Computer GK Quiz-12

Computer GK Quiz-12

Computer Multiple Choice Questions (MCQs) Quiz for State and UPSC Civil Services Examinations. Objective Questions on Computer for competitive examinations.

    221.After ‘PROM’ is programmed, we can only ____ the information.

    (1) read 
    (2) write
    (3) read and write 
    (4) remove
    221. (1) PROM (Programmable Read-Only Memory) is a memory chip on which data can be written only once. Once it is programmed, data is permanent and it cannot be erased. The information is stored permanently in the memory cell. We can only read that data but cannot write data on it.

    222. ROM stands for

    (1) Real Office Manager
    (2) Read Only Memory
    (3) Read Only Memorandum
    (4) Role On Memory
    222. (2) ROM stands for Read-Only Memory. It is a type of computer memory on which data has been prerecorded. Once data has been written onto a ROM chip, it cannot be removed and can only be read. Unlike main memory (RAM), ROM retains its contents even when the computer is turned off. ROM is referred to as nonvolatile, whereas RAM is volatile.

    223. The term ‘URL’ used in Internet technology stands for :

    (1) Uniform Resource Locater
    (2) Unique Resource Locater
    (3) Uniform Remote Locater
    (4) Unique Remote Locater
    223. (1) URL is an acronym for Uniform Resource Locator. Commonly referred to as a web address, URL is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it.

    224. Which of the following memories must be refreshed many times per second?

    (1) ROM
    (2) Dyanamic RAM
    (3) EPROM
    (4) Static RAM
    224. (2) Dynamic Random Access Memory (DRAM), the most common kind of Random Access Memory (RAM) for Personal computers and workstations, has to be refreshed many times per second in order to hold its data contents. DRAM is dynamic in that, unlike static RAM (SRAM), it needs to have its storage cells refreshed or given a new electronic charge every few milliseconds. DRAM stores each bit in a storage cell consisting of a capacitor and a transistor. Capacitors tend to lose their charge rather quickly thus, the need for recharging.

    225. Which one of the following is odd?

    (1) IMAP 
    (2) POP
    (3) SNMP 
    (4) SMTP
    225. (3) IMAP (Internet Message Access Protocol) and POP (Post Office Protocol) are the two most prevailing methods or protocols for retrieving email from a mail server. Both of these protocols are supported by almost all popular mail client programs like Outlook, Thunderbird and Apple Mail. Similarly, Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (email) transmission. However, Simple Network Management Protocol (SNMP) is an “Internet-standard protocol for managing devices on IP networks”. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks and more. SNMP is widely used in network management systems to monitor networkattached devices for conditions that warrant administrative attention.

    226. USB is _____ type of storage device.

    (1) Auxillary 
    (2) Primary
    (3) Secondary 
    (4) Tertiary
    226. (3) The question has more than one option correct: secondary storage is also known as auxiliary storage or external storage. USB (memory stick) Flash Drive is a secondary data storage device that includes flash memory with an integrated USB interface. USB flash drives are typically removable and rewritable, and physically much smaller than an optical disc. They are often used for the same purposes, for which floppy disks or CDs were used, i.e., for storage, data back-up and transfer of computer files.

    227. The fastest, costlier and relatively small form of storage managed by computer system hardware is :

    (1) Disk
    (2) Flash Memory
    (3) Main memory
    (4) Cache
    227. (4) Cache memory, also called CPU memory, is random access memory (RAM) that a computer microprocessor can access more quickly than it can access regular RAM. Cache is the fastest and most costly form of storage. For example, Level 1 (L1) cache is extremely fast but relatively small, and is usually embedded in the processor chip (CPU). Cache memory is volatile and managed by the computer system hardware.

    228. All forms of ROM are also known as _____.

    (1) Freeware 
    (2) Middleware
    (3) Firmware 
    (4) Shareware
    228. (3) As the name suggests, read-only memory, or ROM, stores information that can only be read. It contains the basic instructions for what needs to happen when a computer is powered on. This is typically referred to as the firmware of a computer. The firmware represents the basic code to get the computer started. Once the computer is up and running, the CPU takes over. Firmware is also referred to as BIOS, or basic input/output system.

    229. The Simplest CPU – scheduling algorithm is ______.

    (1) SJF scheduling algorithm
    (2) Round robin scheduling algorith
    (3) Multilevel scheduling algorithm
    (4) FCFS scheduling algorithm
    229. (4) First-Come, First-Served (FCFS) Scheduling is the simplest CPU scheduling algorithm. It is like customers waiting in line at the bank or the post office or at a copying machine. Under it, the process that requests the CPU first is allocated the CPU first. However, the average waiting time under FCFS is long.

