) in packed form.
(101)2 = 1 ×22 + 0 × 21 + 1 × 20 Which of the following option best represents
=4+0+1=5 it?
(110)2 = (?)10 (a) 10101010 (b) 01011010
(110)2 = 1 × 22 + 1 × 21 + 0 × 20 (c) 10001001 (d) 10011000
=4+2+0=6 HSSC Electrician Instructor -17.12.2019
So, option (d) is correct. KPSC Jr. Instructor- 09.07.2014
705. Convert 101110 into decimal notation Ans : (c) When we convert 89 to BCD, we always make
(a) 44 (b) 56 a pair of four digits.
(c) 72 (d) 46
DSSSB Craft Instructor (ESM) 06.10.2019
UPPCL Technical Grade-II (Shift-I) 20.03.2021
Ans. (d) : (101110)2 = ( )10
= 1 × 25 + 0 × 24 + 1 × 23 + 1 × 22 + 1 × 21 + 0 × 20 8 9
= 32 + 0 + 8 + 4 + 2 + 0 = 46 ↓ ↓
(101110)2 = (46)10
1000 1001 → 10001001
706. Convert 11010 to Octal
(a) 32 (b) 36 710. What is the hexadecimal equivalent of the
(c) 26 (d) 46 binary bit string '111010001011110101"?
UKSSSC Tech. Electrical Instructor-21.11.2017 (a) E8BB1 (b) 3102155
KPSC Jr. Instructor 22.11.2018 (c) 3A2F5 (d) 753831
Ans. (a) : First convert binary into decimal then the RRB Kolkata LP-2009
resulting decimal into octal. Ans : (c) Hexadecimal number is one of the number
(11010)2 = (?)10 systems which has value is 16 and it has only 16
= 1 × 24 + 1 × 23 + 0× 22 + 1 × 21 + 0 × 20 symbols 0, 1, 2, 3, 4, 5, 6, 7, 8, 9 and A, B, C, D, E, F.
= 16 + 8 + 2 = 26 Where A, B, C, D, E, F are single bit representation of
(26)10 = (?)8 decimal value 10, 11, 12, 13, 14, 15 respectively.
(11010)2 = (32)8
707. Integers in computers are generally
represented using _____ representation.
(a) floating point (b) 9's complement
(c) 2's complement (d) 1's complement
DSSSB Craft Instructor (ESM) 06.10.2019
Ans : (c) Integers in any computer are generally
represented using 2's complement representation.
Because 2's complement representation always
represents a positive number, write 1 if the number is
negative and 0 if the number is positive.
708. Which of the following is the correct gray code
for the binary number (1111)2?
(a) 1111 (b) 1000
(c) 1100 (d) 1110
MP Electrician Instructor 07.11.2016, Morning 3 A 2 F 5
WBPSC Instructor-18.09.2021 00111010 001011110101 ⇒ (3A2F5)16
Ans : (b) The gray cache is also called the cyclic code, 711. What is the base of the Octal Number System?
the reflected binary code. To obtain the gray code, the
(a) 8 (b) 16
binary code is arranged in such a way that there is only
one digit difference between two consecutive values. (c) 32 (d) 64
Example– MP Electrician Instructor 07.11.2016, Morning
Computer 74 YCT
ye
p
Ans : (a) The octal number system has only eight digit The octal number system is a base-8 number system
from 0 to 7. Every number represents with 0, 1, 2, 3, 4, where the range of number is 0,1,2,3,4,5,6,7.
5, 6 and 7 in this number system. The base of the octal Octal digit Binary code
number system is 8 because it has only 8 digits. So 0 000
there maximum value of digit is 7 and it cannot be
1 001
more than 7.
2 010
712. Convert 110001 into octal notation
3 011
(a) 49 (b) 59
4 100
(c) 51 (d) 61
MP Electrician Instructor 07.11.2016, Morning 5 101
HSSC wireman Instructor -17.12.2019, Shift-II 6 110
Ans : (d) First convert (110001)2 into decimal. 7 111
1100001 = 1×25 + 1×24 + 0×23 + 0×22 + 0×21 + 1×20 = So if you make each group of 3 bit of binary input
32 + 16 + 0 + 0 + 0 + 1 number
(49)10 110 010 101 010 101
8 49
6 2 5 2 5
6 1
(01100101010101)2 = (62525)10
(61)8
716. Convert 1585 from decimal to hexadecimal
(110001)2 = (49)10 = (61)8 notation
713. The ASCII code for CR (Carriage Return) in (a) 631 (b) 580
octal is (c) 67D (d) 63A
(a) 10 (b) 12 UKSSSC Tech. Electrical Instructor-21.11.2017
(c) 11 (d) 15 Ans. (a) : (1585)10 to (?)16
HSSC Electrician Instructor -17.12.2019
KPSC Jr. Instructor 22.11.2018
Ans. (d) : 15 in octal is the ASCII code of CR and the
binary number of CR is (00001101)2. The decimal
number of CR (13)10, the hexadecimal number of CR (1585)10 =(631)16
(0D)16 etc. 717. If A and B are the inputs of a half adder, the
carry is given by _______.
714. What would be the 8's complement of an octal (a) A XOR B (b) A OR B
number 42500? (c) A AND B (d) A PXOR B
(a) 35200 (b) 35301 HSSC wireman Instructor -17.12.2019, Shift-II
(c) 35300 (d) 35100 Ans. (c) : If A and B are the inputs of a half adder, the
Punjab Wireman instructor-07.07.2013 carry is given by A AND B. While the sum is given by
Ans. (c) : Firstly find the 7's complement. A XOR B.
We obtain the 7's complement of an octal number by 718. There are three main logic operations.
(a) AND, OR, NOT
subtracting each digit from 7.
(b) XOR, AND, NOT
77777 (c) NAND, NOR, XOR
– 42500 (d) OR, NOR, XNOR
35277 → 7's Complement HSSC Electrician Instructor -17.12.2019
We add 1 in 7's complement obtain the 8's complement Punjab Wireman instructor-07.07.2013
35277 Ans : (a) A logical operator is a symbol or word used to
+ 1 connect two or more expressions such that the value of
the compound expression produced depends only on
(35300)8 → 8's Complement that of the original expressions and on the meaning of
So, 8's complement of (42500)8 is (35300)8. the operator. The main logical operators include AND,
715. The octal representation of the binary bit OR and NOT.
string ‘0110010101010101’ _______ . 719. Select the odd option from the following.
(a) 052671 (b) 165252 (a) Parity (b) 1's complement
(c) Checksum (d) CRC
(c) 62525 (d) 356789
GSSSB Electronic Instructor-21.01.2014
KPSC Instructor Electronic-25.06.2014
Ans : (b) In the options, parity, checksum, CRC (Cyclic
Ans : (c) Binary is the simplest kind of number system Redundancy Check) are all three bit related to error
that uses only two digits of 0 and 1 (i.e. value of detective. While 1's complement indicates that a given
base 2). bit is obtained an inverting.
Computer 75 YCT
ye
p
724. In which data transmission mode can two
VIII. Data Communication devices either send data or receive data but not
both at the same time?
720. Which of the following internet access methods (a) Complex (b) Simplex
relatively involves a large setup fee and (c) Half duplex (d) Full duplex
expensive equipment upfront? MP Electrician Instructor 07.11.2016, Morning
(a) Cable modem (b) Dial up HSSC wireman Instructor -17.12.2019, Shift-II
(c) DSL (d) Satellite Ans: (c) In half duplex, data transmission can send or
RRB Kolkata LP-2009
GSSSB Electronic Instructor-21.01.2014 receive data to a device. Both work cannot be done at
Ans. (d) : The term broadband commonly refers to high the same time. Like Walkie Talkie etc.
- speed internet access that is always on and faster than 725. Which of the following connection used phone
the traditional dial - up access. lines which carry digital signals instead of
1. Digital Subscriber Line (DSL) analog signals?
2. Cable Modem (a) DSL (b) Wi-Fi
3. Fiber (c) Dial-up (d) Satellite
WBPSC Instructor-18.09.2021
4. Wireless
HSSC wireman Instructor -17.12.2019, Shift-I
5. Satellite
Ans. (a) : Digital Subscriber Line (DSL) is a
6. Broadband over Power Lines (BPL)
communication medium which is used to transfer the
Satellite - Just as satellites orbiting the earth provide digital signal through phone line.
necessary links for telephone and television service,
they can also provide links for broadband. Satellite 726. Which protocol determines how to transform a
broadband is another form of wireless broadband and is stream of bytes in an IP packet while ensuring
also useful for serving remote or sparsely populated the quality of transport of this IP packet with
areas. reference to internet architecture?
(a) IP (b) ARP
721. The number of parallel wires in a computer (c) TCP (d) DHCP
system bus is known as . UPPCL Technical Grade-II (Shift-II) 20.03.2021
(a) Class of bus (b) Width of the bus KPSC Jr. Instructor- 09.07.2014
(c) Thickness of the bus (d) Length of the bus Ans. (c) : TCP stands for Transmission Control
Punjab Wireman instructor-07.07.2013
Protocol. All networks and protocols work on the
KPSC Jr. Instructor- 09.07.2014
TCP/IP model. This protocol determines how to
Ans. (b) : The bus is an internal combination with high transform the stream of bytes in an IP packet while
speed. It is used to send control signals and data ensuring the quality of transport of IP packets in the
between the processor and other components. The context of the Internet architecture.
number of identical wires in a computer system bus is
known as bus width. 727. Which of the following statements is/are true
about data communication?
722. Which of the following is an INVALID (i) It is an action of sending or receiving data.
transmission mode? (ii) In data communication, a protocol is a
(a) Full-Duplex (b) Simplex hardware that transfers messages from the
(c) Complex (d) Half-Duplex sender to the receiver.
RRB Kolkata LP-2009 (a) Only (i) (b) Only (ii)
DSSSB Craft Instructor (ESM) 06.10.2019 (c) Both (i) and (ii) (d) Neither (i) nor (ii)
Ans. (c) : Transmission mode means transferring data UPPCL Technical Grade-II (Shift-I) 19.03.2021
between two devices. It is also known as a Punjab Wireman instructor-07.07.2013
communication mode. There are three types of Ans. (a) : Data communication refers to the process of
transmission mode. transmitting and receiving data or information between
(i) Simplex Mode two or more devices or systems using various methods
(ii) Half Duplex Mode and mediums. So, statements (i) is correct and Protocol
(iii) Full Duplex Mode is not a hardware, Therefore statements (ii) is incorrect.
While complex mode is not transmission mode. 728. Find out whether the given statements are true
723. Which of the following communications is the or false regarding the Internet.
method of communication between processes (i) The effectiveness of data transmission
through which they interact with each other for depends greatly on the computer used to
gaining access to shared data and resources? send and receive the data.
(a) Inter-process (b) Intra-process (ii) The internet can be viewed as two major
(c) Multi process (d) Scheduling process components: network protocols and
RRB Gorakhpur L.P.-2008 hardware.
HSSC Electrician Instructor -17.12.2019 (a) (i) - False, (ii) - False
Ans. (a) : Inter process communication is the (b) (i) - True, (ii) - True
mechanism provided by the operating system to allow (c) (i) - False, (ii) - True
processes to communicate with each other. Through this (d) (i) - True, (ii) - False
one can get access to resources and share data with KPSC Instructor Electronic-25.06.2014
them. GSSSB Electronic Instructor-21.01.2014
Computer 76 YCT
ye
p
Ans. (c) : (i) The effectiveness of data transmission Ans. (d) : Fiber optic transmits internet traffic at the
depends on delivery, accuracy, timeliness and Jitter. speed of light.
Hence the statement (i) is false. 734. Which of the following Internet access methods
(ii) The Internet can be seen as two major components. uses Wi-Fi technology which enables electronic
Network protocols and hardware Hence statement (ii) is true. devices to connect to the internet or exchange
729. Select the INVALID type of wireless data wirelessly through radio waves?
communication medium. (a) ISDN (b) WIFI hotspots
(a) Optical fibre (b) Broadcast radio (c) Cable (d) Dial-up
(c) Satellite (d) Infrared RRB Bengaluru LP-2004
UKSSSC Tech. Electrical Instructor-21.11.2017 Punjab Wireman instructor-07.07.2013
GSSSB Supervisor Electronic Instructor 18.01.2014 Ans. (b) : Hotspots utilize Wi-Fi technology, which
Ans. (a) : Optical fiber is a wired communication allow electronic devices to connect to the Internet or
medium optical fibers are used to connect computers exchange data wirelessly through radio waves.
and other devices in high-speed networks. 735. CSMA is a method which was developed to
730. The full form of Wi-Fi is _____. decrease the chances of collisions when two or
(a) Wired Files (b) Wireless File more stations start sending their signals over
(c) Wireless Finder (d) Wireless Fidelity the data link layer. What does CSMA stand
KPSC Instructor Electronics Mech.20.07.2018 for?
GSSSB Electronic Instructor-22.01.2017
(a) Carrier Sense Multiplexed Access
Ans. (d) : The full name of Wi-Fi is Wireless Fidelity. (b) Carrier Signal Modulated Access
It is a Wireless technology through which we use (c) Carrier Signal Multiplexed Access
internet and network connection without wire.
(d) Carrier Sense Multiple Access
731. Which among the following is NOT true with UPPCL-JE 31-01-2019 (Batch -01)
reference to wireless networks?
Ans: (d) Carrier Sense Multiple Access (CSMA) is a
(a) Wireless means without wire, media that is
made up of electromagnetic waves (EM method. Which was developed to reduce the possibility
Waves) or infrared waves of collision when two or more stations start sending
(b) They are more secure and hence reliable their signals over the data link layer.
when compared to wired networks. 736. What do you call the range of frequencies
(c) Installation is quick when compared to wired contained in a composite signal?
networks (a) Signal Strength (b) Signal Weight
(d) Slow transmission speed when compared to (c) Signal Width (d) Bandwidth
wired networks UPPCL-JE 31-01-2019 (Batch -01)
UPPCL Technical Grade-II (Shift-II) 20.03.2021 Ans: (d) The range of frequencies contained in a
DSSSB Craft Instructor (ESM) 06.10.2019 composite signal is called bandwidth. If you want better
Ans. (b) : Wireless means without wire, Media communication and Video, Audio than mobile then
composed of electromagnetic waves or infrared waves. bandwidth should be large.
Antennas or sensors will be present on all wireless 737. With the growth of the Internet, a wide range
devices compared to wired networks. Wireless networks
have slow transmission speeds. It is less secure than of _____ have transformed social relationships,
wired and therefore less reliable. Wireless network education and the dissemination of
installation and maintenance costs are low. information.
(a) Information and Communication
732. Four types of channels used in data
Technologies
communication of LAN are twisted pair cable,
coaxial cable,...............and radio waves: (b) Financial Services
(a) ISDN cable (b) PSDN cable (c) Storage Services
(c) X-ray waves (d) Fiber optics (d) Security Services
(UPPCL TG2 11-11-2016) UPPCL Technical Grade-II (Shift-I) 19.03.2021
RRB Kolkata LP-2009
Ans : (d) There are four system used in data
transmission of LAN Twisted pair cable, Coaxial cable, Ans : (a) Information and Communication Technology
Fiber optic cable (all three physical connections) and (ICT) is a multi-faceted term for Information
radio waves (micro web media). Optic fiber cable is the Technology (IT) that has changed social relations,
latest technology of communication media in which education and dissemination of information with the
data is sent by laser devices at the speed of millions of development of the internet.
bits per second. 738. RS 232C asynchronous serial communication.
733. Which is the transmission medium used to Which of the following option is correct?
transmits internet traffic at a speed of light? (a) <start-bit: 1><data Bits: 5/6/7 or
(a) Co-axial only 8bits><parity:1 bit><stop bit:1>
(b) ISDN (b) <Start-bit: 1><data Bits: 5/6/7 or 8bits>
(c) Satellite Network Service 1
(d) Fiber optic [<parity: 1 bit>]<stop bit: 1/ 1 or 2 bits>
UPPCL TG-II (20-03-2021) (Shift-II) 2
Computer 77 YCT
ye
p
(c) <start-bit:2><data Bits: 5/6/7 or 8bits> 743. Which of the following is a disadvantage of the
<parity:1 bit><stop bits:1> Dial-up Internet Access method when
(d) <start-bit:2><data Bits: 5/6/7 or 8bits><stop compared with DSL and cable modem?
bit:> (a) Low speed (b) Limited perimeter
RRB Gorakhpur L.P.-2008 (c) Security risk (d) Expensive
MP Electrician Instructor 07.11.2016, Morning UPPCL Technical Grade-II (Re-exam) 16.10.2016
HSSC wireman Instructor -17.12.2019, Shift-II GSSSB Supervisor Electronic Instructor 18.01.2014
Ans : (c) In case of RS 232C asynchronous sequential Ans. (a) : Dial-up Internet access is a low-speed
communication choose the following– Internet connection when compared with DSL (Digital
<Start-bit2><data bits 5/6/7 or 8 bits><parity: 1 Subscriber Line) and cable modem.
bit><stop bits1> Dial-up connections use a standard phone line and
analog modem to access the Internet at data transfer
739. Which of the following is not a basic component rates of up to approximately 56–64 Kbps. Dial-up
of fiber optic communication system? connections are the cheapest way to access the Internet,
(a) Low Loss Optical Fiber but they are also the slowest connections.
(b) Light Detector 744. Which of the following is a communication
(c) Compact Light Source service provided by the internet?
(d) Fiber Splicer (a) Gopher (b) Archie
HSSC wireman Instructor -17.12.2019, Shift-I (c) Telnet (d) FTP
WBPSC Instructor-18.09.2021 UPPCL Technical Grade-II-26.06.2016
Ans : (d) Fiber optic communication system is a system UKSSSC Tech. Electrical Instructor-21.11.2017
in which light pulse of optical fiber sends information Ans. (c) : Telnet is an application layer protocol that
from one place to another. Its main components are enables one computer to connect to local computer. It is
optical fiber, light detector, compact light source etc. a used as a standard TCP/IP protocol for virtual
Whereas fiber splicer is a process by which two connect terminal service. It provides bi-directional text -
the fibers together. oriented communication in the network.
740. In data communication, be it data or digital 745. Which of the following statements is false about
HTTPS?
could. (a) It ensures protection against man-in-the -
(a) Electronic (b) Imaginary middle attacks
(c) Analog (d) Electrical (b) Due to the use of encryption, communication
HSSC Electrician Instructor -17.12.2019 between two hosts using HTTPS is secure
KPSC Jr. Instructor 22.11.2018 (c) It is more secure than HTTP
Ans : (c) Data communication is a medium by which (d) It cannot be used for financial transaction
information is exchanged and in this data is transmitted KPSC Instructor Electronic-25.06.2014
in the form of analog or 0, 1. GSSSB Electronic Instructor-21.01.2014
Ans. (d) : HTTPS is short form of Hyper Text Transfer
741. Which of the following communication Protocol Secure. It is secure version of the HTTP
protocols is used to interconnect network protocol which is used for communication between a
devices on the internet? web browser and a websites. HTTPS uses encryption
(a) HTTP (b) FTP protocols, such as SSL (Secure Sockets Layer) or its
(c) TCP/IP (d) WWW successor, TLS (Transport Layer Security) to establish a
UP PCL Technical Grade-II-11.11.2016 secure connection. It can be used for financial.
KPSC Jr. Instructor- 09.07.2014 Transaction, so statement (d) is false to HTTPS.
Ans. (c) : TCP/IP Transmission Control 746. Which layer protocol is in DNS internet
Protocol/Internet Protocol is an application layer architecture?
protocol that enables application programs and Internet (a) Transport (b) Application
devices to exchange messages over a network. (c) Data Link (d) Network
742. A cell phone connected to a Bluetooth headset UPPCL Technical Grade-II-02.08.2015
or a mobile computer connected to a portable Punjab Wireman instructor-07.07.2013
Bluetooth thermal printer is an example of a Ans. (b) : The full name of DNS is 'Domain Name
______. System'. It converts domain names to IP addresses.
(a) SAN (b) MAN The full name of OSI model is 'Open System Inter
(c) PAN (d) LAN Connection. It was developed by ISO in 1984 and this
KPSC Instructor Electronics Mech.20.07.2018 model consists of 7 layers.
(i) Physical layer
GSSSB Electronic Instructor-22.01.2017 (ii) Data link layer
Ans. (c) : A cell phone connected to a Bluetooth (iii) Network layer
headset or a mobile computer connected to a portable (iv) Transport layer
Bluetooth thermal printer is an example of a Personal (v) Session layer
Area Network (PAN). PAN is a computer network that (vi) Presentation layer
is used to connect personal devices such as laptops, (vii) Application layer
mobile phones, media players and play stations. This Protocols like HTTP, FTP, SMTP and NFS are used in
network was developed by Thomas Zimmerman. This the application layer. DNS is an application layer
network helps in communication. protocol in the internet architecture.
Computer 78 YCT
ye
p
747. What does the Internet OSI Model stand for? Ans. (b) : VPN is the short form of Virtual Private
(a) Open System Interconnection Model Network. It is an encrypted connection from a device to
(b) Open Service International Model a network and the internet. VPN, are an extension of a
(c) Open Space Internet Model private network to a public network. This technology is
(d) Open Software Internet Model widely used in the corporate environment.
KPSC Jr. Instructor 22.11.2018 752. Which of the following terms best describes the
Ans. (a): The OSI Stands for Open System process of interconnecting two or more
Interconnection Model. It is a conceptual model from the networks to form a single large network?
International Organization for standardization (ISO) that (a) Merging (b) Intranet
provides a common basis for the coordination of standards (c) Virtualization (d) Internetworking
development for the purpose of systems Interconnection. RRB Gorakhpur L.P.-2008
748. Protocols that require a logical connection to KPSC Instructor Electronic-25.06.2014
established between two devices before Ans. (d) : Internetworking is made up of two words.
transferring data are called: Inter and networking which means connection between
(a) Connection-oriented protocols completely different nodes or segments. This connection
(b) Link-to-connection protocols unit is established through interconnecting devices
(c) Data transfer protocols similar to routers or get ways. This interconnection is
(d) Broadcasting protocols often between public, private, commercial, industrial or
RRB Bengaluru LP-2004 government networks. Internetworking refers to the
Ans. (a) : A connection-oriented protocols is a business, products and process that are connected to
communication protocol that established a reliable/ intermediate networking devices that act as a vast
dedicated connection between two devices before network. Which meets the challenge of creating and
transmitting data. administering the internetwork.
749. Which of the following statement is wrong? 753. Which of the following refers to a set of rules
(i) Congestion control protocols ensure that for routing and addressing packets of data so
the sender cannot send data faster than the that they can travel across a network and reach
limit on which the receiver can receive data. the correct destination?