    230. Which type of switching is used in Internet?

    (1) Circuit 
    (2) Telephone
    (3) Packet 
    (4) Telex
    230. (3) Packet switching is the dividing of messages into packets before they are sent, transmitting each packet individually, and then reassembling them into the original message once all of them have arrived at the intended destination. Packets are the fundamental unit of information transport in internet that uses the datagram packet switching method. Most modern Wide Area Network protocols, including TCP/IP, are based on packet-switching technologies.

    231. Breaking physical memory into fixed-sized blocks called as:

    (1) Packets 
    (2) Page
    (3) Frames 
    (4) Segments
    231. (3) The basic method for implementing paging involves breaking physical memory into fixed-sized blocks called frames and breaking logical memory into blocks of the same size called pages. When a process is to be executed, its pages are loaded into any available memory frames from the backing store. The backing store is divided into fixed-sized blocks that are of the same size as the memory frames.

    232. Network of a series of vertical and horizontal lines constructed perpendicular to each other is known as:

    (1) Grid system
    (2) Latitudes
    (3) Geographic coordinates
    (4) Longitude
    232. (1) A grid is a network or a series or vertical and horizontal lines constructed perpendicular to each
    other. One series or lines runs from east to west and the other from north to south. Together they form
    squares of same dimensions within a given map. Each of the line forming the squares is given a value so that the position of an object on a map can be easily identified.

    233. In operationg system, Round Robin Scheduling means :

    (1) A kind of scheduling
    (2) Repetition policy
    (3) A memory allocation policy
    (4) A process allocation policy
    233. (1) Round robin is the scheduling algorithm used by the CPU during execution of the process . Round robin is designed specifically for time sharing systems . It is similar to first come first serve scheduling algorithm but the preemption is the added functionality to switch between the processes.

    234. FORTRAN is called :

    (1) Formula Translator
    (2) Format Translator
    (3) File Translator
    (4) Floppy Translator
    234. (1) Fortran is a general-purpose, imperative programming language that is especially suited to numeric computation and scientific computing. Its name is a contraction of FORmula TRANslation. It aims to provide a way to tell computers to calculate complicated mathematical expressions, with more ease than assembly language.

    235. The process of arranging data in logical sequence is called

    (1) Classifying
    (2) Reproducing
    (3) Summarizing
    (4) Sorting
    235. (4) In the field of computing, the process of arranging data in a logical sequence is called sorting. It is a procedure that accepts a random sequence of numbers or any other data which can be arranged in a definite logical sequence as input. It arranges data items in a logical sequence-alphabetical, numerical,
    etc-by record key.

    236. The term GIGO is related to

    (1) Flexibility 
    (2) Versatility
    (3) Automatic 
    (4) Accuracy
    236. (4) Garbage in, garbage out (GIGO), in the context of information technology, is a slang expression that means regardless of how accurate a program’s logic is, the results will be incorrect if the input is invalid. A program gives inaccurate results due to inaccurate data provided because a computer will always attempt to process data given to it. So GIGO is related to accuracy of output which, in turn’ is dependent on the accuracy of inputs.

    237. Which of the following computer memories is non-volatile ?

    (1) DRAM 
    (2) SRAM
    (3) ROM 
    (4) RAM
    237. (3) Read-only memory (ROM) is a form of data storage in computers and other electronic devices that is non-volatile. Its contents are retained even when the device is powered off. Other examples of nonvolatile memory include flash memory, ferroelectric RAM (F-RAM), hard disk drives, floppy disks, etc.

    238. In present day computing, which code is used and is accepted worldwide?

    (1) ASCII 
    (2) Hollerith Code
    (3) EBCDIC 
    (4) ISCII
    238. (1) American Standard Code for Information Interchange (ASCII) is the predominant character set encoding of present-day computers. ASCII codes represent text in computers, telecommunications equipment, and other devices. Most modern characterencoding schemes are based on ASCII, although they support many additional characters.

    239. Which of the following is not an operating system ?

    (1) Android 
    (2) Vista
    (3) iOS 
    (4) Opera
    239. (4) Opera is a web browser for Windows, macOS, and Linux operating systems. It is developed by Opera Software. As of November 2016, the browser was owned by a Chinese group of investors under the name Golden Brick Capital Private Equity Fund I Limited Partnership.

    240. Which of the following is used to protect objects in computer system, in the absence of more complete protection schemes?

    (1) digital certificate
    (2) digital signature
    (3) passwords
    (4) tokens
    240. (3) Passwords are often used to protect objects in the computer system, in the absence of more complete protection schemes. They can be considered a special case of either keys or capabilities. Passwords are the most common approach to authenticating a user identity.

    Post a Comment