(ii) Flow-control protocols ensure that the (a) Model (b) Topology
sender cannot send data faster than the (c) Protocol (d) Architecture
network can transmit data. DSSSB Craft Instructor (ESM) 06.10.2019
(a) Neither (i) nor (ii) (b) Both (i) and (ii) Ans. (c) : The Internet Protocol is a protocol or set of
(c) Only (ii) (d) Only (i) rules, for routing and addressing packets of data so that
UKSSSC Tech. Electrical Instructor-21.11.2017 they can travel across networks and arrive at the correct
Ans. (b) : Flow control in data communication is the destination.
process of managing the rate of data transmission 754. In the abbreviation HTTPS, what is the full
between two nodes by preventing a faster sender from form of the second 'T'?
over whelming a slower receiver. Provides a mechanism (a) Truncation (b) Termination
for the receiver to control the transmission speed by (c) Transition (d) Transfer
which the sender is able to transmit data through the MP Electrician Instructor 07.11.2016, Morning
network. Cannot sent data faster than a limit. Ans. (d) : The full form of HTTPs is Hyper Text
Congestion-control protocols have a problem that can Transfer Protocol secure. This is an extended secure
occur at any time in a packet switched network. This
version of HTTP. It is used for secure communication
can happen when there are too many packets in a subnet
on computer network.
within the network. This a situation arising in the
network layer where the message traffic is so high that 755. Which of the following statements are correct?
it significantly slows down the response time of the (i) TCP/IP is more reliable than OSI.
network. (ii) TCP/IP does not have very strict
750. Which of these establishes communication boundaries between layers.
between servers and work stations? (a) Both (i) and (ii) (b) Neither (i) nor (ii)
(a) Interspace (b) Backbone (c) Only (ii) (d) Only (i)
(c) Terminal Access Point (d) Gateway WBPSC Instructor-18.09.2021
RRB Kolkata LP-2009 Ans. (a) : (i) TCP/IP is more reliable than OSI.
Ans. (c) : Terminal Access Point servers to establish (ii) TCP/IP does not have very strict boundaries
connectivity between different server and work between layers.
locations, so that data can be changed. Hence, the both statements are correct.
751. Which of the following extends a private 756. TCP provides a _____ data stream between
network to a public network? remote applications.
(a) Wide area network (a) Reliable, two-way
(b) Virtual private network (b) Reliable, one-way
(c) Enterprise private network (c) Unreliable, one-way
(d) Local area network (d) Unreliable, two-way
GSSSB Electronic Instructor-21.01.2014 HSSC wireman Instructor -17.12.2019, Shift-I
Computer 79 YCT
ye
p
Ans. (a) : TCP stands for Transmission Control Ans. (a) : An IP address is a unique address that
Protocol. It is a group of Internet protocol. It is used for identifies a device on the internet and local network. It
data transmission in communication networks such as is string of numbers separated by a period (.). Four
the Internet. It provides a two way data stream between integers from zero to 255 are used in IP address
remote application. 200.200.256.200 is an invalid IP address because 256
757. With respect to TCP/IP, what is the full form of has been used in this which violates its rule.
TFTP? 762. A firewall is
(a) Trivial File Transfer Protocol (a) an established network performance reference
(b) Triangular File Transmission Protocol point
(c) Trivial File Transfer Page (b) a network security system designed to isolate
(d) Triangular File Transfer Protocol a private network from a public network
HSSC wireman Instructor -17.12.2019, Shift-II (c) a virus that infects macros
Punjab Wireman instructor-07.07.2013 (d) a predefined encryption key used to encrypt
Ans. (a) : Trivial File Transfer Protocol (TFTP) is a and decrypt data transmissions
simple protocol for exchanging files between two UKSSSC Tech. Electrical Instructor-21.11.2017
TCP/IP machines. TFTP servers allow connections to Ans. (b) A firewall is a network security device that
TFTP clients to send and receive files. monitors incoming and outgoing network traffic and
TFTP - Trivial File Transfer Protocol decides whether to allow or block specific traffic based on
TCP/IP- Transmission Control Protocol/Internet Protocol a defined set of security rules.
758. IMAP protocol is used in: 763. Which of the following statements is/are true
(a) E-mails (b) Image processing regarding data communication?
(c) Encryption (d) File transfer (i) It is simply the act of sending or receiving
HSSC Electrician Instructor -17.12.2019 text messages.
KPSC Jr. Instructor 22.11.2018 (ii) Protocol is set of rules which one to be
Ans. (a) : IMAP (Internet Message Access Protocol) is followed by sender and receiver at the time of
a protocol used for retrieval and storage of emails via the data communication.
TCP/IP connections to email servers. It is an application (a) Both (i) and (ii) (b) Neither (i) or (ii)
layer protocol based on the OSI model. (c) Only (ii) (d) Only (i)
759. Which of the following protocol (TCP/IP) UPPCL Technical Grade-II-02.08.2015
handles the exchange of messages between e- Ans. (c) : Data communication is a process in which
mail services on a network? digital data and analog are exchanged between two or
(a) FTP (b) HTTP more computers. Messages can contain text, number,
(c) SMTP (d) TELNET picture, audio, video etc. Hence statement (ii) is true.
UPPCL TG-II 19-03-2021 (Shift-I) 764. Which of the following is the transmission
control protocol/Internet Protocol (TCP/IP)
Ans. (c) : SMTP is the short form of Simple Mail
that specifies how computers will exchange
Transfer Protocol. There is a set of SMTP electronic mail?
communication guidelines. Software that allows to
(a) Simple Mail Transfer Protocol (SMTP)
transmit electronic mail over the internet allows. SMTP is
used to send messages to other computer users based on (b) Hypertext Transfer Protocol (HTTP)
e-mail addresses. (c) User Database Protocol (UDP)
(d) File Transfer Protocol (FTP)
760. What is the meaning of the term TCP/IP?
UPPCL TG-II 27-03-2021 (Shift-I)
(a) Transmit Control Protocol/Internal Protocol
Ans. (a) : SMTP (Simple Mail Transfer Protocol ) is an
(b) Transmission control protocol/Internet protocol
application that is used to send, receive outgoing e-mails
(c) Transport control protocol/Internet protocol between sender and receiver. When an e-mail is sent, it
(d) Transmission control permission/Internet uses the SMTP protocol. This protocol specifies the
protocol exchange of e-mail.
UPPCL TG-II 28-3-2021 (Shift-I) 765. A TCP is a ____ protocol, while UDP is a ___
Ans. (b) : TCP/IP is the short form of the Transmission protocol.
Control Protocol/Internet Protocol. TCP ensures end to (a) Connection - oriented - connection - less
end delivery of data to different nodes. TCP works in (b) Application - layer connection - oriented
conjunction with IP. Before transferring data, TCP (c) Connection - less connection - oriented
establishes a connection between the source and the (d) Connection - less application - layer
destination. GSSSB Supervisor Electronic Instructor 18.01.2014
761. Which of the following is not a valid IP Ans. (a) : A TCP is connection - oriented protocol while
address? UDP is connectionless protocol.
(a) 200.200.256.200 (b) 90.90.90.90 TCP is reliable for maintaining a connection between
(c) 100.100.100.100 (d) 10.10.10.10 sender and receiver UDP is connection less and due this
UPPCL TG-II 28-3-2021 (Shift-I) it is unreliable to transfer data.
Computer 80 YCT
ye
p
766. In which layer of the Internet architecture do Ans. (b) : ARPANET is a wide area network invented
various protocols included for building by ARPA in 1969. This is an American Institution.
Internet services? APRANET was the world's first network in which
(a) Application (b) TCP TCP/IP model was used.
(c) IP (d) Physical 772. What is the size of the source port in a TCP
KPSC Instructor Electronics Mech.20.07.2018 header?
Ans. (a) : The Internet architecture is a meta-network (a) 16 bytes (b) 32 bytes
that refers to a group of thousands of separate networks (c) 16 bits (d) 32 bits
interacting with a common protocol. It is the third KPSC Jr. Instructor- 09.07.2014
application layer which includes various protocols for Ans. (c) : Source port is a 16 bit field that specifies the
building Internet services such as email (SMTP), file port number of the sender destination port. This is a 16
transfer (FTP), transfer of hypermedia pages, transfer of bit field that specifies the receiver number and sequence
distributed databases (World Wide Web) etc. number 32 bit is the field that describes how much data
767. Which layer of internet architecture includes is sent during a TCP session. The TCP header source
protocols that provide services like SMTP and port identifies the port of the sending application.
FTP?
773. "Baud" is a unit of ______.
(a) Data link (b) IP
(a) Wavelength (b) Frequency
(c) Application (d) TCP
(c) Storage capacity (d) Data transfer rate
GSSSB Electronic Instructor-22.01.2017
RRB Kolkata LP-2009
Ans. (c) : Application layer is the 7th layer of the OSI
model. This layer uses protocols like HTTP, FTP, Ans. (d) : Baud is a unit of transmission for information
SMTP and NFS etc. over a digital communication channel usually equal to the
number of bits information transmitted per second. Speed
768. What is TCP/IP in nature?
in baud indicates the number of signaling events per
(a) It is a kind of router hardware.
second.
(b) It is a protocol
(c) It is a kind of router software 774. Which of the following is not a component of a
(d) It is an email service computer network?
UPPCL Technical Grade-II-26.06.2016 (a) NIC (b) Router
Ans. (b) : TCP/IP, stands for Transmission Control (c) Switch (d) USB
Protocol/Internet Protocol, is a suite of communication GSSSB Electronic Instructor-22.01.2017
protocols that underlies the internet and most local area Ans. (d) : There are three computer networking devices
networks. It provides the foundation for data transmission such as NIC, Router, Switch where as a USB drive is a
and connectivity in modern computer networks. data storage device.
769. Which of the following is a well - known USB drive- A USB drive is a device used to store data
protocol for data communication over the that consists of flash memory and an integrated
Internet? Universal Serial Bus (USB) interface included. Most
(a) HTTP (b) SMTP USB flash drives are removable and rewritable. It is
(c) SNMP (d) TCP/IP small, durable and reliable. There are bigger their
UPPCL Technical Grade-II (Re-exam) 16.10.2016 storage space, the faster they will work.
Ans. (d) : The full form of TCP/IP is Transmission 775. Identify whether the following statements are
Control Protocol/Internet Protocol. It is a set of rules true or false.
and procedures that govern how the Internet works. i) Switching at the network layer on the
Hyper Text Transfer Protocol (HTTP) is an application internet uses the datagram approach to
layer stateless protocol used for file transfer.
packet switching.
Simple Mail Transfer Protocol (SMTP) is used to send
and receive e-mail. Simple Network Management ii) The Internet Protocol version 4 (IPv4) is
(SNMP) is a popular protocol for network management. the delivery mechanism used by TCP/IP
protocols.
770. What is the network byte order used in
TCP/IP? iii) An IPv4 address is represented by 8 bytes.
(a) Middle Endian (b) Random (a) i-False, ii-True, iii-True
(c) Big Endian (d) Little Endian (b) i-True, ii-True, iii-False
UP PCL Technical Grade-II-11.11.2016 (c) i-True, ii-False, iii-True
Ans. (c) : The network addresses in a given network must (d) i-False, ii-False, iii-True
all follow a consistent addressing convention. This RRB Gorakhpur L.P.-2008
convention known as network byte order, defines the bit- Ans. (b) : The datagram approach to packet switching is
order of network addresses as they pass through the used by switching at the network on the internet. In this
network. TCP/IP standard network byte order is big-Endian. network the two delivery mechanisms Internet Protocol
771. Which of the following technologies is the versions IPv4 and IPv6 are used by TCP/IP protocols.
oldest? The IPv4 address is a 32-bit number that is written in
(a) NSFnet (b) ARPANET decimal digits of 8-bit fields. Each field is represented
(c) Interspace (d) Internet by 8-bit field that represents a byte. The IPv6 address is
KPSC Jr. Instructor- 09.07.2014 a 128-bit number.
Computer 81 YCT
ye
p
776. Which of the following is responsible for Ans. (c) : Wired local area network is a local area
reassembling received packets at recipient network where data is transferred over optical fiber or
computer? cable rather than using electrical waves.
(a) IP 781. Which of the following WAN technology is a
(b) TCP data communication technology in which
(c) TCP and IP both software is used to create a virtual network on
(d) Neither TCP and nor IP top of another network, usually over a
DSSSB Craft Instructor (ESM) 06.10.2019 hardware and cabling infrastructure?
Ans. (b) : TCP is a short form transmission control (a) Packet switching (b) Overlay network
protocol. The function of TCP is to break the (c) Packet over SONET (d) Circuit switching
information and message in to pieces so that data can be KPSC Instructor Electronics Mech.20.07.2018
delivered to the target through IP, after which TCP Ans. (b) : An overlay network is a computer network
again converts the pieces of data same form. that is built on top of an existing network, typically the
777. Which of these is NOT a switching techniques? internet. It is often used to create additional network
(a) Circuit Switching services or to connect geographically dispersed nodes.
(b) Data Switching Overlay network is a WAN - based data
(c) Packet Switching communications technology that uses software, usually
(d) Message Switching a hardware and cabling infrastructure is used for.
MP Electrician Instructor 07.11.2016, Morning 782. Which of these networks usually spread over
Ans. (b) : A network switch is a computer networking countries?
device used receive, process and forward data to the (a) PAN (b) LAN
destination device. Circuit switching, are switching (c) WAN (d) MAN
techniques where as data switching is not. RRB NTPC 24.07.2021 (Shift-II) Stage Ist
778. The perspective of geographic area coverage, Ans. (c) : WAN stands for Wide Area Network is a
which of the following categories of networks digital communication system that internally connects
has the greatest coverage? various sites. computer installation and user terminals.
(a) PAN (b) WAN This type of networks has been developed to operate at
(c) LAN (d) MAN country level, globally technologies.
HSSC wireman Instructor -17.12.2019, Shift-I 783. Technologies like ATM, SONET and Frame
Ans. (b) : Wide Area Network (WAN) is a network that Relay are used by :
works as networking between a very large geographical (a) LAN (b) PAN
area like city, country. A good example of WAN (c) WAN (d) MAN
network is the Internet. GSSSB Supervisor Electronic Instructor 18.01.2014
LAN-In Local Area Network a fixed and small Ans. (c) : WAN short form of Wide Area Network is
geographical area is connected together, such as office, used to technique like ATM, SONET and Frame Relay.
school. Frame relay is a standardized. Wide Area Network
MAN - Metropolitan Area Network connects different (WAN) technology which specifies the physical and
computers located in a city. data link layers of digital telecommunication channels
MAN network is larger than LAN but smaller than using a packet switching method. WAN technology,
WAN. Asynchronous Transfer Mode (ATM) is a transfer
PAN - Personal Area Network (PAN) is a personal mode. Organizes information efficiently and flexibly
network of a company. into cells for switching and transmission standardized.
779. Internet is the best example of: SONET stand for synchronous optical networking is a
(a) WAN (b) MAN standardized digital communication protocol used to
(c) VLAN (d) LAN conduct large amounts of data over long distances.
WBPSC Instructor-18.09.2021 784. Which of the following statement is true
Ans. (a) : Internet is the best example of WAN (Wide regarding WAN?
Area Network). Which connects different cities or (i) The network in an office building can be a
country and state. ie. spread all over the world. WAN is WAN.
a type of network that transmits voice, data, images, (ii) WANs use technologies such as MPLS,
videos in a geographical area. It is a group of Local ATM, Frame Relay and X.25 for
Area Networks (LANs). connectivity over long distance.
780. Which of the following is probably the most (a) Only (i) (b) Both (i) and (ii)
common LAN type that transfers data over (c) Only (ii) (d) Neither (i) nor (ii)
optical fiber (or cable variants) rather than HSSC Electrician Instructor -17.12.2019
using electrical waves? Ans. (c) : WAN is a abbreviation Wide Area Network.
(a) Token ring This is made by LAN (Local Area Network). It is
(b) (Wireless LAN) LAN network of networks. The internet leads the largest
(c) (Wired LAN) LAN WAN network. LAN is use only offices and building. It
(d) Token bus uses technologies like, MPLS, ATM, frame relay and
HSSC wireman Instructor -17.12.2019, Shift-II X.25 for connectivity over long distances.
Computer 82 YCT
ye
p
785. At the link layer, what is the length of the MAC Ans : (c) There are minimum two computer required to
address? build computer network because in any network a
(a) 48 bits (b) 64 bits transmitter is required on the receiver side.
(c) 32 bits (d) 128 bits 791. Which among the following cannot be shared
KPSC Jr. Instructor 22.11.2018 on network?
Ans. (a) : MAC Addresses are unique 48 bit hardware (a) Disk (b) Printer
numbers of a computer that are embedded into a (c) Processor (d) CD ROM
networks card during manufacturing. The MAC UPPCL Technical Grade-II (Shift-II) 19.03.2021
Address is also known as the Physical Address of a Ans. (c) : Disks, Printers and CD ROMs can be shared
network device.
through the network but the processor is the part of the unit
786. The general length of a MAC address is: of the motherboard of a PC that helps the system to run.
(a) 42 bits (b) 40 bits
792. Which among the following terms is related to
(c) 38 bits (d) 48 bits network security?
Punjab Wireman instructor-07.07.2013 (a) DSL (b) MIT
Ans. (d) : A MAC address length is 48 bits. Which are (c) W3C (d) Firewall
usually divided in separate pair of 12 Hexa-decimal
KPSC Jr. Instructor- 09.07.2014
digits (0 to 9, a to f, A to F) is represent as a string.
These are often followed by a colon or dash. Ans. (d) : Firewall is a system to protect the computer,
which protect all type of computer and its network from
787. When one device attempts to send a message to
hackers and malware. Firewall protects of our computer
another device, the data is sent over the
from aggressive software, which secretly gets inside our
internet in the form of manageable packets and
computer and passes all personal details to the hackers
each packet is assigned a ____ that will connect
who send the software.
it to its endpoint.
(a) network number (b) computer number 793. Which of the following command is used to
(c) port number (d) router number view the entire route through, which internet
UKSSSC Tech. Electrical Instructor-21.11.2017 traffic is transferred from your computer to
the remote server in Windows system?
Ans. (c) : When one device attempts to send a message
to another device, the data is sent over the internet in the (a) setrt (b) tracert
form of manageable packets and each packet is assigned (c) getrt (d) uart
a port number that will connect it to its endpoint. UP PCL Technical Grade-II-11.11.2016
Port number is a number assigned to uniquely identify a Ans. (b) : The tracert router (tracert) command is used
connection endpoint and to direct data to a specific to determine that path between two connections.
service. At the software level, within an operating Frequently passing the connection to another device
system, a port is a logical construct that identifies a through multiple routers.
specific process or a type of network service. 794. Which type of firewall monitors the connection
788. Which of the following is used to give a name to setup and teardown process to keep a check on
the IP address, so that the user can locate the connections at the TCP/IP level?
computer by name through the Internet? (a) Stateful
(a) TCP/IP (b) DNS (b) Application-level-gateway
(c) UDP (d) HTTPS (c) Statless
GSSSB Electronic Instructor-21.01.2014 (d) Circuit-level gateway
Ans. (b) : DNS stands for Domain Name System. UPPCL-JE 31-01-2019 (Batch -01)
When you type a web address into your browser, DNS
translate that human- readable domain name into an Ans: (a) Stateful firewall monitors the connection setup
IP address, which computer use to identify each other and teardown process to check the connection at TCP/IP
on the network. This translation allows your computer level.
to find and connect to websites server. 795. Which gateway is an intermediate solution
789. To which among the following 255.255.255.0 between the packet filter and the application
assigned to? gateway?
(a) DNS Server (b) None of these (a) Stateful firewall (b) Packet-filtering
(c) Default gateway (d) Subnet mask (c) Circuit-level gateway (d) Stateless firewall
KPSC Instructor Electronic-25.06.2014 UPPCL JE 31-01-2019 (Batch-02)
Ans. (d) : The subnet mask is assigned 255.255.255.0 Ans: (c) A type of circuit level firewall, which is an
The subnet mask is a 32 bit number that mask the IP intermediates solution between a packet filter and an
address divides the IP address into network address and application gateway.
host address. 796. A router
790. Minimum number of computers are required (a) Screens the incoming information
to build a computer network. (b) distributes the information between networks
(a) Four (b) Five (c) Clears all viruses from a computer system
(c) Two (d) Three (d) is a work virus
UPPCL (TG-II) 24-01-2019 (EVENING) GSSSB Electronic Instructor-22.01.2017
Computer 83 YCT
ye
p
Ans. (b) : A router is a networking devices. Which is Ans : (d) VPN is Virtual Private Network that VPN
forwards data packet between computer network that is protects your computer, Laptop, Mobile etc. During
distributes information between networks. A computer online transactions and it is a public network. Helps in
network consist of two or more device that connect to establishing a secure connection.
each other by cable (wire) or Wi-Fi (wireless) 803. Which of the following is the immediate
associated with whose main purpose is to transmit, successor of Hubs?
exchange or share data or information. (a) Bus (b) Routers
797. Which of the following is a device that carries (c) Modems (d) Switches
data packets along the network. UPPCL Technical Grade-II-26.06.2016
(a) Repeater (b) Bus
(c) Router (d) Firewall Ans. (d) : Switch is a network device, when any
UPPCL TG-II 20-03-2021 (Shift-I) information comes from a device to the switch. Switch
does not broadcast that information directly switches
Ans. (c) : Router is a network device that forwards data have space to store their data, which is checked and
packets to a computer network. Any data send through the send to the based on the address Bus, Router, Modems
internet is in form of packet. A packet usually send through
transmit the data where as directly.
a network from one router to another constitutes an inter-
connected network (the internet) a router different IP a 804. Which of the following statement is true or
network consist of two or more data nodes. Router through false.
the same IP address sends it to the destination. (i) Router plays a major role in organizing
798. The _____ layer of the OSI model may contain internet traffic.
a ______, which connects and filters network (ii) Repeaters amplify the data signal and
traffic between two network segments. prevent them from weakening during long
(a) Transport, switch (b) Data-link, bridge range communication.
(c) Physical repeater (d) Session, router (a) (i) wrong, (ii) right
KPSC Instructor Electronics Mech.20.07.2018 (b) (i) right, (ii) right
Ans : (b) Data link layer (DLL): It is second layer of (c) (i) wrong, (ii) wrong
OSI model, it is the protocol layer that transfers the data (d) (i) right, (ii) wrong
in the two-pass network in the WAN but in the LAN,
UPPCL TG-II 25-01-2019 (Morning)
the data transfers in the node.
799. For a 10 base 5 network type, _______ cabling Ans : (b) Router is used to interconnect many network.
is preferred. It reaches the destination of the data through the correct
(a) RG-58 (b) Fiber optic information of the destination (address). The function of
repeaters are protect the signal weakening and transmit
(c) RG-11 (d) Thinnet coaxial
over the long range.
GSSSB Supervisor Electronic Instructor 18.01.2014
Ans. (c) : RG-11 cabling is used for 10 base 5 network 805. Which of the following PPP layers is
type. This type of cable is flexible as compared to other responsible for link installation?
types of cable. (a) LCP (b) IPCP
(c) NCP (d) IP
800. When a device tries to send a message to
another device, the data is sent over the GSSSB Electronic Instructor-21.01.2014
Internet in a manageable ____________form. Ans. (a) : Point-to-Point Protocol (PPP) is based on for
(a) envelopes (b) bins example Link Control Protocol and Network Control
(c) Packets (d) labels Protocol. The LCP is responsible for establishing a link
KPSC Instructor Electronic-25.06.2014 between two computers over a circuit switched
Ans. (c) : When a device tries to send a message to telephone connection.
another device, the data is sent over the Internet in a 806. What is the full form of OSI with reference to
manageable Packet form. Each packet is given to a port network model?
number that is connected to its End Point. (a) Open System Integration
801. A_____is a hardware device which is used to (b) Operating Systems Interconnection
receive, analyse and forward the incoming (c) Open Systems Interconnection
packets to another network. (d) Open Software Interconnection
(a) Modem (b) Router Punjab Wireman instructor-07.07.2013
(c) Repeater (d) USB Ans. (c) : Open Systems Interconnection is the full form
UPPCL Technical Grade-II (Re-exam) 16.10.2016 of OSI with reference to network model.
Ans. (b) : Router is a hardware device, which is used to 807. Which of the following layer of the OSI model
receive and analyze incoming packets on another uses Telnet and FTP protocols.
network and forward it. (a) Transport (b) Application
802. For establishing a secured private connection (c) Network (d) Session
across a public network such as the internet, UPPCL TG-II 19-03-2021 (Shift-II)
you may use: Ans. (b) : Application layer is the seventh layer of the
(a) EPN (b) DPN OSI model, this layer uses protocol like HTTP, FTP,
(c) SPN (d) VPN SMTP and NFS etc. and control how any application
UKSSSC Tech. Electrical Instructor-21.11.2017 accesses the network.
Computer 84 YCT
ye
p
808. Which among the following layer of the OSI Ans. (a) : The first layer of OSI model is the physical
model performs data compression? layer. The full form of OSI is Open System
(a) Network (b) Physical Interconnection. It consists of seven layers.
(c) Presentation (d) Data link (1) Physical Layer
KPSC Jr. Instructor 22.11.2018 (2) Data Link Layer
Ans. (c) : The presentation layer is a sixth layer of the (3) Network Layer
OSI model. That acts as data translator it also compress (4) Transport Layer
the data. It is also called syntax layer. (5) Session Layer
809. Which of the following OSI layers is meant for (6) Presentation Layer
translating, encrypting and compressing data? (7) Application Layer
(a) Network Layer (b) Session Layer 814. Which of the following is used to send and
(c) Presentation Layer (d) Application Layer receive data in TCP?
UPPCL JE 2019 (Batch-01) (a) Word Stream (b) Character Stream
Ans: (c) The presentation layer is a sixth layer of OSI (c) Line Stream (d) Byte Stream
model and responsible for translation, encryption,
RRB Bengaluru LP-2004
authentication and data compression.
Ans : (d) The full form of the TCP is Transmission
810. Which of the following protocols of the Internet
Control Protocol. Which tells how to balance the
architecture is not a major component in data
network and which application program data how does
transmission?
the exchange happen? It uses bytes streams to send and
(a) UDP (b) IP
receive data.
(c) TCP (d) DNS
UPPCL Technical Grade-II-02.08.2015 815. The application layer is ..............of the OSI
WBPSC Instructor-18.09.2021 model
(a) 1 (b) 3
Ans. (d) : UDP (User Datagram Protocol), IP (Internet
Protocol), TCP (Transmission Control Protocol), (c) 4 (d) 7
protocols are the major components of data RRB JE CB2 ME-30.08.2019 Shift-I
transmission while DNS (Domain Name System) is an Ans : (d) Application layer is the 7th layer of the OSI
Internet service that translates a domain name in to an model.
addressable IP address.
811. Which of the following is/are transport layer
protocol(s)?
(i) TCP (ii) UDP
(a) Only (i) (b) Neither (i) nor (ii)
(c) Both (i) and (ii) (d) Only (ii)
DSSSB Craft Instructor (ESM) 06.10.2019
MP Electrician Instructor 07.11.2016, Morning
Ans. (c) : TCP and UDP are both transport layer
protocol in networking. TCP is an abbreviation of
Transmission Control Protocol and UDP is an 816. OSI model, what is the layer that controls
Abbreviation of User Datagram Protocol which is a token management called?
connectionless untrusted protocol. (a) Presentation Layer (b) Session Layer
812. Which of the following OSI layers provides (c) Data Link Layer (d) Network Layer
end-to-end errors detection and correction? RRB Kolkata LP-2009
(a) Network layer (b) Data link layer Ans : (b) Function of the session layer in the OSI model
(c) Session layer (d) Transport layer is to handle request and response between two
RRB Gorakhpur L.P.-2008 applications. It also handles token management.
Ans. (b) : The data-link layer is responsible for 817. Which of the following objects can help you
maintaining and terminating the established connection maintain data across users?
between the network devices over the network channel. (a) Session object (b) Response object
The data-link layer has two sub layers: (c) Server object (d) Application object
• The first is "medium access control", which uses the UPPCL Technical Grade-II Shift-I, 28.03.2021
MAC addresses from the network device to transmit
data between them. Ans. (d) The Application object is helps maintain data
• The second layer is the "logical link layer," which users. Application object is a element of application.
identifies, check flow control and performes the Pages- The pages screens that you design or install for
error detection for transmitted data. end users in your environment for all the given
813. First layer one of the OSI models is application. Application may use objects to share
(a) Physical layer (b) link layer information between user such as: Web screens, email
(c) transport layer (d) network layer screens, mobile web screens and SMS screens as the
UPPCL Technical Grade-II-09.08.2015 visual development environment is designed.
Computer 85 YCT
ye
p
818. Which of the following OSI model related to Ans. (d) : File Server Network is helped to transfer the
data link layer. file. It is manage to store the all files in a computer. A
(a) MAC address (b) E-mail address file server is a central server in a computer network that
(c) IP address (d) Memory address provide file system.
UPPCL Technical Grade-II Shift-II, 28.03.2021 825. Defines the amount of data that can be
Ans : (a) Data Link Layer is second layer of OSI model. It transported through a communication medium
is a protocol layer of a OSI model. It is the physical link in a given amount of time.
layer that moves the data in or out of the network. (a) Network Latency (b) Bandwidth
819. Which of the following OSI layers is meant for (c) Broadband (d) Bitrate
packet routing? WBPSC Instructor-18.09.2021
(a) Transport Layer (b) Network Layer Ans : (b) Bandwidth is a amount of data that can be
(c) Presentation Layer (d) Application Layer transported with in a specific amount of time. It is
UPPCL JE 2019 (Batch-02) usually expressed in bits per second for digital
Ans: (b) The network layer is the third layer of the OSI transmission. Bandwidth is connected to wire and
model. wireless communication network.
The OSI model has seven layers, the network layer is used 826. Using which app can customers in India
for packet routing. measure the download speed of a broadband
820. IEEE 802.11 standard was developed in which connection?
year? (a) My Broadband App
(a) 1997 (b) 2001 (b) My Speed band App
(c) 1995 (d) 1996 (c) My Speed App
KPSC Jr. Instructor- 09.07.2014 (d) My Band App
UPPCL Technical Grade-II (Shift- II) 27.03.2021
Ans. (a) : The IEEE 802.11 standard is a set of control
and physical layer specifications for wireless local area Ans. (c) : Customer can check the speed through TRAI
network access control and Physical Layer My Speed App by clicking on the speed check icon.
specifications in such as 900 MHz and 2.4, 3.6, 5 and The speed of the broadband is displayed generally in
60 GHz this standard was developed in 1997 AD. kbps (Kilo Bits Per Second) it can be use for GPS and
test Wi-Fi speed along with the internet data plan
821. In terms of Digital Certificate, SSL stands for? provided by the mobile operator. The customer can also
(a) Standard Socket Layer measure the download speed of the broadband
(b) Secure Service Layer connection.
(c) Secure Service Line 827. In CSMA/CA, what does RTS stand for?
(d) Secure Socket Layer
(UPPCL TG2 11-11-2016) (a) Retransmit the Signal
(b) Request to Send
Ans : (d) SSL stands for Secure Socket Layer Protocol (c) Reserved to Send
for web browsers and servers that allows for the
(d) Resend the Signal
authentication, encryption and decryption of data sent
UPPCL JE 31-01-2019 (Batch-02)
over the internet. This protocol is provide the connectivity
Ans: (b) RTS stands for request to send in (CSMA/CA)
save and secure for internet. This information exchange to
another website save and secure. Carrier Sense Multiple Access/Collision Avoidance.
Which is an alternative arrangement used by the 802.11
822. The communication takes place in a TCP wireless networking protocol.
connection. 828. Which is the TCP/IP loopback address in
(a) Half Duplex (b) Full Duplex networking?
(c) Byte by byte (d) Semi-Duplex (a) 256.0.0.1 (b) 127.0.0.1
GSSSB Electronic Instructor-22.01.2017 (c) 255.1.1.0 (d) 128.0.0.1
Ans : (b) TCP (Transmission Control Protocol) is a KPSC Instructor Electronics Mech.20.07.2018
bidirectional connection, because it can send data from
Ans. (b) : The loopback address for a TCP/IP network
both side so it is full duplex.
is 127.0.0.1 this address is used for diagnostic purposes
823. What is the full from of ISP? to verify that the internal path through the TCP/IP
(a) Internet Service Provider protocols is working packets sent to the loopback
(b) Intranet Server address never reach the network but are looped through
(c) Internet Serial Provider the networked interface card only.
(d) Internal Service Provider The IP address range 127. 0. 0. 0 ––127.255.255.255 is
UPPCL Technical Grade-II (Shift-I) 27.03.2021 reserved for loopback
Ans : (a) ISP stands for Internet Service Provider is an 829. With reference to Internet protocols, SNMP
organization, which provides service for the internet. refers to ________.
824. __________ server stores the files for all users (a) Simple Network Management Protocol
in a network. (b) Simple Network Mailing Protocol
(a) Database (b) Communication (c) Secured Network Mailing Protocol
(c) Domain (d) File (d) Secured Network Management Protocol
HSSC wireman Instructor -17.12.2019, Shift-II GSSSB Supervisor Electronic Instructor 18.01.2014
Computer 86 YCT
ye
p
Ans. (a) : Simple Network Management Protocol is an 833. Which of the following is the fastest media of
Application Layer Protocol for monitoring and data transfer?
managing network devices on a Local Area Network (a) Co-axial cable (b) Untwisted wire
(LAN) or Wide Area Network (WAN). It is used to (c) Telephone lines (d) Fiber optic
configure the information to network devices such UKSSSC Tech. Electrical Instructor-21.11.2017
Internet Protocol on a server, Printer, Hub, Switch, Ans. (d) A Fiber Optic Cable consists of a bundle of
Router etc. glass threads, each of which is capable of transmitting
830. Match the following network protocols with messages modulated onto light waves. It is a optical
their meanings. fiber thin wire in which data transfer is done very fast
(i) SNTP A. Maps the domain name to using light. It works on the principle of Total Internal
an IP address. Reflection (TIR) when light is shown from a particular
(ii) FTP B. Synchronizes the system angle.
time in the network. 834. A set of rules governing data communication is
(iii) DNS C. Sends files from one called .....?
computer to another. (a) Standard (b) Topology
(iv)TELNET D. Connects the local (c) Networking (d) Protocol
computer to the remote UPPCL TG-II 19-03-2021 (Shift-I)
computer. Ans. (d) : A protocol in a computer network is a set of
(a) i-C; ii - B; iii-A; iv - D rules that governs how devices communicate. It defines
(b) i-B; ii-C; iii-A; iv-D the structure and format of data packet, including how
(c) i-B; ii-C; iii-D; iv-A data is transmitted, routed, addressed and encapsulated.
(d) i-B; ii-D; iii-A; iv-C Some example of protocols:
HSSC Electrician Instructor -17.12.2019 FTP, UDP, SMTP, DNS, TCP/IP, HTTPS.
Ans. (b) : SNTP stands for Simple Network Time 835. With respect to TCP/IP model what is the full
Protocol. It is a network type protocol used to form of UDP?
synchronize computer time in the internet. DNS means (a) User Data Processing
Domain Name System. It is converts people readable (b) Uni-Directional Processing
domain names such as (www.yctbook.com) into (c) User Datagram Protocol
machine readable IP addresses. (d) Unique Datagram Protocol
831. Which of the following internet services KPSC Instructor Electronic-25.06.2014
transfers files to and from a remote network? Ans. (c) : UDP stands for 'User Datagram Protocol' in
(a) SMTP (b) TELNET the TCP/IP model. It is one of the core protocols of the
(c) FTP (d) POP Internet Protocol suite and is used for transmitting data
KPSC Jr. Instructor 22.11.2018 over a network. UDP is a connectionless and light
Ans. (c) : FTP stands for File Transfer Protocol. FTP is weight protocol that does not provide the same level of
a standard internet protocol provided by TCP/IP used reliability and error checking as TCP.
for transmitting the files from one host to another. 836. With regard to internet security, the full form
SMTP– SMTP stands for Simple Mail Transfer of SSL _____ and it provides security at the
Protocol is used to send and receive email. SMTP is an _____layer
internet standard communication protocol for electronic (a) simple socket layer; Transport
mail transmission. Mail server and other message. (b) Secure Service layer; Application
TELNET– Telnet is a network protocol used to
(c) Secure Socket layer; Transport
virtually access a computer and provide a two way
collaborative and text based communication channel (d) secure socket layer; Application
between two machines. It is used to application HSSC wireman Instructor -17.12.2019, Shift-I
protocol. Ans. (c) : Secure socket layer is an extension of SSL
POP– POP stands for Post Office Protocol. It is a point which is a security protocol that creates an encrypted
multiple devices share a connection and communicate and decrypted link between a web server and a web
with each other. browser. Companies and organization are need to add
832. Full Form of FDDI is: SSL certificates to their web sites to secure online
(a) Fiber Distributed Data Interface transactions and keep customer information private and
(b) Fiber Direct Data Inspection secure. Which provides confidentiality authentication
(c) Frequency Demodulation Data Interface and integrity to internet communications. SSL
eventually evolved into Transport Layer Security
(d) Foreign Development Department of India
(TLS). Usually SSL is used to secure credit card
UPPCL Technical Grade-II (Shift-I) 20.03.2021 transaction data transfer and login thus can say. SSL is a
Ans. (a) : FDDI stands for Fiber Distributed Data bit of code on your web server that provides security for
Interface is a high speed network technology which run online communications. It is two levels of protocols that
at 100 Mbps over fiber-optic cabling. It is used for allow more reliable transmission. A record protocol and
network back bones in a Local Area Network (LAN) or hand shake protocol and these are layered on top of
metropolitan network. transport protocols such as TCP/IP.
Computer 87 YCT
ye
p
837. _____ the use of wireless technology (usually Ans. (c) : (i) The fault tolerance of WAN is very low.
wifi) to connect some or all computers and (ii) There are two types of WAN switched WAN and
devices to a router and in turn to each other point to point WAN.
and to the internet. (iii) Due to long distance transmission, WAN has more
(a) WLAN (b) FAN noise and error.
(c) MAN (d) WAN (iv) The data rate of LAN is higher than speed of WAN.
Punjab Wireman instructor-07.07.2013 843. Which of the following statements is correct
Ans : (a) WLAN– Wireless LAN is a wireless about LAN?
computer network that wireless communication is used (a) LAN connection is less secure than Internet
to create a Local Area Network (LAN) with in a limited connection.
area such as a home, school, computer labs, campus, (b) Two computers placed in two different
office building etc. It connects two or more devices. continents can be connected through Internet.
838. Radio waves are used by which of the following (c) The full form of LAN is Local Actual
networks to transmit information across the Network.
network? (d) LAN with 10Mbps speed is called ‘Ethernet ‘.
(a) Telephone (b) Satellite UPPCL Technical Grade-II (Shift-II) 20.03.2021
(c) ISP (d) Wi-Fi Ans. (d) : The full form of LAN is Local Area
UPPCL TG-II 27-03-2021 (Shift-I) Network, it is interconnected in a fixed and small
Ans. (d) : Wi-Fi is a wireless technology used to geographical area. It is spreaded and located in a few
connect computer tablets, smart phones and other kilometers away in any university, campus, office or
devices to the internet. Wi-Fi uses radio waves to factory. The new 10 Mbps speed LAN is called
transmit information to the network. Ethernet.
839. The nodes in a computer network are devices 844. Which of the following statements about LAN
is incorrect?
that:
(a) LAN with speed of 10 Mbps is called
(a) consume/terminate the data
Ethernet
(b) route the data (b) LAN stands for Local Area Network
(c) generate the data (c) LAN is more secure than the Internet
(d) forward the data (d) Two computers placed in two different
GSSSB Electronic Instructor-21.01.2014 continents can connect through LAN
Ans : (a) Since computer network shares data or GSSSB Electronic Instructor-22.01.2017
information among different users in which the main Ans. (d) : LAN stands for 'Local Area Network". It's a
function of nodes is to consume or terminate the data. network of inter connected computers and devices
840. Which one of the following options are a free within a limited geographical area, such as a home,
transmission medium? office, or school. LAN with speed of 10 Mbps is called
(a) ]Fiber optic (b) Coaxial wire Ethernet. LAN is more secure than the internet.
(c) Twisted pair wire (d) Micro wave 845. Which of the following statement is incorrect
UPPCL TG-II 25-01-2019 (Evening) regarding LAN?
Ans : (d) Signals in microwave are transmitted openly (a) It is more secure than other networks
i.e., without medium, like radio signals, in which (b) Railway reservation system is an examples of
information is exchanged through frequencies. LAN
841. Which of the following is not an advantage of (c) It may be wired and wireless or a
computer network? combination of both
(a) Communication (b) Sharing of resources (d) LAN with 10 Mbps speed is called Ethernet
(c) Security Hazards (d) Cost effectiveness KPSC Instructor Electronics Mech.20.07.2018
UPPCL (TG-II) 24-01-2019 (Morning) Ans. (b) : Railway reservation system is an examples of
Ans : (c) Computer network is consider to the best WAN Hence statement (b) is incorrect.
medium of communication. It is easy to sharing with 846. What does 6LoWPAN stand for?
printer, scanner etc. Which reduces cost. It does not (a) IPv6 over Low Power Wireless Personal Area
protect from danger in any way, we need firewall for Network
threat protection. (b) 6 Lower Wireless Public Area Network
842. Which of the following statements is true with (c) 6 Longest Wireless Protocols And Networks
respect to wide Area network (WAN)? (d) IPv6 over Low Power Wireless Public Access
(a) The fault tolerance of WAN is very high Network
(b) There is only one type of WAN known as UPPCL Technical Grade-II (Shift-I) 19.03.2021
switched WAN Ans. (a) :6LoWPAN stands for "IPv6 over Low- Power
(c) Due to long distance transmission, WAN has Wireless Personal Area Networks". It is an Internet
more noise and error Engineering Task Force (IEETF) Standard that enables
(d) The data rate of WAN is higher than the the use of IPv6, the latest version of the Internet
speed of LAN Protocol, on Low-Power low data rate wireless
KPSC Jr. Instructor- 09.07.2014 networks typically used in IoT and sensor applications.
Computer 88 YCT
ye
p
847. Which of the following is defined as a global 852. Which of the following is an advantage of
collection of a computer networks that are LAN?
linked together by devices called 'routers' and (a) Automatic Pricing of Data
have a common set of protocols for data usage (b) Sharing Peripherals
transmission. (c) Saving up data
(a) Internet (b) LAN (d) Backing up data
(c) VPN (d) Intranet RRB NTPC 23.02.2021 (Shift-I) Stage Ist
UPPCL TG-II 19-03-2021 (Shift-I) Ans. (b) : A local Area network (LAN) has many
Ans. (a) : The internet is defined as a global collection of advantages
computer networks linked together by devices called (i) Sharing peripherals
'routers' and a common set of protocols for data usage (ii) Cost -effective
transmission. Internet is a best example of WAN network. (iii) Comparatively secure
848. Which of these networks is usually the fastest? (iv) High speed data transfer
(a) WAN (v) Scalability
(b) MAN 853. Which of the following many Local Area
(c) LAN Networks (LAN) are connected simultaneously
(d) All the networks are equally fast and the whole country of the World in general
RRB NTPC, (Shift -3) Online, 28.03.2016 is included.
Ans. (c) : The full form of LAN is Local Area (a) Local Area Network (LAN)
Network. Generally LAN network is the fastest. We use (b) Virtual Private Network (VPN)
this network in a limited area, such as in a building, (c) Wide Area Network (WAN)
school, office etc. (d) Metropolitan Area Network (MAN)
849. In terms of transmission speed, which of the UPPCL TG-II 27-03-2021 (Shift-II)
following is the correct arrangement of LAN, Ans. (c) : WAN (Wide Area Network) is a network that
MAN, and WAN in increasing order? works for networking with a very large geographical area
(a) WAN <MAN > LAN such as from one city to another city or even a country. A
(b) LAN < MAN < WAN WAN networks are internet. The internet is the largest
(c) WAN > MAN < LAN WAN network.
(d) WAN < MAN < LAN 854. Internet may be termed as an example of–
UPPCL Technical Grade-II (Shift-II) 19.03.2021
(a) LAN (b) MAN
Ans. (d) : In terms of transmission speed, LAN has (c) WAN (d) PAN
higher transmission speed. Whereas the transmission (UPPCL TG2 Re-exam 16-10-2016)
speed of MAN is average and the transmission speed of
WAN is low. So in a ascending order WAN < MAN < (RRB JE (Shift-2), 29.8.2015)
LAN will be Ans : (c) Internet may be termed as an example of
LAN - Local Area Network WAN.
MAN - Metropolitan Area Network 855. What is the IEEE standard for Gigabit
WAN - Wide Area Network Ethernet?
850. The technology most popularly used by LAN (a) IEEE 802.3gb (b) IEEE 802.3u
is: (c) IEEE 802.3g (d) IEEE 802.3z
(a) SONET (b) ATM UPPCL JE 2019 (Batch-02)
(c) Ethernet (d) Frame Relay Ans: (d) The IEEE standard for Gigabit Ethernet is IEEE
GSSSB Supervisor Electronic Instructor 18.01.2014 802.3z. Data transfer in LAN is quite high and usually
Ans. (c) : Ethernet is the technology commonly used in varies from 10 Mbps (Called Ethernet), to 1000 Mbps
wired Local Area Networks (LANs). A LAN is a called Gigabit Ethernet.
network of computers and other electronic equipment 856. Which of the following options acts as a barrier
that covers a small area such as a room, office, school, between local Area Network (LAN) and the
building. Ethernet is a network protocol that controls Internet?
how data is transmitted over a LAN. How is transmitted (a) SQL Injection
and supported by IEEE 802.3 Protocol. (b) Hashing
851. Which of the following is a general-purpose (c) Firewall
network? (d) Cross Server Scripting
(a) Storage Area Network (SAN) UPPCL JE 2019 (Batch-02)
(b) Local Area Network (LAN) Ans: (c) Firewall acts as a barrier between the Local
(c) Enterprise Private Network (EPN) Area Network and the internet. Which keeps computers
(c) Virtual Private Network (VPN) safe from hackers and malware.
(RRB JE (Shift-3), 28.08.2015) 857. Which of the following statements is true
Ans : (b) A local area network (LAN) is a computer regarding Wide Area Network (WAN)?
network that interconnects computer within a limited (a) The data rate of WAN is higher than the
area most computer networks are general purpose speed of LAN.
networks used for many different forms of (b) There is only one type of WAN which is
communication. known as 'Switched WAN.
Computer 89 YCT
ye
p
(c) The fault tolerance of WAN is very high. 862. Many universities in the country have to be
(d) Due to long distance transmission, WAN is merged together can be connected via?
more prone to noise and errors. (a) WAN (b) PAN
RRB Kolkata LP-2009 (c) LAN (d) MAN
Ans. (d) : WAN stands for Wide Area Network. It's a UPPCL (TG-II) 24-01-2019 (EVENING)
type of computer network that covers a broad area, Ans : (a) A Wide Area Network (WAN) is a computer
typically a city, country or even a global scale. WANs network that extends over a large geographical area.
are used to connect multiple local networks (LANs) and WANs are commonly used in business origination to
allow data and communication to be transmitted over connect their office networks. It also used to connect
long distance. Due to long distance transmission, WAN many universities in the country.
is more prone to noise and errors. 863. For te`xtual chatting on internet, most common
858. Connecting your computing devices like chat protocol is ______.
computers, mobiles, notebooks etc, together (a) HLR (b) IRC
forms a network, which is called _____. (c) H.323 (d) SIP
(a) PAN (b) WAN UPPCL Technical Grade-II (Re-exam) 16.10.2016
(c) LAN (d) MAN Ans. (b) : IRC (Internet Relay Chat) is an application
UP PCL Technical Grade-II-11.11.2016 layer protocol that facilitates communication in the
Ans. (a) : A personal Area Network (PAN) is a computer form of text IRC was created by Jarkko Oikarinen in
network for inter connecting electronic devices within an August 1988. This chat process works on the
individual person's workspace. A PAN provides data client/server networking model.
transmission among devices such as computers, smart 864. IN Infrastructure WLAN, two devices
phones, tablets and personal digital assistants. communicate-
859. Which of the following networks uses telephone (a) Directly (b) Through wires
lines? (c) Through routers (d) Through an access point
(a) WAN (b) LAN RRB Gorakhpur L.P.-2008
(c) PAN (d) Wireless Ans : (d) Access point is different from hotspot. It is a
(UPPCL TG-2 26.06.2016) physical layer present in the WLAN (Wireless Local
Area Network).
Ans : (a) Telephone lines are used in Wide Area
Network. This network is also called internet, 865. Which of the following is a network card
many LAN/MAN are connected to it. This installed inside a computer that enables it to
network is used telephone lines and satellites connect to a network?
etc. (a) Modem (b) LAN card
LAN- Local Area Network is connected to school, (c) Switch (d) Repeater
office, Campus, building computer to a LAN UPPCL (TG-II) 24-01-2019 (Morning)
network. Ans : (b) A network interface controller is a computer
MAN- MAN (Metropolitan Area Network) network hardware component that connects computer to a
can be used to connect various computers network.
located in a city. 866. Which protocol set is used to construct a
PAN- PAN (Personal Area Network) is a personal virtual terminal?
network of a company. (a) TELNET (b) DCCP
Example- Include banks networks, military (c) UDP (d) DTP
networks etc. UPPCL Technical Grade-II-26.06.2016
860. Bluetooth ____ is an example of. Ans : (a) TELNET connection is also known as virtual
(a) Wide Area Network terminal connections. Through telnet, you can access
(b) Personal Area Network information or run programs from a host without
(c) Local Area Network physically going to it.
(d) Virtual Private Network 867. What is the purpose of Telnet?
UPPCL TG-II 19-03-2021 (Shift-II) (a) To log on to a remote computer that is
Ans. (b) : Bluetooth is an example of Personal Area connected to the internet
Network. PAN (Personal Area Networks) are used for a (b) To allow internet users to talk across the
data transformation between devices such as computers, internet to any PC equipped to receive the call
telephone tablets and personal digital assistants. (c) To offer a forum for people to discuss topics
861. Which of the following types of network is of common interests
larger than LAN but smaller than WAN? (d) To allow people from all over the world to
(a) CAN (b) MAN communicate in real time
HSSC Electrician Instructor -17.12.2019
(c) GAN (d) PAN
Ans. (a) : Telnet is a protocol that allows you to
DSSSB Craft Instructor (ESM) 06.10.2019 connect to remote computers over a TCP/IP network
Ans : (b) Metropolitan Area Network (MAN) is an (such as the internet). This TCP/IP protocol is used to
extended form of LAN which covers a larger provide virtual terminal service. By using the Telnet
geographical are like a city are town. client software on your computer. You can connect to a
A MAN is larger than a LAN but smaller than WAN. telnet server (i.e. the remote host).
Computer 90 YCT
ye
p
868. Telnet is a service that runs 872. Which of the following network topologies has
(a) television on net (b) remote program a relatively large number of links?
(c) cable TV network (d) telnet (a) Mesh (b) Star
UKSSSC Tech. Electrical Instructor-21.11.2017 (c) Bus (d) Ring
Ans. (b) Telnet is also widely known as Terminal GSSSB Electronic Instructor-21.01.2014
Network. It is a service that runs remote programs. Ans. (a) : Mesh topology is a type of point to point
869. Match the following. connection. In this, all the nodes are connected to each
(i) Telnet A. Internet users, from other through a network channel.
any PC equipped to 873. In _____ topology, each communicating device
receive calls facilitates, is connected with every other device in the
to talk on the internet network.
(ii) Newsgroup B. Used to log on to a (a) Star (b) Bus
remote computer
connected to the (c) Mesh (d) Ring
internet KPSC Instructor Electronic-25.06.2014
(iii) IRC C. Allows people around the Ans. (c) : In mesh topology, each computer is connected
world to communicate in to each other. In this topology each computer is not only
real time sends its own signal but also relays data to other
(iv) VoIP D. Provides a forum for computers. In mesh topology, even if one node fails, the
people to discuss network does not break.
topics of common 874. What is a name of the physical layout of a
interest computer network?
(a) (i)-(c), (ii)-(b), (iii)-(d), (iv)-(a) (a) Network service (b) Network size
(b) (i)- (b), (ii)-(d), (iii)-(c), (iv)-(a) (c) Network topology (d) Network property
(c) (i)-(c), (ii)-(d), (iii)-(b), (iv)-(a) UPPCL TG-II 27-03-2021 (Shift-II)
(d) (i)-(b), (ii)-(a), (iii)-(c), (iv)-(d) Ans. (c) : In computer network, we know the physical
RRB Bengaluru LP-2004 layout as a network topology. We communicate with
Ans. (b) Following are the matched options. each other through network devices. Which are different
Telnet → Used to log on to a remote computer node connected to each other and then communicate.
connected to the internet 875. Which of the following is not a valid network
Newsgroup → Provides a forum for people to discuss topology?
topics of common interest (a) Random (b) Star
IRC → Allows people around the world to (c) Ring (d) Bus
communicate in real time UPPCL TG-II 19-03-2021 (Shift-I)
VoIP → Internet users, from any PC equipped Ans. (a) : Except random, all other networks come
to receive calls facilitates, to talk on under topology.
the internet
870. In which of the following network topologies each 876. What is the network configuration in which a
node is connected to exactly two other nodes? all data/information through control computer
(a) Mesh (b) Star (c) Bus (d) Ring is passed.
UPPCL Technical Grade-II-02.08.2015 (a) Bus Network
Ans. (d) : In ring topology each nodes is connected (b) Ring Network
only to its two nearest neighbors nodes. It is in circular (c) Point to Point Network
structure in ring topology, if one node fails, the entire (d) Star Network
network fails. UPPCL TG-II 20-03-2021 (Shift-I)
871. Which of the following LAN topology designs is Ans. (d) : Star network topology is a network
not very practical because it causes excessive configuration that each node is connected to a central
wastage of transmission media and is difficult network device, this type of configuration
to set up and reconfigure? information/data is received by all the nodes/computers
(a) Cellular (b) Ring (c) Bus (d) Mesh through a control computer. This central computer acts
HSSC wireman Instructor -17.12.2019, Shift-II like a server in which data or information is stored and
Ans. (d) : all other computers (two or more) are connected to this
central computer and it takes the data from the central
computer like a client.
877. Which of the following is not a valid network
topology?
(a) Ring (b) Doughnut
Mesh topology uses a dedicated link between every (c) Mesh (d) Star
device on the network. This design is not very practical UPPCL Technical Grade-II-09.08.2015
because of its excessive waste of transmission media. Ans. (b) : Doughnut is not a valid network topology.
This topology is difficult to install and reconfigure. Doughnut is a type of chart just like pie chart.
Computer 91 YCT
ye
p
878. Which of the following network topologies, 882. A........topology is defined by overlapping
each computer and network device is connections between nodes.
connected by a single connected cable? (a) Mesh (b) Bus
(a) Star topology (b) Ring topology (c) Ring (d) Star
(c) Mesh topology (d) Bus topology HSSC wireman Instructor -17.12.2019, Shift-I
UPPCL TG-II 25-01-2019 (Evening) Ans. (a) : A mesh topology is defined by overlapping
Ans : (d) Bus topology is a network type in which every connections between nodes.
computer and network devices is connected to single In mesh topology every device is directly connected to
coaxial cable. It is transmission data from one end to every other device.
another in a single direction. The beginning and end of 883. Which of the following network topologies
the wire device is installed. Which is called terminator. provides a central hub/computer from which
879. Consider a LAN in which all computers are the rest of the computer can be directly
connected to a central switch. What is the connected.
network topology of this LAN? (a) Mesh (b) Star
(a) Bus (b) Ring (c) Ring (d) Bus
(c) Star (d) Mesh UPPCL TG-II 25-01-2019 (Morning)
MP Electrician Instructor 07.11.2016, Morning Ans : (b) In a star topology, there is central node (hub)
that connects all the other nodes. In this topology, if the
Ans. (c) : In star topology, all the computers are first node has to take information from the second node,
connected with the help of hub. This cable is called the then always the second node will give information to
central node, and all other nodes are connected using the first node only through the central node.
this central node.
884. In which of the following network topology is
880. Network Topology in which concept of central the communication between any two nodes
node is used for rebroadcasting of signal very fast?
received from peripheral node? (a) Ring (b) Bus
(a) Star Topology (b) Ring Topology (c) Mesh (d) Star
(c) Tree Topology (d) Bus Topology KPSC Jr. Instructor 22.11.2018
(UPPCL TG2 11-11-2016) Ans. (c) : In Mesh topology, a computer or node is
Ans : (a) Star topology using the central point concept connected to different devices in different ways i.e. data
for re-transmission of message received from the transmission between any two node is done at higher
peripheral node is done in the network. speed. There is no traffic problem in mesh topology.
881. The topology in which every node is connected 885. The most reliable network configuration is __?
only to its immediate neighbours is called:- (a) STAR (b) BUS
(a) Bus (b) Mesh (c) RING (d) MESH
(c) Ring (d) Star Punjab Wireman instructor-07.07.2013
WBPSC Instructor-18.09.2021 Ans : (d) It is most reliable network configuration we
Ans. (c) : A ring topology is a topology that creates a use mesh topology because in mesh topology all nodes
circle such that each node is connected to other nodes. help each other to distribute each other data.
Because every node is connected to other nodes, there is 886. Which of the following is not a topology?
no beginning and no end. It's data of a host goes from (a) Circle (b) Mesh
the host to receiving host and data goes to the receiver. (c) Ring (d) Star
In ring topology, if one host fails, the whole ring RRB Bengaluru LP-2004
topology fails. Ans. (a) : In the above question Mesh, Ring and Star is
Bus topology– In bus topology, a computer is type of network topology but Circle is not type of
connected to a single communication line or cable. network topology.
When we want to send or receive data simultaneously, 887. The topology in which every node is connected
the due to having only one cable, when the data one side only to its immediate neighbours is called-
is completely send then only we can send the other data. (a) Bus (b) Mesh
If the main communication line breaks in the bus (c) Ring (d) Star
topology, then the entire network fails. UPPCL Technical Grade-II (Shift-I) 19.03.2021
Mesh topology– The host computer is connected to one
or more host. Each host computer in the mesh topology Ans : (c) Ring topology is a network topology which
connected to different hosts with more than point. each node is connected two separate nodes. It is better
than bus topology.
Star topology– In star topology, all host devices are
connected to a central device (hub). Any central device 888. Which of the following statements is
is used i.e. switch. There is a point to point connection INCORRECT?
between the central device and the host. In star topology (a) Malware leaks personal information.
if the central device fails, the entire network fails. The (b) Eavesdropping is listening to private
characteristic of the star topology is that one host fails, communication
it has no effect on the entire work. You can easily add (c) Spoofing is acquiring the user ID and the
or remove hosts. password.
Computer 92 YCT
ye
p
(d) Social engineering is of interest to cyber 893. The act of secretly listening to the private
security. conversation or communications of others
GSSSB Supervisor Electronic Instructor 18.01.2014 without their consents in order to gather
Ans. (c) : Spoofing is often used in phishing attacks and information is known as:
other malicious activities to gain unauthorized access, (a) Phishing (b) eavesdropping
steal information, or deceive individuals and systems, (c) Trojan horse (d) surfing
spoofing is not acquiring the user ID and the password. RRB Gorakhpur L.P.-2008
Malware is a term used to describe any software or code Ans. (b) : Eavesdropping is the unauthorized
that is designed to harm, exploit or compromise computer interception of electronic communications often with
systems, networks, or devices without the consent of the the intention of monitoring, capturing or extracting
user. Malware leaks personal information. sensitive or confidential information being transmitted
Eavesdropping is the act of secretly listening to a over network.
conversation or private communication without the
knowledge or consent of the parties involved. 894. A type of social engineering where an attacker
sends a fraudulent message designed to trick
Social engineering is a manipulative technique used to
person into revealing sensitive information is
organizations into releasing confidential information,
known as:
social engineering is of interest to cyber security.
(a) Phishing attack
889. How many INCORRECT statements regarding (b) ransomware attack
PC security are given below?
(c) DDoS attack
1. Firewall causes harm.
2. Malware causes harm. (d) man-in the middle attack
UPPCL Technical Grade-II (Shift-I) 20.03.2021
3. Phishing causes harm.
(a) 3 (b) 0 Ans. (a) : A phishing attack is a type of cyber attack in
(c) 2 (d) 1 which the attacker attempts to trick the victim into
RRB Kolkata LP-2009 revealing sensitive information, Such as password,
credit card numbers, or social security numbers.
Ans. (d) : A Firewall is a network security device or Phishing attacks are often carried out via email or text
software that helps protect a computer or network from message.
unauthorized access and threats. So, firewall is not
harmed, while Malware and Phishing causes harm. 895. At the receiving end, it is necessary to have
890. Which of the following is NOT a type of an IoT encrypted data _____ so that it can be easily
security threat? read by the users.
(a) Social engineering (b) Ransomware (a) decrypted (b) demodulated
(c) Man-in-the-middle (d) Social networking (c) Augmented (d) Encapsulated
UPPCL Technical Grade-II (Shift-II) 20.03.2021 UPPCL TG-II 25-01-2019 (Morning)
Ans. (d) : Social engineering, Ransomware and Man- Ans : (a) Data encryption translates the data into some
in-the-middle are an IoT security threat while serial other form or code so that it can be read or viewed by
networking is not security threat because it is a social the person who has the secret code. Accessing the data
media like Facebook, Instagram and youtube etc. at the receiving end through a secret code is called
891. What does DDoS Security Attack in IoT stand for? decryption of the data.
(a) Direct Distraction of Service 896. With respect to passwords, which of the
(b) Direct Detention of Software following is considered a bad practice?
(c) Distributed Denial of Service (a) Keeping same password for multiple accounts
(d) Distributed Disturbance of Software (b) Encrypting passwords
HSSC Electrician Instructor -17.12.2019 (c) Changing password periodically
Ans. (c) : A Distributed Denial of Service attack is a (d) All of these
malicious attempt to disrupt the normal traffic of a MP Electrician Instructor 07.11.2016, Morning
targeted server, server or network by overwhelming the Ans. (a) : Password is a key personal information.
target or its surrounding infrastructure with a flood of Which information related to particular person or by
Internet traffic. taking information about his banking account or ATM
892. What is a network that combines various password. It can be misused. Hence password should be
systems together to remotely take control of a changed.
victim's system and distribute malware called? 897. Which of the following is NOT a cause of
(a) Man-in-the-middle (b) Identity and data theft system hang?
(c) Botnet (d) Denial of service (a) Prescience of virus
DSSSB Craft Instructor (ESM) 06.10.2019
(b) None of these
Ans. (c) : The network that combines various system to (c) Excess power supply
remotely take control of a victim's system and distribute
malware is commonly referred to as a 'botnet'. Botnets (d) Execution of corrupted file
are used for a variety of malicious purposes, including UPPCL Technical Grade-II (Shift- II) 27.03.2021
distributing malware launching distributed denial-of- Ans : (c) Therefore prescience of virus, and execution
service attacks, and stealing sensitive information from of corrupted file are responsible for any system hang
compromised systems. and not the extra power supply.
Computer 93 YCT
ye
p
898. Which of the following is a network security Ans: (b) Back door is a malware using which can
system that monitors and controls the incoming attacker can gain unauthorised remote access to a PC.
and outgoing network traffic based on Which can steal or infect computer data.
predetermined security rules? 905. Which of the following Malicious Software
(a) Anti-virus (b) Spyware
(c) Firewall (d) Search engine creates new processes in an infinite loop?
HSSC wireman Instructor -17.12.2019, Shift-I (a) Boot Sector Virus
Ans : (c) A Firewall is a network security system that (b) Memory Resident Virus
monitors and controls incoming and outgoing network (c) Stealth Virus
traffic based on predetermined security rule. (d) Fork Bomb
UPPCL-JE 31-01-2019 (Batch -01)
899. What is backup?
(a) Adding more components to your network Ans: (d) A Fork bomb (also known as a " rabbit virus") is
(b) Protecting data by copying it from the a Denial of Service (DOS) attack in which the Fort system
original source to a different destination call is recursively used until all system resources execute a
(c) Filtering old data from the new data command. Fork bomb is a type of virus that makes
(d) Accessing data on tape malicious software, new processes in an infinite loop.
(UPPCL TG-2 26.06.2016) 906. Anti-virus software must be regularly updated
Ans : (b) Backup is process of protecting data by else-
copying it from the original source to a different (a) New viruses wouldn't be recognized
destination. (b) None of these
900. Information Technology Act, 2000, addresses (c) Software will become corrupt
all of the following issues, EXCEPT: (d) Both of these
(a) Legal recognition of digital signatures KPSC Jr. Instructor 22.11.2018
(b) Legal recognition for apartments Ans : (a) The anti-virus software in any system should
(c) Legal recognition of electronic documents be updated regularly, otherwise the anti-virus will not
(d) Legal recognition transactions be able to identify the new virus.
WBPSC Instructor-18.09.2021
907. Verification of a login name and password is
Ans. (b) : Information Technology Act 2000 not known as
addresses legal recognition for apartments. (a) Configuration (b) Accessibility
901. Which type of virus attaches with EXE files (c) Authentication (d) logging in
and the resulting infected EXE file attacks (UPPCL TG-2 26.06.2016)
other EXE files and infects them? Ans : (c) Verification of a login name and password is
(a) Parasitic Virus called authentication. It is inputted by the user method.
(b) Boot Sector Virus Login name and password are verified comparatively.
(c) Stealth Virus
(d) Memory Resident Virus 908. Which of the following types of attack allows
attackers to inject client side script into web
UPPCL JE 2019 (Batch-02)
pages?
Ans: (a) Parasitic virus also known as file virus. It is a (a) Cross Client Scripting
computer virus that attacks its self to executable files
and infects them and infected executable files attack (b) Cross Site Scripting
other executable files and infect them as well. (c) Cross Server Scripting
902. Which of the following is not antivirus software? (d) Cross Sort Scripting
(a) Avira (b) Kaspersky UPPCL JE 2019 (Batch-01)
(c) McAfee (d) Firefox Ans: (b) Cross-site scripting (XSS) is a security exploit.
UPPCL TG-II 25-01-2019 (Evening) It is allows an attacker to inject into a web site
Ans : (d) Avira, kaspersky and McAfee are all antivirus malicious client side code.
while Firefox is web browser. 909. We categorize cyber-crimes in two ways, that is
903. Indian IT act was notified in the year _____. _____.
(a) 2014 (b) 2007 (a) crime committed in i) the real world and ii)
(c) 2000 (d) 1991 the computer world
HSSC wireman Instructor -17.12.2019, Shift-II (b) crime committed through i) the www and ii)
Ans. (c) : The Indian IT Act was notified in the year the internet
2000 this is the primary law in India which deals with (c) crime committed in i) cyberspace and ii) the
cyber crime and deals with electronics. real world
904. Which of the following malwares is used by an (d) crime committed where i) a computer is a
attacker to get unauthorized remote access to a target and ii) where a computer is a weapon
PC by exploiting security vulnerabilities? Punjab Wireman instructor-07.07.2013
(a) logic bomb (b) back door Ans : (d) Cyber crime is crime in which a computer and
(c) Poverty (d) Self-replicating a network are involved. Computer is a tool used and
UPPCL JE 2019 (Batch-01) target a computer.
Computer 94 YCT
ye
p
910. A malware that secretly collects information Ans. (b) : A dial-up line is a connection or circuit
about users without their consent is called - between two sites through a switched telephone
(a) Spyware (b) Virus network. In the data communication on world, a dial-up
(c) Bootware (d) Adware line forms a link between two distant computers or local
KPSC Instructor Electronic-25.06.2014 area networks. Dial-up lines provide any to any
Ans : (a) Spyware is an unwanted software that steals connections. It is also called switched line.
confidential information by infiltrating a computer 916. Which of the following statements is/are true?
device. It is a type of malware. (i) In terms of security, a dial-up connection is
911. Which of the following provides internet access better than a broadband connection.
by transmitting digital data over telephone lines? (ii) In terms of cost, a broadband connection is
(a) Leased line (b) Digital subscriber line better (cheaper) than a dial-up connection.
(a) Only (ii) (b) Only (i)
(c) Digital signal line (d) None of these
(c) Neither (i) nor (ii) (d) Both (i) and (ii)
(UPPCL TG-2 26.06.2016)
GSSSB Electronic Instructor-21.01.2014
Ans : (b) Internet access is done by digital subscriber Ans. (b) : Dial-up connection is more secure than broad
line (DSL) by transmitting digital data over telephone band connection in term of security. Broadband users
lines DSL service uses the same telephone line a dial up need to use a firewall to keep the computer invisible.
service but provides faster speeds than dial-up service. Dial-up-service connect to internet through phone line
This service require a modem, which connects the with the maximum speed of 56 kbps. While broadband
telephone line to the computer. refer to connection. It has ability to transmit large
912. Which of the following provides internet access amount of data at high speeds. Dialup internet service is
by transmitting digital data over a telephone usually cheaper than broadband internet.
network. 917. What is the maximum data transfer speed of
(a) Digital (b) Leased line dial-up connection.
(c) Ethernert (d) Data subscriber line (a) 512 Kbps (b) 1 Mbps
UPPCL TG-II 19-03-2021 (Shift-I) (c) 56 Kbps (d) 112 Kbps
Ans. (d) : Digital subscriber line is a communication UKSSSC Tech. Electrical Instructor-21.11.2017
medium. Which is used to transfer internet through Ans : (c) Maximum speed of dial up connection is 56 kbps.
telephone line using copper wire. DSL is one of the most 918. In which of the following telephone line is used
popular way with cable internet only. ISP stand for (Internet to make modem connection for internet access
Service Provider) provides broadband internet access. is done.
913. The full form of ADSL is: (a) ISDN (b) Dial-up
(a) Asymptotic Digital Subscription Line (c) Ethernet (d) Cable Internet
(b) Asymmetric Digital Subscription Line UPPCL TG-II 20-03-2021 (Shift-I)
(c) Asymmetric Digital Subscriber Line Ans. (b) : Dial-up connection uses that telephone line to
(d) Asymptotic Digital Subscriber Line connect the PC to the internet. Dial-up connection is
UPPCL Technical Grade-II (Shift-I) 27.03.2021 required a modem set up. Modem acts a interface
Ans. (c) : Asymmetric Digital Subscriber line is a between the PC, and the telephone line.
technology that provides high transmission speed for 919. Which of the following is a form of broadband
video and sound over in homes the simple copper connection based on connection over ordinary
telephone wire. telephone lines provides.
914. ______ establishes connections using phone (a) Fiber optics (b) Dial-up
lines and carries digitals signals in place of (c) ISDN (d) DSL
analog signals. UPPCL TG-II 27-03-2021 (Shift-I)
(a) Cable TV Internet Connection Ans. (d) : DSL is the short form of Digital Subscriber
(b) ISDN Line. It is a modem technology that uses existing
(c) Dial-up telephone lines to transport high bandwidth data such as
(d) DSL multimedia and video to the service subscriber.
UPPCL TG-II 19-03-2021 (Shift-II) 920. A set of communication standards for the
Ans. (b) : ISDN (Integrated Service Digital Network) is synchronous digital transmission of voice,
video, data and other network services over the
a digital telephone network which is used to point to
traditional circuits of the public switch
point telephone network. It is carried digital signal in telephone network.
place of analog signals and also provide internet service (a) Dial-up (b) DSL
to the user. ISDN is mainly an example of circuit (c) ISDN (d) Fiber optic
switching. Which is source and destination are
UPPCL TG-II (20-03-2021) (Shift-II)
connected through physical circuit network.
Ans. (c) : Full form of ISDN is integrated service
915. Which of the following internet access methods digital network. It is a circuit switch telephone network
is also called switched line? system that transmit both data and voice over the digital
(a) Satellite (b) Dial-up line line. It is transmitted both data and voice single digital
(c) Leased line (d) ISDN lines. ISDN is a set of communication standard that data
UPPCL Technical Grade-II Shift-II, 28.03.2021 voice and signal can be transmitted.
Computer 95 YCT
ye
p
921. NIC is a hardware component which is used to Ans : (d) When we connect two computers through a
connect one computer to another computer in a third computer. It is called proxy. Generally this type of
network. What is the meaning of the term application can be called a transport level gateway.
NIC? 927. Which of the following is used to modulation to
(a) New interface Card demodulation.
(b) Network interface Care (a) Gateway (b) Repeater
(c) Network Interface Card (c) Modem (d) Muliplexer
(d) Network integration Card UPPCL TG-II 20-03-2021 (Shift-I)
KPSC Instructor Electronics Mech.20.07.2018 Ans. (c) : Modem is a networking hardware device.
Ans. (c) : Network Interface Card is hardware That can converts analog signal to digital signal and
component without, it the computer is not connect to the digital signal to analog signal. Analog signal to digital
network. It is a circuit board installed in a computer. conversion is called modulation. The process of
Which is provide network connection to the computer. converting from digital signal to analog signal is called
It is also called network interface controller, Network demodulation.
Adapter Ethernet, LAN adapter. 928. The piece of hardware that converts the digital
922. _____known as a physical address, is a unique signal of your computer to an analog signal
identifier of each host and is associated with that can travel over telephone lines is called a–
the NIC (Network Interface Card). (a) translator (b) blue cord
(a) Media Address (c) converter (d) modem
(b) Media Access Control Address (UPPCL TG2 Re-exam 16-10-2016)
(c) Control Address Ans : (d) See the explanation of the above question.
(d) Domain Address 929. Which of the following is an example of a
GSSSB Electronic Instructor-22.01.2017 communication device?
Ans. (b) : A MAC address (Media Access Control) is a (a) Keyboard (b) Mouse
unique identifier assigned to a Network Interface (c) Printer (d) Modem
Controller (NIC) for communication on a physical (UPPCL TG-2 26.06.2016)
network. Ans : (d) A communication device in networking refer
923. An Ethernet ___ address consist of ____ octets. to hardware that facilitates the exchange of data and
(a) Root-8 (b) Transport layer, 2 information between different devices within a network.
Modem, switch and network interface card (NIC) are
(c) Network. 12 (d) MAC, 6 example of communication devices.
UPPCL Technical Grade-II Shift-I, 28.03.2021
930. IPv4 addresses are divided into four segment.
Ans : (d) The Mac address is a device’s physical What is the size of each segment?
address, which uniquely identifies it on a specific (a) 8 byte (b) 16 bit
network. Mac full form is Median Access Control and (c) 32 bit (d) 8 bit
also known as physical address. GSSSB Electronic Instructor-22.01.2017
An Ethernet MAC address consist of 6 octets and each Ans. (d) : IPv4 address consists of 4 octets and each
octet has eight bits. octet size is 8 bit separated by a dot (.)
924. Bidirectional buffer (example data-bus buffer) An IPv4 address consists of 32 bits. IPv6 addresses are
_____ it is said. 128 bits.
(a) Trans-receivers (b) High Z buffers 931. Using existing telephone lines, you may connect
(c) BDBs (d) Transceivers to the internet using:
KPSC Jr. Instructor- 09.07.2014 (a) USB (b) switch
Ans : (d) Transceivers are combination of both (c) hub (d) modem
transmitter and receivers. There are many examples of RRB Kolkata LP-2009
this likes, telephone, speaker, phone, modem etc. KPSC Instructor Electronics Mech.20.07.2018
925. ISP stands for ______. Ans. (d) : Modem is a abbreviation of modulator and
Demodulator. It is a type of hardware device. Whose
(a) Internet Source Provider
function to send data to the computer through a cable or
(b) Internet Source Protocol telephone. Modem is used to connects to the internet.
(c) Internet Service Provider Through the existing telephone line.
(d) Internet Service Protocol 932. What is technique used to convert encrypted
UPPCL Technical Grade-II-09.08.2015 data back to its original form called.
Ans. (c) : ISP stands for Internet Service Provider. It is (a) decryption (b) subscription
an organization to provide the service access use or (c) modulation (d) demodulation
participate in the internet. UPPCL (TG-II) 24-01-2019 (EVENING)
926. A proxy _____ it happens. Ans : (a) Decryption is a method which convert
(a) A network level gateway encrypted data back in to its original form.
(b) A transport layer gateway 933. What is a function of modem (Modulator-
(c) Network address translation Device Demodulator).
(d) An application level gateway (a) It changes the signal level
RRB Bengaluru LP-2004 (b) It moderates and de-moderated the signal
Computer 96 YCT
ye
p
(c) It is used to increase and decrease the speed IX. Internet & Web Tech.
of the internet
(d) It converts digital signal into analog signal or 939. Which of the following terms is a world-wide
convert analog signal to digital signal network of computers also known as network
HSSC Electrician Instructor -17.12.2019 of networks?
Ans : (d) Modem is a hardware device that converts digital (a) VLAN (b) MAN
signal to analog signal or analog signal to digital signal. (c) Internet (d) World Wide Web
934. DAC full form of digital to analog is GSSSB Electronic Instructor-22.01.2017
(a) Digital to analog converter KPSC Jr. Instructor- 09.07.2014
(b) Digital address conversion Ans. (c) : The internet is a World Wide Network of
computers which is also called a network of networks.
(c) Digital address conversion
(d) Digital address converter 940. If you are replying to an email, which of the
GSSSB Supervisor Electronic Instructor 18.01.2014
following fields are filled in automatically?
(a) "To" and "From" field both
Ans : (a) DAC full form digital to analog converter (b) Only "From" field
DAC converts digital signal to analog signal. (c) Neither "To" field nor "From" field
935. Which of the following is an example of (d) Only "To" field
wireless client? UPPCL TG-II 27-03-2021 (Shift-II)
(a) PDAs (b) Laptops Ans. (a) : If an email user wants to reply an email then he
(c) All of these (d) Mobile phones would filled "To" and "From" field both automatically.
RRB Gorakhpur L.P.-2008 To → Email address of receiver
Ans. (c) : The connectivity refers to the methods used From → Email address of sender
to connect to the internet. Which include wired and 941. Match the points under the column 'LIST-I to
wireless connection. PDA, Laptop and mobile etc. are those under the column 'LIST-II'.
all wireless clients.
List-I List-II
936. Which of the following statement is wrong? a)Email server i) A free email
(a) Fixed access is generally very slow and (Webmail) tool
unreliable as compared to access through mobile. provided by Microsoft
(b) Any smartphone can directly connect to the
b) LinkedIn ii) Postfix
internet using a 3G/4G mobile network.
(c) Any computer can connect to a network using c) Orkut iii) A social networking
Eathernet or Wi-Fi. portal for business
(d) Any network can connect to the internet using professionals
ADSL, Cable or fiber. d) Hotmail iv) The service was
DSSSB Craft Instructor (ESM) 06.10.2019 designed to help users
Ans. (a) : Fixed access is faster than mobile access meet new and old
fixed wireless internet is a higher speed, reliable friends.
internet services for rural and low comparatively (a) a-ii, b-iii, c-i, d-iv (b) a-iii, b-ii, c-iv, d-i
underserved people. (c) a-ii, b-iii, c-iv, d-i (d) a-ii, b-iv, c-iii, d-i
937. Wireless broadband (Wi-Fi) connects a home RRB Kolkata LP-2009
or business to the internet using ____ signals. Ans. (c) : Postfix is a hugely-popular Mail Transfer
(a) sound (b) radio Agent (MTA) designed to determine routes and send
(c) microwave (d) light emails. LinkedIn is a social networking site or portal
MP Electrician Instructor 07.11.2016, Morning designed specifically for the business
Ans. (b) : A Wi-Fi network is simply on internet community/professionals. Orkut was a social
connection shared with multiple devices in a home or networking service owned and operated by Google.
business via a wireless router to nearby devices. The This service was designed to help users meet new and
device transmits a radio signal back to the router which old friends and maintain existing relationships.
connects to the internet by wire or cable. Accounts such as hotmail, outlook, MSN etc. are
938. In Infrastructure WLAN, two devices provided by Microsoft.
communicate– 942. Which of the following is a computer based
(a) Directly (b) Through wires application for exchanging message between
(c) Through routers (d) Through an access point users?
HSSC wireman Instructor -17.12.2019, Shift-II (a) e-kyc (b) e-mail
Punjab Wireman instructor-07.07.2013 (c) e-aadhar (d) e-sharm
Ans. (d) : In WLAN infrastructure two devices are HSSC wireman Instructor -17.12.2019, Shift-I
communicate with each other through access point. KPSC Instructor Electronics Mech.20.07.2018
WLAN full form Wireless Local Area Network. All its Ans. (b) : Email is a computer based application. It
components can be connected to the network by a allows an internet user to send a message in formatted
wireless means and all the stations are equipped with manner (mail) to the other internet user in any part of
wireless network interface controllers. world.
Computer 97 YCT
ye
p
943. Which among the following is used to navigate Ans. (b) : LAN is the short form of Local Area
through hypermedia structures? Network. It connects devices which are available in a
(a) Nodes (b) Keys single or limited area with the help of LAN.
(c) None of these (d) Buttons LAN can share data at speeds ranging from 10 Mbps to
UPPCL Technical Grade-II Shift-I, 28.03.2021 1000 Mbps. Data transmission speed is higher in LAN
GSSSB Supervisor Electronic Instructor 18.01.2014 network because the range of LAN network is limited to
Ans. (a) : Nodes are used to navigate or transfer data a fixed area.
from one place to another place, through hypermedia 948. Which of the following layer is not available in
structures. five - layered internet architecture?
944. In email, to search for messages after (a) Transport (b) Data Link
02/22/2021, which of the following option (c) Session (d) Application
should be entered? MP Electrician Instructor 07.11.2016, Morning
(a) newer than : 02/22/2021 Ans. (c) : TCP/IP has five different layers those are
(b) newer : 02/22/2021 followings -
(c) after than : 02/22/2021 → Application Layer
(d) after : 02/22/2021 → Transport Layer
RRB Gorakhpur L.P.-2008
→ Internet Layer
DSSSB Craft Instructor (ESM) 06.10.2019
→ Data Link Layer
Ans. (d) : To find emails after a specific date use
YYYY/MM/DD . For ex. if you are trying to find → Physical Layer
emails before or after September 1, 2021 type before: Therefore, session layer does not come under five layer
2021-09-01 or after: 2021-09-01 in the search bar and internet architecture.
press enter. You can combine the two keywords to find 949. In the context of Internet, what is the full form
emails between two dates. of ARPANET?
945. Which of the following options is the correct (a) Advanced Research Planning Agency
sequence to print an entire web page in Google Network
Chrome browser? (b) Automatic Research Projects Agency
(a) Open the web page -> Press Ctrl + A -> Right Network
click on the page and left click on 'Print' (c) Advanced Remedial Projects Agency
(b) Open the web page -> click on page Setup -> Network
Click on the 'Print' icon (d) Advanced Research Projects Agency
(c) Open the web page -> Press Ctrl + S -> Right Network
click on the page and left click on 'Print' UPPCL Technical Grade-II (Shift-I) 27.03.2021
(d) Open the web page -> Click on Print Preview Ans. (d) : In the context of internet full form of
-> Click on the 'Print' icon ARPANET is Advanced Research Projects Agency
HSSC Electrician Instructor -17.12.2019 Network.
Ans. (a) : To print the entire webpage in Google 950. Almost every search engine user programs or
Chrome browser use the following procedure: automated scripts called ______ to
→ Open the web page systematically browse the World Wide Web
→ Use/press Ctrl + A shortcut key and index them in a local repository.
→ Right click on the page and left click on print. (a) Crawler (b) Adware
(c) Spooler (d) Spyware
946. In the context of searching content on the RRB Bengaluru LP-2004
Internet which of the following facts is NOT true?
(a) Use quotation marks Ans. (a) : A web crawler or web spider is a computer
(b) Use complex search terms program that is used to search and automatically index
(c) Use specific keywords website content and other information over the internet.
(d) Vary your search engine 951. Which of the following statements regarding
UPPCL Technical Grade-II Shift-II, 28.03.2021 the Internet is incorrect?
Ans. (b) : We can use quotation marks, choose specific (a) It is a global network that connects billions of
keywords and change our search engine to search for computers around the world.
content on the Internet but we can not use complex term in (b) It uses TCP/IP protocol.
browser. (c) It is different from the World Wide Web.
947. Which of the following is true with respect to (d) It is a collection of web pages which are
Local Area Network? accessed through a browser.
(a) LAN can be operated only on client/ server UPPCL Technical Grade-II (Re-exam) 16.10.2016
technology Ans. (d) : Internet is an international network of
(b) It connects devices that are in a single limited area computers which is called a network of networks. The
(c) It is a combination of devices connected in Internet is a global system of interconnected computer
different countries networks that uses the Internet Protocol Suite (TCP/IP)
(d) WAN cannot connect multiple LANs to communicate between networks and devices. It is a
simultaneously wide area network and is a collection of World Wide
UKSSSC Tech. Electrical Instructor-21.11.2017 Web pages.
Computer 98 YCT
ye
p
952. Find out whether the given statements are true 956. Which of the following entities is not an
or false. Internet Service Provider (ISP) in India?
(i) WWW is a worldwide network of devices (a) HSBC
like computers, laptops, tablets etc. (b) BSNL
(ii) The Internet is a collection of websites or (c) TATA Communications
web pages stored on web servers and (d) MTNL
connected to local computers. Punjab Wireman instructor-07.07.2013
(a) (i)- false, (i)- true (b) (i)- true, (ii)- false Ans. (a) : HSBC institution is a foreign banking
(c) (i)- false, (ii)- false (d) (i)- true, (ii)- true institution in India.
GSSSB Electronic Instructor-21.01.2014
957. Find out which of the following in the content
Ans. (c) : The World Wide Web is an interconnected of internet are the statements true or false?
system of public web pages accessible via the Internet. The (i) Two recent adaptations of internet
World Wide Web follows the client-server model. The
World Wide Web provides features such as hypertext technology are the intranet and the extranet.
information system, cross-platform, distributed, open (ii) The internet currently utilizes a portion of
standards, open-source, etc. British scientist Tim Berners- the total resources of the existing public
Lee invented the World Wide Web in 1989. telecommunication networks.
The Internet is a global system of interconnected (a) (i) True (ii) False (b) (i) True (ii) True
computer networks that uses the Internet Protocol Suite (c) (i) False (ii) True (d) (i) False (ii) False
TCP/IP to communicate between devices and networks. UPPCL Technical Grade-II (Shift-II) 20.03.2021
Internet is a global network of computers. Hence, both Ans. (b) : Internet is a world wide network of
the given statements are false. computers. It consists of many local, national and
953. DNS (Domain Name System) comes under international networks and all these networks are
which of the following services of the Internet? interconnected. It currently uses a portion of the total
(a) Communication (b) Directory resources of the existing public telecommunications
(c) WWW (d) Information retrieval network. Two recent adaptations of internet technology
UPPCL Technical Grade-II (Shift- II) 27.03.2021 are the intranet and the extranet.
Ans. (b) : DNS (Domain Name System) comes under 958. Which of the following includes core web
the service of Internet Directory. The Domain Name interest groups, such as web browser
System (DNS) is a naming database in which Internet developers, government agencies, researchers
domain names are located and translated into Internet and universities?
Protocol (IP) addresses. The Domain Name System has (a) Internet Research Task Force
been an essential component of the functionality of the (b) Internet Engineering Task Force
Internet since 1985. (c) World Wide Web Consortium
954. Which of the following types of computing is (d) Internet Architecture Board
used in the defense industry? KPSC Jr. Instructor 22.11.2018w
(a) Pharmacy Management Software
(b) Library manager Ans. (c) : World Wide Web Consortium is an
(c) GPS tracking international organization. It was founded in 1994 by
(d) e-banking Tim Berners-Lee. This mainly includes core web
KPSC Instructor Electronic-25.06.2014 interest groups such as web browser developers,
Ans. (c) : GPS tracking monitors location through the use government institutions, researchers and universities
of the Global Positioning System (GPS) to remotely track etc.
the location of an entity or object. GPS technology is used 959. Which of the following keyboard shortcuts can
for a wide variety of military missions, including precision- be used in Google Chrome to open a link in a
guided, munitions strikes, force tracking, search and rescue, new window?
and remote piloting of unmanned aerial vehicles. (a) Alt + click a link
955. Which of the following is not proper internet (b) Double click a link
etiquette? (c) Shift + click a link
(a) You can forward unwanted messages (d) Ctrl + click a link
(b) You should include your name at the bottom UPPCL Technical Grade-II (Shift-I) 19.03.2021
of the mail HSSC wireman Instructor -17.12.2019, Shift-II
(c) You should use abbreviations wisely Ans. (c) : Shift + click a link keyboard shortcuts can be
(d) Attachments should be small used in Google Chrome to open a link in a new window.
UPPCL Technical Grade-II (Shift-I) 20.03.2021
960. Which of the following symbols is used to leave
Ans. (a) : Internet etiquette, often referred to as a placeholder that may be automatically filled
"netiquette", refers to a set of guidelines and social by the search engine later while searching?
norms for polite and respectful behavior when using the (a) Asterisk (*) (b) Hyphen (-)
internet, especially in online communications. Here are (c) Colon (:) (d) Plus (+)
some proper internet etiquette - WBPSC Instructor-18.09.2021
→ You should include your name at the bottom of the mail. Ans. (a) : The asterisk wildcard will leave a placeholder
→ You should use abbreviations wisely. that will be filled automatically by the search engine.
→ Attachments should be small. This wildcard is an easy way to find a parameter if we
→ Think before you post. don't know all the words.
Computer 99 YCT
ye
p
961. Which of the following statements is incorrect Ans. (b) : The TCP/IP (Transmission Control Protocol/
regarding the internet? Internet Protocol) model follows a horizontal approach
(a) Internet and World Wide Web are the same and has 5 layers.
(b) Every computer connected to the internet is • Physical Layer • Link Layer or Network Access Layer
identified by an IP address
(c) A computer connected to the internet is called • Network Layer • Transport Layer
a client • Application Layer
(d) Internet works with the help of clients and 966. Which of the following WAN technology is a
servers method of data transmission in which a
UPPCL Technical Grade-II-09.08.2015 message is divided into several Parts called
Ans. (a) : The full form of the internet is an packets and is sent independently, in triplicate,
interconnected network. It was developed by Bob Kahn over the same route as each packet that is
and Vint Cerf in 1969. The network of networks are optimized for and reassembled at the
called internet and its information and data exchanged destination?
through this medium. The World Wide Web is a service of (a) Packet over SONET (b) Overlay network
the internet. Through this web pages are received in which (c) Circuit switching (d) Packet switching
text, images, audio, video and other multimedia are also KPSC Jr. Instructor- 09.07.2014
available. Statement (a) is false regarding internet.
Ans. (d) : Packet switching is a method of transferring
962. Which of the following statements is correct data by dividing it into multiple parts called packets.
about the Internet?
(a) Internet and World Wide Web are the same. 967. Which of the following switching technology is
(b) It is collection of web pages that is accessed used by the internet?
through browsers. (a) Telephone Switching (b) Packet Switching
(c) It uses the TCP/IP protocol. (c) Circuit Switching (d) Telex Switching
(d) It is a private network that connects UPPCL TG-II 19-03-2021 (Shift-II)
computers of an organisation. Ans. (b) : Packet switching technology is used by the
UPPCL Technical Grade-II (Shift-II) 19.03.2021 Internet. Packet switching is a method of transferring data
Ans. (c) : The Internet is a global network of in the form of packets across different networks. In order
interconnected computers and servers that allows people to transfer files over the network in a fast and efficient
all over the world to communicate, share information, manner and reduce transmission latency, data is divided
access resources and engage in various online activities. into smaller pieces of variable length, called packets.
It facilitates the transfer of data through a system of 968. IP serves as a focal point for the internet
protocols, including TCP/IP, enabling services like web protocol architecture, it defines a common
browsing, email, social media and much more. method for exchanging ______ between a wide
963. What is the full form of PDN? collection of networks.
(a) Pocket Data Network (a) Message (b) Packet
(b) Packet Data Network (c) Pocket (d) Information
(c) Packet Discharged Network UPPCL TG-II 27-03-2021 (Shift-I)
(d) Pocket Discharged Network
UP PCL Technical Grade-II-11.11.2016 Ans. (b) : IP serves as the focal point for the
architecture, it defines a common method for
Ans. (b) : PDN stands for Public Data Network or exchanging packets among a wide collection of
packet data network. This is a generic term for a
networks. Above IP there can be arbitrarily many
network providing data services as Internet and Intranet.
transport protocols, each offering a different channel
964. With reference to Host to Host layer, which abstraction to application programs.
among the following is/are NOT its protocols?
969. Which of the following statements is
A Transmission Control Protocol
INCORRECT about plug-ins?
B. User Datagram Protocol
(a) Adobe Flash is an example of an application
(a) Both A and B (b) Only A
that is available as a plug-in Adobe Flash
(c) Only B (d) Neither A nor B
UPPCL Technical Grade-II-26.06.2016
(b) They are applications intended for use in a
web browser
Ans. (d) : Host to Host layer is the layer just above the
(c) Plug-ins are similar to Active X controls
internetwork, which is responsible for end to end data
integrity. The two most important protocols operating at (d) Plug-ins can be executed outside of a web
this layer are Transmission Control Protocol (TCP) and browser
User Datagram Protocol (UDP). RRB Kolkata LP-2009
965. Which of the following statements is GSSSB Electronic Instructor-22.01.2017
INCORRECT with reference to TCP/IP model? Ans. (d) : Out of the above options, (d) is incorrect
(a) TCP/IP follows a horizontal approach. because Adobe Flash Plug-ins available as application
(b) TCP/IP has seven layers can't be executed outside the web browser. Adobe Flash
(c) TCP/IP is more reliable when compared to Player (formerly known as Macromedia Flash Player and
OSI model Shock web Flash in Internet Explorer, Firefox and Google
(d) TCP refers to Transmission Control Protocol Chrome) Flash player can run from a web browser as a
UPPCL Technical Grade-II-02.08.2015 browser plug-in or an supported mobile devices.
Computer 100 YCT
ye
p
970. Which among the following is/are NOT types of 975. The first network that planted the seeds of
website hosting? internet was-
A. Shared hosting (a) ARPANET (b) NSFNET
B. Dedicated server (c) VNET (d) INET
C. Grill hosting (UPPCL TG-2 26.06.2016)
(a) None of the given options (b) Only B Ans : (a) A group of interconnected computers is called
(c) Only A (d) Only C internet. The US department of defense ARPANET
UPPCL Technical Grade-II Shift-I, 28.03.2021 (Advanced Research Project Agency Network) was a
Ans. (d) : Web Hosting is a service that allows an network that formed the basis of the internet. In 1970,
individual or organization to post their website or the size of the network was increased with the help of
webpage on the internet. TCP/IP protocol.
Types of web hosting– 976. Which of the following is considered to be the
1. Shared Web Hosting world's first computer network?
2. Dedicated Hosting (a) NSFNET (b) ASAPNET
3. Virtual Private Server (VPS) (c) CNNET (d) ARPANET
4. Cloud Web Hosting UPPCL TG-II 19-03-2021 (Shift-I)
5. Grid Hosting Ans. (d) : ARPANET (Advanced Research Project
971. Which of the following is web browser Agency Network) was packet switching network and first
software? network to implement the TCP/IP protocol suite. This is
(a) Ubuntu (b) Linux launched by USA in 1969 by the department of defense. It
(c) Vivaldi (d) ChromeOS is based on packet switching technology network.
KPSC Instructor Electronics Mech.20.07.2018 977. What was the name of the first internet.
Ans. (c) : The name of a freeware, cross-platform web (a) UNIVNET (b) USNET
browser with a built-in e-mail client is Vivaldi, while (c) ARPANET (d) EURONET
Ubuntu, Linux and ChromeOS are operating systems. HSSC wireman Instructor -17.12.2019, Shift-II
972. Which of the following HTML tags specifies a Ans : (c) ARPANET is the World's first internet which
container for an external (non-HTML) was interlinked with NSFNET.
application? 978. State whether the following statements are true
(a) <em> (b) <embed> or false.
(c) <ins> (d) <nav> (i) Internet is the best popular local area
UPPCL Technical Grade-II Shift-II, 28.03.2021 network (LAN).
Ans. (b) : The HTML tag <embed> specifies a (ii) Each computer connected to the internet
container for an external (Non-HTML) application. It (should have IP address).
also defines a navigation bar that contains a set of menu (a) (i)–correct, (ii) –correct
or a menu of hyperlinks. This hyperlink is also called a (b) (i)–wrong, (ii) –wrong
navigation link.
(c) (i)–correct, (ii) –wrong
973. In order to transfer files between two
computers located at distant places, whom (d) (i)–wrong, (ii) –correct
should be they connected? UPPCL TG-II 27-03-2021 (Shift-II)
(a) Internet (b) Hub Ans. (d) : (i) The best network to make better use of the
(c) Repeater (d) Modem internet is WAN (Wide Area Network) which covers a
UPPCL (TG-II) 24-01-2019 (EVENING) very large area. The LAN is limited to an office or
Ans : (a) The Internet is the global system of building.
interconnected computer network that uses the internet (ii) It is every computer connected through IP address to
protocol suite (TCP/IP) to communicate between internet. IP address is numeric level of internet protocol.
network and devices. It is a network of networks that 979. Which of the following statements regarding
consists of private, public, academic, business and the internet is incorrect.
government networks of local to global scope. (a) Every computer in the internet is identified by
974. It is believed that the Internet was developed a unique IP address.
by DARPA explain the full form of DARPA? (b) The internet is owned by the United Nations
(a) Defense Active Research Projects Agent (c) The internet is a World Wide Global system
(b) Different Advanced Research Projects Agency of interconnected computer network.
(c) Defense Advanced Research Projects Agency (d) The internet uses the standard internet
(d) Defense Advanced Review Projects Agent protocol (TCP/IP)
RRB Gorakhpur L.P.-2008 UPPCL TG-II (20-03-2021) (Shift-II)
Ans. (c) : The full form of DARPA is Defense Ans. (b) : Computer is identified by IP address. Internet
Advanced Research Projects Agency. It is a USA is global system of interconnected government
government agency. It prepares and executes research educational, corporate, public and private computer
and development projects to expand the boundaries of network. Internet uses the standard internet protocol
technology and science. It is believed that the Internet (IP) and transmission control protocol (TCP). The
was developed by DARPA. united nations does not own the internet.
Computer 101 YCT
ye
p
980. Classify the following into web browsers and 985. Which of the following is the delivery of
Search engines. various services through the internet. These
(1) Firefox resources contain tools and application such as
(2) Chrome data storage, servers, databases, networking
(3) Duck-Duck-Go and software.
(4) Edge (a) Local Area Networking
(5) Bing (b) Personal Area Networking
(6) Internet Explorer (c) Metropolitan Area Networking
(7) Safari (d) Cloud Computing
(8) Google UPPCL TG-II 27-03-2021 (Shift-I)
(9) Yahoo Ans. (d) : Cloud computing is a delivery of computing
(10) Opera services such that including software, analytics and
(a) Web browser - 1,2,4,6,7,10 intelligence over the internet. It is a tool application such
Search engine -3,5,8,9 that server, storage, database networking resources etc.
(b) Web browser - 1,2,4,7,10 986. Which of the following function keys/keyboard
Search engine -3,5,6,8,9 shortcuts can be used to reload the current
(c) Web browser - 1,2,4,6,10 page in Google Chrome?
Search engine -3,5,7,8,9 (i) F5
(d) Web browser - 1,2,4,6,7,9 (ii) Ctrl + r
Search engine -3,5,8,10 (a) Only (ii) (b) Neither (i) nor (ii)
UPPCL Technical Grade-II (Shift-I) 27.03.2021 (c) Only (i) (d) (i) and (ii) both
Ans. (a) : Web browsers– Firefox, Chrome, Edge, UKSSSC Tech. Electrical Instructor-21.11.2017
Internet explorer, Safari, Opera. Ans. (d) : To reload the current page in Google chrome,
Search Engine– Duck-Duck-Go, Bing, Google, Yahoo. use the F5 or Ctrl + r Function keys/keyboard shortcut.
981. Which of the following is the main component Ctrl + W or Ctrl + F4 shortcut is used to close the
of Linux that interacts with the hardware? current page.
(a) GUI (b) Kernel 987. Which of the following statements is not true
(c) Shell (d) Editor about saving web pages for later viewing.
GSSSB Supervisor Electronic Instructor 18.01.2014 (a) A webpage can be bookmarked only and
Ans. (b) : Kernel is the main part of Linux - it interacts cannot be saved
with the computer hardware. Every operation of hardware (b) A web page can usually be saved through the
and software is managed and administered by the Kernel. option "File" → save As.
982. Which of the following is used in small offices (c) Some tools allow downloading the entire data
and internet cafes to allow small group of a website and accessing it offline.
computers to be connected to each other. (d) Most web browsers convert web pages to
(a) Personal Area Network (PAN) PDF files provides the facility to saves as.
(b) Local Area Network (LAN) UPPCL TG-II (20-03-2021) (Shift-II)
(c) Metropolitan Area Network (MAN) Ans. (a) : A webpage is a hypertext document provided
(d) Wide Area Network (WAN) by the website. It is displayed with the help of a web
UPPCL TG-II 27-03-2021 (Shift-II) browser. Users can save the web page and save the web
Ans. (b) : LAN stands for Local Area Network is a address as per their requirement.
computer network, which is used to connect two or more 988. Uses the internet
computers. It is a local area network operating at a local (a) Feed forward switching
level. For example home, office, school, airport etc. (b) Forward switching
983. A cookie is (c) Circuit switching
(a) an advertisement displayed on a web page (d) Variable length packet switching
(b) a program that records web site visits HSSC Electrician Instructor -17.12.2019
(c) an information stored by web server on client Ans : (d) Internet carries a very large range of
(d) a technology to store password on client information and it uses variable length packet
system switching.
UPPCL Technical Grade-II (Shift- II) 27.03.2021
989. Which of the following statements is/are incorrect?
Ans. (c) : Cookies are feature in web browsers with the (i) Internet is a worldwide network of many
help of which a website stores some information on the smaller networks.
user's computer. (ii) Internet between computers located at distend
984. Set of rules and guidelines used for Internet is places provides the facility of transfer of files.
technically called as: (a) Only (ii) (b) Only (i)
(a) Netetiquette (b) Netiquette (c) Neither (i) nor (ii) (d) Both (i) and (ii)
(c) Shockware (d) Spyware UPPCL (TG-II) 24-01-2019 (Morning)
(UPPCL TG2 11-11-2016) Ans : (c) Internet is group of many small networks. It
Ans : (b) A set of rules and guidelines used for the is help of internet. It is used to local information/data
internet is technically known as a netiquette. send and receive one place to another place.
Computer 102 YCT
ye
p
990. By what means are webpage connected to each 996. Which of the following web browsers was
other. developed by Apple?
(a) Hyperlinks (b) Edges (a) Mozilla Firefox (b) Safari
(c) Links (d) Wi-Fi (c) Opera (d) Internet Explorer
UPPCL (TG-II) 24-01-2019 (Morning) UPPCL Technical Grade-II (Shift-II) 19.03.2021
Ans : (a) Hyperlink points to the entire document Ans. (b) : Safari is a graphical web browser developed
within a document. A webpage is a collection of pages. by Apple that is based on open-source software such as
991. Which of the following is not a web browser? WebKit. It was first released for desktop in 2003 with
(a) Netscape (b) Military Mac OSx Panther on Mac. It was presented first time
with iphone in 2007 with iOS devie for mobile.
(c) Yandex (d) Opera
UPPCL Technical Grade-II (Shift-I) 20.03.2021 997. Which of the following statement(s) is/are true
Ans. (c) : Yandex is a search engine. about web browsers?
Search engines - Google, Bing, Yahoo, DuckDuckGo, (i) They are application software that is used to
Baidu, Ask.com, Never. search, retrieve and display information
available on the World Wide Web.
Web browser - Chrome, Firefox, Opera, Microsoft (ii) They send requests to web servers across
Edge, Safari, Vivaldi, Brave, Netscape Navigator,
the Internet using HTTP.
Mosaic, Internet Explorer, Chromium etc.
(a) Both (i) and (ii) (b) Neither (i) nor (ii)
992. Which of the following is not web mail (c) Only (ii) (d) only (i)
provider? RRB Bengaluru LP-2004
(a) upGrad (b) Yahoo Ans. (a) : A web browser is application software that is
(c) Outlook (d) Google used to search, retrieve and display information
GSSSB Electronic Instructor-21.01.2014 available on the World Wide Web and to send requests
Ans. (a) : Google, Outlook and Yahoo are web mail to web servers across the Internet using HTTP.
Microsoft Edge, Internet Explorer, Mozila Firefox,
provider, these are usually free e-mail accounts that operate
from a website, whereas upGrad is not related to Webmail. Opera, Safari etc. are examples of web browser
993. Which of the following keyboard shortcuts is 998. Which of the following statements is/are true?
used to activate the first tab when multiple tabs (i) Yahoo is a web portal, which is one of the
are opened in Google Chrome? main features of web search portal.
(a) Ctrl + 1 (b) Alt + 9 (ii) Google and Bing both are search engines.
(c) Alt + 1 (d) Ctrl + 9 (a) Neither (i) nor (ii) (b) Only (i)
UPPCL Technical Grade-II (Shift-II) 20.03.2021 (c) Only (ii) (d) Both (i) and (ii)
Ans. (a) : Table for chrome tab action DSSSB Craft Instructor (ESM) 06.10.2019
Action Shortcut Ans. (d) : Yahoo is a web service provider. It provides
Active the first tab Ctrl + 1 a web portal. Google and Bing both are search engines.
Active the right most tab Ctrl + 9 999. World Wide Web was the first web browser,
Move tabs right or left Ctrl + Shift +Pg Dn named _____ to avoid any confusion with the
World Wide Web.
Ctrl + Shift + Pg Up
(a) Nexus (b) Firefox
994. Which of the following is a graphical web (c) Safari (d) Internet Explorer
browser developed by Apple? MP Electrician Instructor 07.11.2016, Morning
(a) Edge (b) Chrome Ans. (a) : The World Wide Web was the first web
(c) Safari (d) Firefox browser, which was later named Nexus to avoid any
UPPCL Technical Grade-II (Shift-I) 19.03.2021 confusion with World Wide Web. It was invented by
Ans. (c) : Safari is a web browser developed by Apple. 'Tim Berners-Lee' in 1990.
It is built into Apple's operating systems, including Mac 1000. The ______ browser was a text based browser,
OS, iOS, and iPad OS are used Apple's open source invented in ______.
browser engine website. (a) Lynx; 1985 (b) Safari; 1985
995. Which of the following is an incorrect (c) Lynx; 1992 (d) Safari; 1992
statement about search engines? WBPSC Instructor-18.09.2021
(a) Bing was launched by Microsoft in 2009. Punjab Wireman instructor-07.07.2013Ans. (c) : The
(b) Google search engine was originally known Lynx browser was a text based browser invented in 1992. A
as Backrub text - based web browser is a web browser that renders only
(c) AltaVista was launched by Apple. the text of web page and ignores most graphic content.
(d) Ask was launched in 1996. 1001. Match the columns.
KPSC Instructor Electronic-25.06.2014 Web Browsers Manufacturer
Ans. (c) : About search engine Bing, Google search (i) Chrome (a) Microsoft
engine, Ask are correct based on the given statements, (ii) Edge (b) Apple
while AltaVista is incorrect because it was not launched (iii) Safari (c) Google
by Apple, AltaVista was launched by Digital Equipment (a) (i)-(a), (ii)-(b), (iii)-(c)
Corporation on December 15, 1995. (b) (i)-(c), (ii)-(b), (iii)-(a)
Computer 103 YCT
ye
p
(c) (i)-(c), (ii)-(a), (iii)-(b) Ans. (b) : A web browser is a program that your
(d) (i)-(b), (ii)-(a), (iii)-(c) computer runs to communicate with web servers on the
HSSC wireman Instructor -17.12.2019, Shift-I Internet which enables you to download and display the
KPSC Jr. Instructor 22.11.2018 web pages that you request. A web server is software
Ans. (c) : Google Chrome is a web browser developed and hardware that uses HTTP and other protocols to
by Google on December 11, 2008 through open source respond. Web server is program that process the
code. Microsoft Edge is a web browser developed by network request of users and servers them with file that
Microsoft that was released in July 2015. Microsoft create web page.
Edge replaced Internet Explorer 11 as the default 1007. Which of the following inbox categories helps
browser in Windows 10, and Edge was also released for to focus on the emails that matter the most and
Android and iOS in 2017 and for Mac OS in 2019. separates the inbox into different tabs in MS-
Safari is a graphical web browser developed by Apple. It is Outlook 365?
primarily open source software and primarily based on (a) Other (b) Unfocused
WebKit. It supports macOS, iOS and iPodOS and Safari (c) Focused (d) Important
has become the third most popular desktop browser.
HSSC wireman Instructor -17.12.2019, Shift-II
1002. Which of the following provides a software
Ans. (c) : Focused inbox separates your inbox separates
interface that allows you to click on WWW
your inbox into two tabs focused and other your most
hyperlinked resources?
important e-mail messages are on the focused tab while
(a) Browser (b) IP Address
the rest remain easily accessible but out of the way on
(c) URL (d) URI the other tab.
KPSC Jr. Instructor- 09.07.2014
Ans. (a) : A browser is a software program used to locate, 1008. Who developed the Chromium web browser?
retrieve, and display information available on the World (a) Mozilla (b) Apple
Wide Web and provides an interface that allows clicking (c) Google (d) Microsoft
on hyperlinked resources on the World Wide Web. UPPCL Technical Grade-II-26.06.2016
1003. Which of the following is a type of browser Ans. (c) : Chromium is a free and open - source web
window that opens without any user request browser project, mainly, developed and maintained by
while browsing the internet? Google. This cache base provides the vast majority of
(a) Pop-up (b) Pull-up code for the Google chrome browser, which is
(c) Plugins (d) Add-ons proprietary software and has some additional features.
UP PCL Technical Grade-II-11.11.2016 1009. If we want to download all the assets like
Ans. (a) : Pop - up is a type of browser window, which images, videos etc. along with the web page,
opens without any user request while browsing the then in which of the following formats should
Internet. It is also used to show advertisements on the we save the downloaded web page?
Internet we can turn on or off pop-up windows in our (a) Webpage (complete)
browser as per our choice. (b) Webpage (HTML only)
1004. Which of the following is not the main part of a (c) webpage
search engine? (d) Webpage (pdf)
(a) Search algorithm (b) Search index RRB Gorakhpur L.P.-2008
(c) Crawler (d) Kernel
GSSSB Electronic Instructor-22.01.2017
Ans. (a) : The options for saving the webpage vary
depending on the browser. If choose webpage
Ans. (d) : Search engine is a web based application that (complete), then you want to save the whole webpage
helps the user to find information on the World Wide along with all the assets like images, videos and files
Web. Its main parts are search algorithm, search index included. This keeps the visual look intact, but it may
and crawler while kernel is a part of operating system.
not keeps the HTML link structure of the original page
1005. Which of the following options is generally or any server - side elements in order.
used to store the contact information of the
people you contact frequently by web mail? 1010. Identify whether the given statements are true
(a) Public profile or false.
(b) Private profile (i) Web browser is an application used to
(c) Online calendar access and view websites.
(d) Online address book (ii) A website helps you search other web
RRB Kolkata LP-2009 pages like Google.
Ans. (d) : Address book feature of a mail program (a) (i) True (ii) True (b) (i) True (ii) False
allows the users to store information about the people (c) (i) False (ii) True (d) (i) False (ii) False
when they communicate regularly by sending e-mails. KPSC Instructor Electronics Mech.20.07.2018
1006. Which of the following is a software program Ans. (b) : A web browser is a software application that
that serves the web pages requested by web allows users to access and view content on the World
users using a browser? Wide Web. A website is a collection of web pages or
(a) Website (b) Web server digital documents that are accessible on the internet. A
(c) URL (d) Web client website does not help you search other web pages. So,
UPPCL Technical Grade-II (Re-exam) 16.10.2016 statement (i) is True and statement (ii) is False.
Computer 104 YCT
ye
p
1011. Which of the following privacy and security 1016. Which of the following statements is correct
setting of the Google Chrome browser uses regarding web search engines?
cookies to remember preferences, even if we do (a) It searches the IP address of the web server
not visit those pages? (b) Web crawler is an important component of
(a) Manage certificates web search engine
(b) Clear browsing data (c) It is a system software
(c) Preload pages for faster browsing and searching (d) Google chrome is a web search engine
(d) Sync and Google services MP Electrician Instructor 07.11.2016, Morning
UPPCL Technical Grade-II-02.08.2015 Ans. (b) : Search engine is a type of service which we can
Ans. (c) : Preloading pages in Google Chrome is a access through the internet. Web crawler is an important
feature that aims to speed up browsing and searching by component of web search engine. Presently we use many
loading web pages in the background before you search engines some of the major search engines are
actually click on them. This can make the browsing follows - Google, Bing, Yahoo, Duck Duck Go etc.
experience feel faster because when you do click a link, the 1017. Which of the following statements are true
page may already be partially loaded or cached, reducing about Google Chrome?
the perceived loading time. It uses cookies to remember (i) It is popular web browser.
preferences, even if we do not visit those pages. (ii) It is developed by Microsoft.
1012. Which of the following is a component of a web (a) Both (i) and (ii) (b) Neither (i) and (ii)
search engine? (c) Only (ii) (d) Only (i)
(a) Internet Protocol (b) Web browser WBPSC Instructor-18.09.2021
(c) Web server (d) Web crawler Ans. (d) : Google Chrome is a cross - platform web
HSSC Electrician Instructor -17.12.2019 browser developed by Google. It is a popular web
browser. It was launched on 2 September 2008.
Ans. (d) : A web crawler is a computer program or
automated script that systematically browses the 1018. Web browsers store the URLs you visit most
internet and collects information from websites. Web often, which helps you jump to a web page
crawlers are commonly used by search engines like from a list instead of typing the URL multiple
Google to index web pages and make them searchable. times. In what context is this list talking?
It is also known as web spider or web bot. (a) History (b) Cookies
(c) Bookmarks (d) Downloads
1013. Which of the following is a cross - platform HSSC wireman Instructor -17.12.2019, Shift-I
Web browser that was first bundled with Ans. (c) : Bookmark allows the user to save a particular
Windows 10 in 2015? website for later viewing so that it can be revisited when
(a) Opera (b) Mozilla Firefox needed.
(c) Safari (d) Edge The bookmarks feature can usually be identified by a
UPPCL Technical Grade-II-09.08.2015 star - shaped icon located to the right of your browser's
Ans. (d) : The Microsoft 'Edge' is a web browser main search bar which is used for bookmarks.
developed by Microsoft. It was first bundled with 1019. Which of the following are small programs that
windows 10 in 2015 and is designed to be a successor to extend or extend the browsers features?
the older Internet Explorer browser. (a) Cookies (b) Favorites
1014. Which of the following statements is/are true (c) Add-ons (d) Bookmarks
about a web browser? KPSC Jr. Instructor 22.11.2018w
(i) It is a system software that interacts with the Ans. (c) : Add-ons are programs integrated into a web
web server. browser that extend or extend the browsers features.
(ii) Safari is a web browser. 1020. Identify whether the given statements are true
(a) (ii) only (b) Both (i) and (ii) or false.
(c) (i) only (d) Neither (i) nor (ii) (i) Lycos is a web search engine.
RRB Bengaluru LP-2004 (ii) To reload your web browser you have to
Ans. (a) : A web browser is a software application that press 'Ctrl + F5' keyboard shortcut.
allows users to access and view content on the world (a) (i) False, (ii) True (b) (i) True, (ii) False
wide web. It interprets and displays web pages, which (c) (i) False, (ii) False (d) (i) True, (ii) True
are written in languages like HTML, CSS and Java Punjab Wireman instructor-07.07.2013
Script, Popular web browsers include Chrome, Firefox, Ans. (d) : In the above question both statements (i) and
Safari and Edge. So statement (ii) is correct. (ii) are true.
1015. Which of the following is not a web browser? 1021. Which of the following keyboard shortcut is
(a) Safari (b) Opera used to close the active tab in Google Chrome?
(c) Google Chrome (d) Google (a) Shift + W (b) Ctrl + T
DSSSB Craft Instructor (ESM) 06.10.2019 (c) Alt + W (d) Ctrl + W
Ans. (d) : Google is a web search engine. It was KPSC Instructor Electronic-25.06.2014
developed in 1998 by Sergey Brin and Larry Page. It is Ans. (d) : In Google Chrome Ctrl + W shortcut is used
the most used search engine, while Safari, Opera and to close the currently active window. Ctrl + T shortcut
Google Chrome is a web browser. key is used to open a new tab in Google Chrome.
Computer 105 YCT
ye
p
1022. Which of the following algorithms is used by Ans. (c) : Search engine has three components, web
Google search to rank websites according to crawler, database, and search interface, hence web
their search engine results? server is not a search engine. Web Crawler, a search
(a) Internet Rank (b) Site Rank engine uses multiple web crawlers to crawl through the
(c) Page Rank (d) Engine Rank World Wide Web and collect information. It is basically
GSSSB Electronic Instructor-21.01.2014 a software also known as a bot or spider.
Ans. (c) : Google Search primarily uses an algorithm 1028. Which of the following statements is correct
called "Page Rank" to rank websites its search engine about search engines?
results. Page Rank was one of the early and (a) Google search engine was originally known
foundational algorithms developed by Larry Page and as Back Rub
Sergey Brin, the founders of Google. (b) Alta Vista was launched by Microsoft
1023. What is generally used by a web client to view (c) Bing was developed by Apple
the web page? (d) Ask was launched in 2005
(a) Web server (b) Web engine UPPCL Technical Grade-II (Re-exam) 16.10.2016
(c) Web protocol (d) Web browser
UKSSSC Tech. Electrical Instructor-21.11.2017 Ans. (a) : Google was officially launched in 1998 by
Ans. (d) : A web browser is a software application used Larry Page and Sergey Brin to market Google search.
to access and display websites on the internet. It allows Larry Page, Sergey Brin, students at Stanford
users to interact with web pages, view text, images, University in California developed a search algorithm at
videos, and other contents. Popular web browsers first known as 'BackRub' in 1996, with the help of Scott
include Google Chrome, Mozilla Firefox, Microsoft Hassan and Alan Steremberg. Therefore, Google search
Edge, and Safari. engine was originally known as 'BackRub'. Altavista
1024. Which of the following options is correct about was a web search engine established in 1995. Bing is a
opening a Google Chrome browser in Incognito web search engine owned and operated by Microsoft.
mode? 1029. Which of the following is not a search engine?
(a) It saves neither the browsing history nor the (a) Bing (b) Google
data entered in the personal account. (c) Brave (d) YouTube
(b) It saves only the cookies in the personal HSSC wireman Instructor -17.12.2019, Shift-I
account but neither the browsing history nor
the data entered. Ans. (c) : Bing, Google, YouTube all are search engines
(c) It saves the browsing history and the data whereas Brave is a web browser that focuses on privacy
entered in the personal account./ and security.
(d) It saves only the browsing history in the 1030. ____ focuses on the local Chinese market.
personal account but not the data entered. While ____is global and continues to expand.
GSSSB Supervisor Electronic Instructor 18.01.2014
Ans. (a) : Google Chrome's Incognito mode is a private (a) Baidu, Google (b) Google, Yahoo!
browsing feature that allows users to browse the web (c) Yahoo!, Baidu (d) Google, Baidu
without their browsing history, cookies, or site data KPSC Jr. Instructor 22.11.2018w
being saved. It also doesn't store the data entered in the
personal account. Ans. (a) : Baidu is a Chinese search engine website that
1025. Which of the following is NOT a well-known provides a web search service similar to Google. It was
web browser? started by Robin Li in January 2000. It is the largest
(a) Microsoft Edge (b) Jungle Safari search engine in China, while Google continues to
(c) Google Chrome (d) Mozilla Firefox expand all over the world.
KPSC Jr. Instructor- 09.07.2014 1031. Which of the following are large systems
Ans. (b): Microsoft Edge, Google Chrome and Mozilla specially designed to solve complex scientific
Firefox are web browsers while Jungle Safari is not web and industrial problems?
browsers. (a) Mini computers (b) Micro computers
1026. A new Incognito window in Google Chrome (c) Mainframes (d) Super computers
can be opened with the ––––––– command. RRB Gorakhpur L.P.-2008
(a) Ctrl + T (b) Alt + T Ans. (d) : A super computer is a computer with a high
(c) Ctrl + N (d) Ctrl + Shift + N level of performance as compared to a general - purpose
UP PCL Technical Grade-II-11.11.2016 computer. The performance of a super computer is
Ans. (d) : The shortcut key to open in Linux is commonly measured in floating point operations per
incognito Ctrl + Shift + N. It is windows and uses the second instead of million instruction per second.
new incognito window of Google Chrome. It is used for
browsing. Your browser history, cookies and data forms 1032. ____is a tool or program helps in searching
sides or forms are not saved on your device this means that specific information/files on the Internet?
your activity is stored in your chrome browser history. (a) Mosaic (b) QBASIC
1027. Which of the following is not a component of a (c) Webzine (d) Archie
search engine? (UPPCL TG2 11-11-2016)
(a) Web crawler (b) Database Ans : (d) The program Archie is helpful in finding
(c) Web server (d) Serve interface specific information, files in the internet. This is a search
RRB Kolkata LP-2009 engine, which was developed in 10 September 1990.
Computer 106 YCT
ye
p
1033. SEO stands for Ans. (d) : Website publishing is the process of
(a) Search Engine Optimization publishing original content on the internet. Web
(b) Search Engine Operation development software, Internet connection and web
(c) Simple Engine Operation server are required for website publishing.
(d) Spider Engine Operation 1038. Which of the following is not a search engine?
UPPCL TG-II 27-03-2021 (Shift-I) (a) Opera (b) DuckDuckGo
Ans. (a) : SEO stands for search engine optimization. It (c) Chrome (d) Bing
is a process of increasing the number of visitors of the Punjab Wireman instructor-07.07.2013
website by applying some SEO tools to increase site
higher in the search engine result. Ans. (a/c) : Opera and Chrome are web browsers.
These are the best browsers to read websites for mobile
1034. To clear browsing data in Google Chrome,
while DuckDuckGo and Bing are search engines.
which of the following steps are followed?
Note- The answer of this question is option (a) provided
(a) Menu → Cast → More Tools → Clear
Browsing History by the commission.
(b) Menu → Print → More Tools → Clear 1039. The name of the first web browser of the world
Browsing History was––––– and it was developed by-–––––.
(c) Menu → More Tools → Clear Browsing (a) Gopher, Bill Gates
History (b) World Wide Web, Tim Berners-Lee
(d) Menu → Find → More Tools → Clear (c) Gopher, Tim Berners-Lee
Browsing History (d) World Wide Web, Bill Gates
UPPCL Technical Grade-II-26.06.2016 UPPCL TG-II 25-01-2019 (Morning)
Ans. (c) : Open Chrome on your computer. After Ans : (b) 'World Wide Web' was the first web
opening Chrome click on more tools in the right then browser that was invented by Tim Berners-Lee in 1990,
click on clear browsing history. When you click on Later it was renamed 'Nexus'.
clear browsing history then you will select time frame 1040. Which shortcut key is used to invoke the File
such that a last hour all time. After the selecting time menu in the Internet Explorer 11?
frame, select the type of information. You want to (a) Alt + F4 (b) Shift + F
remove and then click on clear data. (c) Alt + F (d) Ctrl + F
1035. Which of the following statements about the UPPCL-JE 31-01-2019 (Batch -01)
option 'clear recent history' in web browser is Ans: (c) Alt+F Shortcut key is used to open file menu
false?
(a) It allows you to start browsing with a clean in Internet Explorer 11.
state. 1041. What is the shortcut to add a website to
(b) It allows you to clear the history record. 'Favorites'?
(c) Clear recent history the action can be undone (a) Ctrl + F (b) Ctrl + D
(d) All your website visits will be erased from (c) Ctrl + E (d) Ctrl + B
your browser's memory UPPCL Technical Grade-II-09.08.2015
HSSC Electrician Instructor -17.12.2019 Ans. (b) : If we want to add any website to our
Ans. (c) : On doing 'clear recent history' in the web interested page during reading, we do bookmark them,
browser, It deletes all the records you have searched for this Ctrl+D shortcut key is used.
from your browsers' memory. It allows you to browse Ctrl + F → To open Find dialog box.
from a new page. Ctrl + E → To focus and select the browser's search
1036. Which of the following is a process used by web bar.
developers to turn website code into interactive Ctrl + B → To bold the selected text.
pages that users see when they visit a website?
(a) Rendering (b) Hosting 1042. Which of the following can be considered as the
(c) Crawling (d) Deploying gateway to the Internet?
UPPCL Technical Grade-II-02.08.2015 (a)WWW (b) Web page
(c) Browser (d) Website
Ans. (a) : Rendering is a process used in web
development that turns website code into the interactive UPPCL TG-II 20-03-2021 (Shift-I)
pages users see when they visit a website. The term Ans. (c) : Browser is considered as the gateway to enter
generally refers to the use of HTML, CSS and the world of internet. A web link is needed to access
JavaScript codes. The process is completed by a any data or page, document through the Internet, a web
rendering engine, the software used by a web browser to link is an address where all web pages or documents are
render a web page. placed and to search this web link. A web browser is
1037. Which among the following are prerequisites required in which we can access the resources
for website publishing? (document) by entering the web link.
A. Web development software Therefore, to find anything on the Internet, a web
B. Internet connection browser is first required, on which we search by typing
C. Web server the website or web link.
(a) Both A and B (b) Both C and A 1043. A web-based software system for obtaining
(c) Both B and C (d) All A, B, C relevant information from the world wide web
RRB Bengaluru LP-2004 for user queries is known as ____.
Computer 107 YCT
ye
p
(a) Search Engine (b) Plug -in 1049. In Google Chrome browser, which of the
(c) Addware (d) Web Browser following keyboard shortcuts is used to add the
DSSSB Craft Instructor (ESM) 06.10.2019 currently opened page to bookmarks?
Ans. (a) : A search engine is software accessed over the (a) Alt + D (b) Ctrl + D
Internet that searches a database of information (c) Alt + B (d) Ctrl + B
according to a user’s query. Examples of search engines UPPCL TG-II 27-03-2021 (Shift-II)
are Google, Yahoo, Microsoft Bing, DuckDuckGo, etc. Ans. (b) : Ctrl + D shortcut key is used to save the
1044. Which of the following options displays the current webpage as a bookmark.
name of the web page in an Internet Explorer • Alt + D = shortcut selects URL in the address bar in
browser? the Internet browser.
(a) Address bar (b) Menu bar 1050. In Google Chrome browser, which of the
(c) Status bar (d) Title bar following functions is used to view the current
UPPCL JE 31-01-2019 (Batch-02) webpage in full-screen mode?
Ans: (d) The title bar is the horizontal bar at the top of (a) F11 (b) F2
the Internet Explorer browser that displays the name of (c) F5 (d) F10
the web page. UPPCL TG-II 27-03-2021 (Shift-II)
1045. What is the function of history feature in web Ans. (a) : We use the F11 function key in Google
browser? Chrome browser to view the current webpage in full-
(a) Protecting your computer from spyware screen mode.
(b) Installing cookies to make your online 1051. In Internet Explorer, which of the following
experience healthy icons located at the top right corner of the
(c) Keeping tabs on your internet browsing as window can be clicked to access the favorite's
long as you are online. folder?
(d) Allowing personalization of websites you visit (a) Home icon (b) Setting icon
MP Electrician Instructor 07.11.2016, Morning (c) Star icon (d) Smiley icon
Ans. (c) : On all browsers, “History” is one of the drop- GSSSB Electronic Instructor-21.01.2014
down menu options at the top of the page, and the Ans. (c) : In Internet Explorer, the Star icon appears as
History feature tracks your Internet browsing for as long the favorites folder. It is located in the upper - right
as you are online.
corner of the window. It appears under the name
1046. We press ________ to open a new tab in Google bookmark in other browsers.
Chrome.
1052. Internet Explorer was launched in:
(a) Ctrl + T (b) Ctrl + N
(c) Ctrl + J (d) Ctrl + O (a) 1998 (b) 1997
WBPSC Instructor-18.09.2021 (c) 1994 (d) 1995
UKSSSC Tech. Electrical Instructor-21.11.2017
Ans. (a) : We press Ctrl + T to open new tab in Google
Chrome. Ans. (d) : Windows Internet Explorer is a category of
graphical web browsers developed by Microsoft
1047. Which of the following sequence of steps is company, it was launched in 1995. But at present
correct to save a webpage in Google Chrome?
Microsoft Edge browser is the recommended browser
(a) Menu→Print → More Tools → Save Page As by Microsoft.
(b) Menu→Cast → More Tools → Save Page As
1053. Microsoft Edge, Opera and Apple Safari are
(c) Menu→find → More Tools → Save Page As example of ________.
(d) Click at the top right → More Tools → Save (a) web page (b) web browser
Page As (c) web server (d) search engine
HSSC wireman Instructor -17.12.2019, Shift-II GSSSB Supervisor Electronic Instructor 18.01.2014
Ans. (d) : Open Chrome on your computer, then go to Ans. (b) : The web browser is an application software
the page you want to save. Once you go to the page, in to explore WWW. It provides an interface between the
the top right, click More Tools, and then click Save server and the client.
Page Edge and choose where you want to save the page,
and then click Save. There are some examples of web browser - Google
Chrome, Apple Safari, Microsoft Edge, Opera, Mozilla
1048. Which of the following keyboard shortcuts is Firefox etc.
used to quickly access the bookmarking menu
in all major web browsers? 1054. Which of the following is a graphical web
(a) Alt + D (b) Shift + D browser developed by Apple?
(c) Esc + D (d) Ctrl + D (a) Safari (b) Firefox
KPSC Instructor Electronic-25.06.2014 (c) Chrome (d) Edge
UPPCL TG-II 25-01-2019 (Morning)
Ans. (d) : Ctrl + D → Bookmark creation. Ans : (a) Safari is a graphical web browser developed
Ctrl + N → To open new window. by Apple based on the Web Keet engine. It was first
Ctrl + T → Open New Tab. released with macOS X Panther in 2003 for desktop,
ESC → Stop page loading. and first released with iphone in 2007 with iOS for
F5 → Reload current page. mobile devices.
Computer 108 YCT
ye
p
1055. What is the similarity between “Google” and 1061. What is not true about web browser?
“DuckDuckGo”? (a) A program used to display an HTML
(a) They are search engine optimization document
methods (b) It enables users to access the resources of
(b) They are ISPs the Internet
(c) Both are web browsers (c) A program used to display a webpage
(d) Both are search engines (d) It is a MS office application
UPPCL TG-II (20-03-2021) (Shift-II) UPPCL TG-II (20-03-2021) (Shift-II)
Ans. (d) : Both Google and DuckDuckGo are search Ans. (d) : A web browser is a software application that
engines. is used to search and display the content of the world
1056. Google Hangouts is an example of which of the wide web, while MS Office is a word processor
following? application, in MS Office, MS Word, Access, Excel and
(a) Internet telephony services PowerPoint presentations are supported.
(b) Dial-up services 1062. Which of the following is the first step after
(c) Traditional telephone services opening a browser to view a website?
(d) Voice call services only (a) Refressing the browser window
UPPCL TG-II 20-03-2021 (Shift-I) (b) Opening internet browser settings
Ans. (a) : Google Hangouts is an Internet telephone (c) Typing the website address in the browser’s
service. With its help, the user can make calls, send address bar
messages, receive messages, make video and audio calls, (d) Clicking on “Back” button
and interact with other users by connecting through the GSSSB Electronic Instructor-22.01.2017
Internet. It is a messaging app developed by Google. Ans : (c) To search anything in any browser, first we
1057. Which of the following keyboard shortcuts can have to type website address into browswer’s address bar.
be used to display the download window in 1063. During a web search, which symbol will you
Google Chrome browser? use with your text to search for exact words or
(a) Alt + 9 (b) Ctrl + D phrases?
(c) Ctrl + J (d) Alt + D (a) Double quotes (b) Minus
UPPCL TG-II 28-3-2021 (Shift-I) (c) Plus (d) Star
Ans. (c) : Download window can be opened in Google UPPCL Technical Grade-II Shift-I, 28.03.2021
Chrome browser with the help of Ctrl + J shortcut key. Ans. (a) : When you want to search for an exact phrase,
In Google Chrome, the Ctrl + H shortcut key is used to you must enclose the entire phrase in quotation marks
open the history page in a new tab. (quotes). This tells Google to search for the exact
keywords in the specified order.
1058. Google search company was founded by
……… in ………… 1064. Which of the following operator is used to find
(a) US, Bill Gates the exact phrase in Google search engine?
(b) US, Larry Page and Sergey Brin (a) Period (b) Minus
(c) Australia, Bill Gates (c) Quotations (d) Tilde
(d) Austria, Larry Page and Sergey Brin RRB Kolkata LP-2009
UPPCL (TG-II) 24-01-2019 (Morning) Ans. (c) : Quotations operator can be used to find the
Ans : (b) Google is invented in 1998 unitedly by exact phrase in Google search engine.
1. Larry Page 1065. State whether the following statements are true
2. Sergey Brin or false.
(i) Google is a web search engine and it is run by
1059. Which of the following is/are cross-platform Microsoft.
browser (s)? (ii) Bing is a web search engine owned by Google
(i) Chrome and operated by Microsoft.
(ii) Edge (a) (i)–False, (ii) - False (b) (i)–False, (ii) – True
(iii) Safari (c) (i) – True, (ii) - True (d) (i) - True, (ii) - wrong
(a) Only (ii) (b) Only (i) UPPCL TG-II 25-01-2019 (Morning)
(c) Only (ii) and (iii) (d) Only (i) and (iii) Ans : (a) The Google search engine is an American
KPSC Instructor Electronics Mech.20.07.2018 multinational public company that creates and develops
Ans. (b) : Google Chrome is a cross-platform web many Internet-based services and products.
browser developed by Google that is available on While Bing is a web search engine owned and operated
Windows, Mac OS, iOS, Linux and Android. Opera and by Microsoft, so both the statements are incorrect.
Firefox are also very good cross platform browsers.
1066. Which of the following can be used to reload the
1060. Which of the following keyboard shortcuts can current page, ignoring cached content in Chrome?
be used to lock the Windows system? (a) F5 (b) Shift + F3
(a) Ctrl + L (b) Alt + Ctrl + L (c) Shift + F6 (d) Shift + F5
(c) Window key + L (d) Alt + L HSSC Electrician Instructor -17.12.2019
UPPCL TG-II 28-3-2021 (Shift-I)
Ans. (d) : Cached data is information of a website or
Ans. (c) : By using Window Key + L shortcut key app that is stored on your device to make the browsing
Windows System can be locked. process faster. Cached data saves loading time, it takes
Computer 109 YCT
ye
p
up space on your device. In Chrome browser, the Shift 1072. Mozilla Firefox, Opera and Apple Safari are
+ F5 keys or Ctrl + R keys are used in the keyboard to examples of …………
reload the current page ignoring this cached content. (a) Web browser (b) World Wide Web
1067. Which of the following keyboard shortcuts can (c) Web Server (d) Internet
be used to reload the current page in Google UPPCL TG-II 19-03-2021 (Shift-II)
chrome? Ans. (a) : A web browser is an application used to
(a) Alt + R (b) Alt + P navigate and access websites. The following are
(c) Ctrl + R (d) Ctrl + D examples of web browsers – Mozilla Firefox, Opera,
RRB Gorakhpur L.P.-2008 Google Chrome, Apple Safari, Microsoft Edge and
Internet Explorer etc.
Ans. (c) : Using the keyboard shortcut in Google
chrome - 1073. Client-side scripting generally refers to the
class of computer programs on the web that
Ctrl + R or Shift + F5 → To reload the current page. are executed client-side by
Ctrl + D → To bookmark a webpage. (a) web browser (b) web server
Ctrl + N → To open a new window. (c) website (d) URL
Ctrl + T → To open a new tab. UPPCL Technical Grade-II (Shift-I) 27.03.2021
1068. What is the use of F11 in Internet Explorer? Ans : (a) Client-side scripting usually refers to
(a) To refresh computer programs on the web executed on the client
(b) To take screen shot side by the web browsers.
(c) To change search engine 1074. _______may contain information about the
(d) Toggle full screen sites you visited, or may even contain
UPPCL Technical Grade-II Shift-II, 28.03.2021 credentials for accessing the site.
Ans. (d) : In Internet Explorer, Chrome etc. browsers, (a) Cookies (b) ActiveX
the function key ‘F11’ is used to enable or disable (c) Plugins (d) Javascript
fullscreen. Punjab Wireman instructor-07.07.2013
1069. Identify the icon on a web browser, which is Ans. (a) : Cookies can contain any information that is
used for favorites/Bookmark. designed to be placed on a website. Cookies may
contain information about sites you have visited, or
(a) (b) credentials to access a site.
1075. Decide whether the given statements are true
or false-
(c) (d) (i) Relative URLs do not require protocol
identified.
KPSC Jr. Instructor- 09.07.2014 (ii) Scheme://Server/Path/Resource is the
Ans. (d) : The bookmarks feature can usually be correct syntax for an absolute URL.
identified by a star-shaped icon on the right side of your (a) (i) True, (ii) True (b) (i) False, (ii) False
browser’s main search bar, which is used for (c) (i) False, (ii) True (d) (ii) True, (ii) False
Favorites/Bookmarks. KPSC Instructor Electronic-25.06.2014
1070. In the context of web browsing, the purpose of Ans. (a) : In the question, both statements (i) and (ii)
a 'bookmark' is that you –––––. are true.
(a) Save and organize specific websites so that 1076. Which of the following is also known as web
you can visit them frequently address?
(b) Small application can plug in, that allow (a) Uniform Resource Locator (URL)
facility you to view some certain type of (b) Web page
content in your web browser (c) Unique Resource Linking
(c) Save an image from a website to your (d) Web browser
computer UPPCL TG-II 20-03-2021 (Shift-I)
(d) Visit the websites you have recently visited Ans. (a) : Uniform Resource Locator (URL) also
HSSC wireman Instructor -17.12.2019, Shift-II known as web address is a unique address where web
Ans. (a) : In the context of the World Wide Web pages are located. To view or receive web pages, web
(WWW), a bookmark is a Uniform Resource Identifier pages are accessed by typing URL in the search bar of
(URI) that is stored in various storage formats for later the web browser.
retrieval. Bookmarks are a great way to save and 1077. The feature that fills up forms etc
organize websites so that you can visit them again. automatically with pre-set values is called-
1071. By whom was the Firefox web browser (a) AutoFill (b) Instant Fill
developed? (c) Filler (d) Fill Up
UPPCL Technical Grade-II (Shift- II) 27.03.2021
(a) Apple (b) Microsoft
Ans : (a) AutoFill is a function found primarily in web
(c) Mozilla Corporation (d) Google browsers such as Chrome, Opera and Firefox, the only
UPPCL (TG-II) 24-01-2019 (EVENING) one purpose of an AutoFill extension is that it
Ans : (c) Firefox is a web browser developed by automatically fills fields and load a page without any
Mozilla Corporation. user interaction.
Computer 110 YCT
ye
p
1078. Alta vista is a _____ which was purchased by (c) Gmail -> preferences -> General -> Spelling
_____ in 2003. or Grammar
(a) Web browser, Google (d) Gmail -> Design -> General -> Spelling or
(b) Web browser, Yahoo Grammar
(c) Search engine, Yahoo KPSC Instructor Electronics Mech.20.07.2018
(d) Search engine, Google Ans. (a) : Here are the steps to activate spelling and
GSSSB Electronic Instructor-22.01.2017 grammar in Gmail.
Ans. (c) : Alta Vista was a web search engine Gmail → Settings → General → Spelling or Grammar
established in 1995. It was the most used search engine 1084. Which of the following fields will briefly identify
initially. After the arrival of Google search engine, its what we are writing about in the e-mail?
use started decreasing and in 2003 it was purchased by (a) CC (b) Subject
Yahoo. (c) From (d) To
1079. Which of the following statement(s) is/are UPPCL Technical Grade-II (Shift-I) 19.03.2021
incorrect? Ans. (b) : Subject field will briefly identify what we are
(i) Altavista and Lycos are examples of early writing about in the e-mail.
search engines. 1085. Which of the following is an area of the
(ii) Web crawler is also known as web spider. mailbox in e-mail where messages that are in
(a) Neither (i) nor (ii) (b) Both (i) and (ii) the process of being sent or that have failed to
(c) Only (i) (d) Only (ii) be sent are stored?
UPPCL TG-II 25-01-2019 (Evening) (a) Spam (b) Inbox
Ans : (a) AltaVista is a web search engine from (c) Sent Mail (d) Outbox
Yahoo, produced by Digital Electronics Corporation UPPCL Technical Grade-II (Shift-II) 19.03.2021
(DEC). It was publicly launched as a search engine on Ans. (d) : Outbox is the area of the mailbox in e-mail
December 15, 1995. Lycos and AltaVista are both early where messages that are in the process of being sent or
search engines. A web crawler, also known as a web that have failed to be sent are normally stored.
spider, is a program that visits web pages and reads 1086. Which of the following statements is true with
their pages and information to create entries for the respect to e-mail address?
search engine index. (a) A domain name is not specific to an
1080. Find the odd one out from the given alternatives. organization
(a) Bing (b) Internet Explorer (b) Popular e-mail providers for business or
(c) Firefox (d) Chrome personal use include email, yahoo
UPPCL (TG-II) 24-01-2019 (Morning) (c) The # symbol is a connector between the
Ans : (a) All are web browsers except Bing, while domain and the person to whom the e-mail
Bing, Yahoo are search engines. address belongs
1081. The origin of the word BLOG is from ------------ (d) Domain names cannot be commercial or
---------. personal
(a) Web login (b) Web logging RRB Bengaluru LP-2004
(c) Web log (d) Basic log Ans. (b) : Popular e-mail providers for business or
UPPCL Technical Grade-II (Shift-I) 20.03.2021 personal use include G-mail, Yahoo. A domain name is
specific to an organization.
Ans : (c) The origin of the word BLOG is from web The @ symbol is a connector between the domain and
log. It is an online informational website in which any the person to whom the e-mail address belongs. Domain
information is presented in reverse chronological order. names can be commercial or personal.
1082. Which of the following is the correct option in 1087. Which of the following is not a method by
Gmail to turn on the spell checking feature any which we can access and use mail boxes?
time you compose an e-mail message? (a) Pager (b) Email clients
(a) Settings>See all settings > General > Spelling (c) Mobile phone (d) Webmail
(b) Settings > See all settings > Labels > Spelling DSSSB Craft Instructor (ESM) 06.10.2019
(c) Settings > See all settings>Labels>Language Ans. (a) : We can access and use mail boxes through e-
(d) Settings>See all settings>General>Language mail client, mobile phones, web mail etc, but pagers are
UPPCL Technical Grade-II (Shift-II) 20.03.2021 not used to send emails. Pager is an online messaging
Ans. (a) : In Gmail, the following procedure needs to be tool for sending text messages to someone.
followed to turn on the spell check feature while 1088. Which of the following operators can be used
composing an email. when we want to search a specific word and any
Setting → See all setting → General→ Spelling. synonym for that word in Google search engine?
1083. Which of the following is the sequence of steps (a) Minus (b) Period
to activate spelling and grammar in Gmail? (c) Tilde (d) Quotations
MP Electrician Instructor 07.11.2016, Morning
(a) Gmail -> Settings -> General -> Spelling or
Grammar Ans. (c) : When we want to search a specific word and
(b) Gmail -> Options -> General -> Spelling or any synonym for that word in Google search engine
Grammar then we use tilde operator.
H L
HDD : Hard Disk Drive
HD-DVD : High Definition-DVD LSI : Large Scale Integration
HDA : Head Disk Assembly LASER : Light Amplification by Stimulated
HDLC : High Level Data Link Control Emission of Radiation
HHD : Hybrid Hard Drive LED : Liquid/Light Emitting Diode
HTML : Hypertext Markup Language LPM : Lines Per Minute
HTTP : Hypertext Transfer Protocol LSB : Least Significant Bit
HSTP : High Speed Transport Protocol LSI : Large Scale Integration
HID : Human Interface Device LA : Laboratory Automation
LAN : Local Area Network
I LBP
LPT
: Laser Beam Printer
: Line Print Terminal
IBM : International Business Machine LBA : Logical Block Addressing
IT : Information Technology LCD : Liquid Crystal Display
IGMP : Internet Group Management Protocol LIFO : Last In First Out
IIS : Internet Information Services LU : Logical Unit
Computer 249 YCT
ye
p
PROM : Programmable Read Only Memory
M PCI
PDA
:
:
Peripheral Component Interconnect
Personal Digital Assistant
PDF : Portable Document Format
MS-DOS : Microsoft-Disk Operating System
PPI : Pixels Per Inch
MTNL : Mahanagar Telephone Nigam Limited
PPP : Point-to Point Protocol
MANET : Mobile Ad-Hoc Network
PPTP : Point-To-Point Tunneling Protocol
MDI : Multiple Document Interface
P2P : Peer-To-Peer
MOS : Metal Oxide Semiconductor
PAN : Personal Area Network
MSB : Most Significant Bit
PAP : Password Authentication Protocol
MU : Memory Unit
PC : Personal computer
MAC : Media Access Control
PIC : Peripheral Interface Controller
MAN : Metropolitan Area Network
PIN : Personal Identification Number
MAOS : Multi Application Operating System
PNG : Portable Network Graphics
MB : Megabit/Megabyte
PCT : Private Communication Technology
MBR : Master Boot Record
PDC : Primary Domain controller
MIDP : Mobile Information Device Profile
POP : Point Of Presence
MICR : Magnetic Ink Character Recognition
PSTN : Public Switched Telephone Network
MIDI : Music Instrument Digital Interface
PSN : Packet Switching Network
MIMO : Multiple-Input Multiple-Output
PSP : Passport Seva Project
MIPS : Million Instructions per Second
MMX : Multi-Media Extensions
MNG
MPEG
:
:
Multiple-Image Network Graphics
Motion Pictures (Coding) Experts Group
Q
MMU : Memory Management Unit QAM : Quadrature Amplitude Modulation
MMX : Multimedia Extension QFA : Quick File Access
MPM : Multi-Programming Monitor QDR : Quad Data Rate
MPU : Micro Processor Unit QOS : Quality of Service
MODEM : Modulator-Demodulator QSAM : Query Service on Aadhaar Mapper
MUI : Multimedia User Interface QR Code : Quick Response Code
MVS : Multiple Virtual Storage
MIME
MIS
:
:
Multipurpose Internet Mail Extensions
Management Information System R
RPG : Report Program Generator
N RAID : Redundant Array of Independent Disks
RDBMS : Relational Database Management System
NAL : National Aerospace Laboratories RDRAM : Rambus Dynamic RAM
NPCI : National Payment Corporation of India RTOS : Real Time Operating System
NIC : Network Interface Card RAM : Random Access Memory
NOS : Network Operating System RARP : Reverse Address Resolution Protocol
NT : New Technology (Windows) RWM : Read Write Memory
NCS : Network Computing System ROM : Read Only Memory
NET PC : Network Personal Computer REFAL : Recursive Functions Algorithmic Language
NFS : Network File System REG : Register
NNTP : Network News Transfer Protocol RTL : Register Transfer Language
NPI : Network Provider Interface RPA : Robotics Process Automation
O
OS : Operating System
S
OOP : Object Oriented Programming S RAM : Static RAM
OOS : Open Source Software SCSI Port : Small Computer System Interface Port
OAM : Operation And Maintenance/Operation SEO : Search Engine Optimization
Administration Maintenance. SET : Secure Electronic Transactions
OCR : Optical Character Reader SAN : Storage Area Network
OMR : Optical Mark Reader/ Recognition SATA : Serial Advanced Technology Attachment
OLAP : On-Line Analytical Processing SBP-2 : Serial Bus Protocol-2
OSPF : Open Shortest Path First SDK : Software Development Kit
SLIP : Serial Line Internet Protocol
P SMTP
SMBIOS :
: Simple Mail Transfer Protocol
System Management BIOS
SNTP : Simple Network Time Protocol
PDL : Program Design Language SQL : Structured Query Language
PL 1 : Programming Language 1 SDRAM : Synchronous Dynamic Random Access
POS : Point of Sale Memory
Computer 250 YCT
ye
p
WSDL : Web Services Description Language
T WGS
WAIS
: Work Group System
: Wide Area Information Servers
TFT : Thin-Film Transistor
TFTP : Trivial File Transfer Protocol X
TLD : Top Level Domain
TTL : Transistor-Transistor Logic XHTML : eXtensible HyperText Markup Language
TB : Terabyte XML : eXtensible Markup Language
TCP/IP : Transmission Control Protocol/Internet XUL : Xml User Interface Language
Protocol XSL-FO : eXtensible Stylesheet Language Formatting
TTF : True Type Font Objects
TTS : Text-To-Speech XSLT : eXtensible Stylesheet Language
TDMA : Time Division Multiple Access Transformations.
TTY : Teletype XAML : eXtensible Application Markup Language
XMMS : X Multimedia System
U XNS
XSL
:
:
Xerox Network Systems
eXtensible Stylesheet Language
ULSI
UNIVAC
:
:
Ultra Large Scale Integration
Universal Automatic Computer Y
UPS : Uninterruptible Power Supply
URI : Uniform Resource Identifier YTD : It is Used For Year To Date.
UI : User Interface Y2K : Year Two thousand.
URL : Uniform Resource Locater
USB
UTR
:
:
Universal Serial Bus
Unique Transaction Reference
Z
UTS : Unreserved Ticketing System ZIP : Zone Information Protocol
UTP : Unshielded Twisted Pair ZSL : Zero Slot LAN
UPI : Unified Payment Interface ZISC : Zero Instruction Set Computer
USSD : Unstructured Supplementary Service Data ZIFS : Zero Insertion Force Socket
ZMA : Zone Multicast Address
V XIV. Miscellaneous
VDU : Visual Display Unit 2618. Which of the following characteristics refers to
VLSI : Very Large Scale Integration the use of technology to complete a task with as
VSNL : Videsh Sanchar Nigam Limited little human interaction as possible?
Var : Variable (a) Remembrance power
VoIP : Voice Over IP (b) No EQ
VB : Visual Basic (c) No IQ
VBS : Visual Basic script. (d) Automation
VLAN : Virtual Local Area Network UPPCL Technical Grade-II (Shift-II) 20.03.2021
VGA : Video Graphics Array/Adopter Ans. (d) : In general usage, automation can be defined
VM : Virtual Memory as a technology concerned with performing a process by
VMS : Virtual Memory System means of programmed commands combined with
VPN : Virtual Private Network automatic feedback control to ensure proper execution
VSAM : Virtual Storage Access Method of the instructions.
VT : Video Terminal 2619. Which of the following operations refers to the
process of converting information,
W corresponding text, numbers photos or music
into digital data that can be manipulated by
WiMAX : Worldwide Interoperability for Microwave electronic devices?
Access (a) Normalization (b) Unification
WLL : Wireless Local Loop (c) Regularization (d) Digitization
UPPCL Technical Grade-II (Shift-II) 20.03.2021
WORM : Write Once Read Many
WAIS : Wide Area Information Servers Ans. (d) : Digitization refers to the process of
Wi-Fi : Wireless Fidelity converting analog information such as text numbers,
WWAN : Wireless Wide Area Network photos or music into digital data that can be
WAN : Wide Area Network manipulated by electronic devices.
WAP : Wireless Application Protocol 2620. Which of the following refers to
WINFS : Windows Future Storage communication by electronic means to place
WMP : Windows Media Player power in the hands of citizens to determine
WWW : World Wide Web what laws need to be made and how these laws
WOL : Wake-On-LAN should be written?
Computer 251 YCT
ye
p
(a) e-banking (b) e-marketing iii) A microcontroller uses an internal
(c) e-governance (d) e-mobility controlling bus.
UPPCL Technical Grade-II (Shift-II) 20.03.2021 (a) i-False, ii-True, iii-False
Ans. (c) : Electronic governance refers to the (b) i-False, ii-True, iii-True
functioning of government with the application of (c) i-True, ii-False, iii-True
Information and Communication Technology (ICT). (d) i-True, ii-True, iii-True
There are 4 types of participation in e-governance. UPPCL Technical Grade-II (Shift-II) 20.03.2021
(1) G2C (Government to citizen) Ans. (d) : All statements are true because a
(2) G2B (Government to Business) microprocessor is defined as a programmable,
(3) G2G (Government to Government) multipurpose, logic device that has the reading capability
(4) G2E (Government to Employee) of binary instructions from memory and I/O component
2621. Which of the following statements in regard to externally in a microprocessor for processing. In this
photo editing is correct? system, a microcontroller also known as a programmable
(a) Increase in saturation makes the image of digital processor, uses an internal controlling bus.
grey shades. 2624. Match the points under the column 'Incident
(b) Increase in saturation also increases hue of an Response' with those under the column
image 'Description', based on the time to respond
(c) Increase in saturation also increases intensity from immediate to deliberate.
of an image Incident Response Description
(d) Decrease in saturation makes the image of a) Incident analysis i) Evict attackers;
grey shades eradicate threats and
UPPCL Technical Grade-II (Shift-II) 20.03.2021 advance your defences
Ans. (d) : Saturation in photo editing refers to the from your learning.
intensity or vividness of a colors in an image. Increasing b) Auto containment ii) Get the swift
saturations makes colors appear more vibrant and analysis on threats,
intense, while decrease in saturation make the image of impact on assets and
grey shades. It is a fundamental tool in image editing blast radius.
software and can be used to make your photos more c) Response iii) Contain and
visually appealing. orchestration recover swiflty with
2622. Match points under the column 'Three V's of an agile response from
Big Data' with those under the column machine learning.
'Description'. (a) a-iii, b-ii, c-i (b) a-ii, b-i, c-iii
Three V's of Big Description (c) a-ii, b-iii, c-i (d) a-i, b-iii, c-ii
Data UPPCL Technical Grade-II (Shift-II) 20.03.2021
a) Volume i) This refers to the Ans. (c) : Incident response is incident analysis that gets
many types of data that the swift analysis on threats, impact on assets and blast
are available radius. Containing and recovering is done swiftly with an
b) Velocity ii) This refers to the data agile response from machine learning by auto
of unknown value, such containment. And response orchestration evict attackers;
as Twitter data feeds, eradicate threats and advance defences from learning.
click streams on a web 2625. Which of the following software are HTML
page or a mobile app or web editors?
sensor-enabled Software: i) Atom ii) Sublime Text
equipment. iii) Visual Studio Code iv) Notepad ++
c) Variety iii) This refers to the fast v) JDK vi) Safari
rate at which data is (a) Only, i, ii, iii and iv
received and (perhaps) (b) Only, iv
acted on. (c) All of i, ii, iii, iv, v and vi
(a) a-i, b-iii, c-ii (b) a-iii, b-ii, c-i (d) Only i, ii and iii
(c) a-ii, b-iii, c-i (d) a-ii, b-i, c-iii UPPCL Technical Grade-II (Shift-I) 19.03.2021
UPPCL Technical Grade-II (Shift-II) 20.03.2021 Ans. (a) : Atom was a desktop application that was a
Ans. (c) : The 3V's (Volume, Velocity and Variety) are "hackable" text editor. It means it was customizable
three defining properties or dimensions of big data, using HTML, CSS and JavaScript. Sublime Text is used
where volume refers to the amount of data, velocity to display stylized content in editor panes because it
refers to the speed of data processing and variety refers contains a custom HTML and CSS engine, named
to the number of types of data. minihtml. Visual Studio Code provides basic support
2623. Identify whether the following statements are for HTML programming out of the box. Notepad++ text
true or false. editor allows programmer to create or edit HTML files.
i) A microcontroller is a programmable JDK is a core package, cross-platform software that
digital processor. offers a collection of tools and libraries for developing
ii) A microprocessor is defined as a java based software and applets. In safari, the user can
multipurpose, programmable logic device not edit web page source code. Hence we can say that
that has the capability to read binary Atom, Sublime Text, Visual Studio Code, and
instructions from memory; that accepts Notepad++ are software of HTML web editors while
binary data as input and then, processes JDK and Safari are not. But UPPCL has answered all
that data. the above editors are HTML web editors.
Computer 252 YCT
ye
p
2626. In Python, which function can be used to get 2630. Match the point under the column 'IoT
the data type of any object? Protocol Layer' with those under the column
(a) datatype() (b) type() 'Description'.
(c) typeof( (d) gettype() IoT Protocol Description
UPPCL Technical Grade-II (Shift-I) 19.03.2021 Layer
Ans. (b): The type() function can be used to find out a) Sensing layer i) In this layer, data are
what type of data an object contains. Typing an object controlled and made
passed as an argument to python type() function returns available to end-user
the data type of the object passed as an argument to applications such as
python type() function. agriculture, healthcare,
2627. Which of the following are the two valid types aerospace and farming.
of Instruction Set Architectures? b) Network ii) Sensors, actuators and
(a) CISK and RISK (b) CISC and RISK layer devices are present in this
(c) CISC and RISK (d) CISS and RISS layer.
UPPCL Technical Grade-II (Shift-I) 19.03.2021 c) Data iii) Network gateways
Ans. (b) : CISC and RISK Types of Instruction Set processing layer and data acquisition
Architectures. CISC stands for Complex Instruction Set system (DAS) are present
Architecture. CISC architectures have a large and in this layer.
complex set of instructions. Instructions can perform d) Application iv) In this layer, the data
various tasks and may take different amounts of time to layer is analysed and pre-
execute. RISC stands for reduced Instruction Set processed before sending
Architecture. RISC architectures have a smaller and it to a data centre.
simplex set of instructions. Instructions are designed to (a) a-ii, b-iii, c-iv, d-i (b) a-iv, b-iii, c-iv, d-ii
execute in a single clock cycle, which leads to faster (c) a-ii, b-iv, c-iii, d-i (d) a-iii, b-ii, c-iv, d-i
and more predictable performance. UPPCL Technical Grade-II (Shift-II) 19.03.2021
2628. Identify whether the following statements are Ans. (a) : Sensing layer includes the sensors, actuators
and other smart devices that constitute physical layer. In
true or false. network layer, the network gateways and data
i) The os module and the os.path sub-module acquisition system are present that are aggregated from
contain functions for working with files and multiple sources. And in data processing layer, data are
directories. analysed and preprocessed before sending it to a data
ii) The os.walk function allows you to scan centre. In application layer, data centers or the cloud are
through a directory and all of its sub- data management stages where the end-user
directories. applications such as healthcare, agriculture, farming,
iii) The sys module has a function called 'exit', aerospace etc. are controlled, available and managed.
which can be used to quit your programme. Hence option (a) is right matching.
(a) i-False, ii- True, iii-True 2631. Which of the following is NOT a basic photo
(b) i-False, ii- True, iii-False editing tool?
(c) i-True, ii - True, iii-True (a) Paint Tools (b) Transform Tools
(d) i-True, ii-False, iii- True (c) Selection Tools (d) Real Tools
UPPCL Technical Grade-II (Shift-I) 19.03.2021 UP PCL Technical Grade-II-11.11.2016
Ans. (c) : Given all statements (i), (ii) and (iii) are true Ans. (d) : Basic photo editing tools like paint tools.
with respect to os.path, os.walk and sys module. The os Transform tools and Selection tools while Real tools is
and os.path modules include many functions to interact nothing in editing tools.
with the file system and directories. The os.walk 2632. What refers to creations of the mind, such as
function generates the file names and allows to scan by inventions, literary and artistic works, designs and
walking the tree through a directory and sub-directories symbols, names and images used in commerce?
either top-down or bottom-up. The 'exit' function of sys (a) Intellectual Property (b) Indian Property
module is used to quit (out of) program. (c) Individual Property (d) Business Property
2629. Identify whether the following statements are UP PCL Technical Grade-II-11.11.2016
true or false. Ans. (a) : Intellectual property refers to creations of the
i) There are different types of virtual reality mind, such as inventions, literary and artistic works, designs
systems, but they all share common and symbols, names and images used in commerce.
characteristics, for example, ability to allow a IP can be protected by law, which give the creator or
person to view three-dimensional images. where of the intellectual property exclusive rights to use
ii) 'CAVE' stands for Cave Automatic Virtual or license it.
Environment. 2633. What are used to clean up or retouch photos,
(a) i-True, ii-True (b) i-False, ii-True apply special arts effects that give an image the
(c) i-True, ii-False (d) i-False, ii-False appearance of a sketch or impressionistic
UPPCL Technical Grade-II (Shift-I) 19.03.2021 painting or create unique transformations
Ans. (a) : Both statements are true because there are using distortions and lighting effects?
different types of virtual reality systems :– non- (a) Shapes (b) Adjustments
immersive, fully immersive, semi-immersive, (c) Filters (d) Layers
augmented reality, collaborative VR etc. but they all UP PCL Technical Grade-II-11.11.2016
share common characteristics, for example, ability to Ans. (c) : Filters are used to enhance or alter the appearance
allow a person to view three-dimensional images. of a photo. They can be used to change the color, contrast,
CAVE stands for Cave Automatic Virtual Environment. brightness, sharpness and other aspects of a photo.