COMPUTER APPLICATION- PAGE 2
COMPUTER APPLICATION MCQs- PAGE 2
1. Which of the following correctly indicates the essential infrastructures for carrying the B2B e-commerce ? (i) World Wide Web (ii) Corporate network (iii) EDI standard (iv) Secure Payment Service (v) Secure electronic communication
(a) (i), (ii), (iii) (b) (ii), (iii), (iv)
(c) (ii), (iii), (iv), (v) (d) All of the above
Ans: C
2. Which out of following uses secure electronic transaction protocol ?
(a) Credit card payment (b) Cheque payment (c) Electronic cash payment (d) Payment of small amount for internet services
Ans: A
3. Which out of the following is most suitable for firewall implementation ?
(a) Router which connects intranet to internet (b) Bridge used in internet (c) Expensive modem (d) User application program
Ans: A
4. Which of the following statement is most appropriate for B2C commerce ?
(a) It includes services like legal advice. (b) It is limited to shopping of physical goods only. (c) Customer should approach customer for selling only. (d) Customer should approach business to buy.
Ans: B
5. What could be an implication for an organization if e-business strategy is not clearly defined ?
(a) Greater opportunity from evaluation of opportunity. (b) Effective integration of e-business at technical level.
(c) Increase in profit. (d) None of the above
Ans: D
6. Which of the following technique is used to find the biconnected components of the graph ?
(a) Greedy method (b) Dynamic programming
(c) Divide and conquer (d) Depth first search
Ans: D
7. Which of the following problems can be solved efficiently by greedy technique ?
(a) Travelling Salesman Problem (b) Minimum Spanning Tree (c) Matrix Multiplication (d) None of the above
Ans: B
8. The number of edges in an undirected complete graph with five (5) vertices is
(a) 5 (b) 10 (c) 20 (d) 15
Ans: B
9. In which layer of the OSI reference model router is supposed to operate ?
(a) Physical layer (b) Network layer (c) Transport layer (d) Application layer
Ans: B
10. Which of the following protocal(s) is/are defined in Transport layer ?
(a) FTP and TCP (b) FTP and UDP (c) TCP and UDP (d) FTP
Ans: C
11. There are four algorithms A1, A2, A3, A4 with complexity orders log(n), log (log n), n log(n) and n/log(n) respectively. Which of these algorithms is best ?
(a) A1 (b) A2 (c) A3 (d) A4
Ans: B
12. Which of the following is not a guided media ?
(a) Fibre optical cable (b) Coaxial cable (c) Wireless Lan (d) Copper wire
Ans: C
13. Which of the following is contained in program counter ?
(a) Address of next instruction (b) Address of current instruction
(c) Address of stack pointer (d) Count of executed instructions
Ans: A
14. Which out of the following scheduling policy is most suitable for a time shared operating system ?
(a) Shortest Job First (b) Elevator (c) Round Robin (d) FCFS
Ans: C
15. Which of the following scheduling algorithm is non-premptive ?
(a) Round Robin (b) FCFS (c) Multilevel Queue Scheduling (d) Multilevel Queue Scheduling with Feedback
Ans: B
16. Fence register is used for ________.
(a) CPU protection (b) Memory protection (c) File protection (d) None of the above
Ans: B
17. The time interval between the time of submission and completion of the job is termed as
(a) waiting time (b) through put time (c) turn around time (d) response time
Ans: C
18. Which of the following is a filter command of UNIX ?
(a) ls-l (b) grep (c) dir (d) None of the above
Ans: B
19. A graph with all vertices having equal degree is termed as
(a) Multi-graph (b) Regular graph (c) Simple graph (d) Complete graph
Ans: B
20. If a connected planar graph G is having 6 vertices and 7 edges, then how many regions are in G ?
(a) 15 (b) 11 (c) 1 (d) 3
Ans: D
21. Which of the following is associated with MAC address ?
(a) Transport layer (b) Data link layer (c) Application layer (d) Physical layer
Ans: B
22. A graph which is connected and acyclic is termed as
(a) Cyclic graph (b) Regular Graph (c) Tree (d) None of the above
Ans: C
23. Which among the following is a service provided by cloud computing ?
(a) Platform (b) Software (c) Infrastructure (d) All of the above
Ans: D
24. Which of the following is not a type of hardware cloud virtualization ?
(a) Full virtualization (b) Service virtualization (c) Para virtualization (d) Emulation virtualization
Ans: B
25. Which of the following is a distributed cloud type ?
(a) Volunteer cloud (b) Private cloud (c) Community cloud (d) Hybrid cloud
Ans: A
26. Which of the following statement is true about cloud ?
(a) The virtual cluster node can be physical machine or virtual machine.
(b) A virtual machine runs on guest operating system.
(c) Virtual machines can be replicated in multiple servers.
(d) All of the above
Ans: D
27. Which of the following cloud service provides the necessary software support ?
(a) SaaS (b) PaaS (c) LaaS (d) None of the above
Ans: A
28. Which of the following SQL statements can be used to remove data from table “users” ?
(a) REMOVE TABLE users (b) DROP TABLE users (c) DELETE TABLE users (d) ALTER TABLE users
Ans: C
29. Which one is true about relational database ?
(a) A column can store values of different data types. (b) A table consists of rows and columns.
(c) Different rows in the same table can have different set of columns. (d) Rows are also known as fields of the table.
Ans: B
30. Which one is false about keys in the relational model ?
(a) Primary keys are defined by a subset of attributes of a relation. (b) Primary keys uniquely identify each tuple of the relation.
(c) Primary keys define the relation between two tables. (d) A relation can have multiple foreign keys.
Ans: C
31. Which of the following is true about columns ?
(a) Each columns consists of one or more records. (b) Columns are where the individual pieces of information are stored for each record. (c) Columns must be designated by a specific data type. (d) Columns is also known as record.
Ans: C
32. Which one of the following is optional and need not to be specified at table creation time ?
(a) Table name (b) Column name (c) Default constraint (d) Column Data type
Ans: C
33. Which of the following cannot be used to restrict specific values from being inserted into a column in particular table ?
(a) Index (b) Check constraint (c) Referential constraint (d) Default constraint
Ans: D
34. An entity set that does not have sufficient attributes to form a primary key is termed as
(a) Strong entity set (b) Weak entity set (c) Simple entity set (d) Primary entity set
Ans: B
35. In PHP, a function which starts with (double underscore) is ________
(a) Magic function (b) Inbuilt function (c) Default function (d) User Defined function
Ans: A
36. Which version of the PHP introduced Try/catch exception ?
(a) PHP 4 (b) PHP 5 (c) PHP 5.3 (d) PHP 6
Ans: B
37. In PHP, the statement equivalent to $add + = $add is
(a) $add = $add (b) $add = $add + $add
(c) $add = $add + 1 (d) $add = $add + $add + 1
Ans: B
38. In PHP, which function will return True if a variable is an array and False if it is not ?
(a) this_array ( ) (b) do_array ( ) (c) is_array ( ) (d) in_array ( )
Ans: C
39. Which one of the following functions is used in PHP to determine whether a class exists ?
(a) exist ( ) (b) exist_class ( ) (c) class_exists ( ) (d) _exist ( )
Ans: C
40. Which of the following PHP function is used to determine the time when the file was last modified ?
(a) fileltime ( ) (b) filectime ( ) (c) filetime ( ) (d) fileatime ( )
Ans: C
41. What is the purpose of a „Bridge‟ in computer network ?
(a) To affect the transmission capacity of communication channels. (b) To connect computers in a network.
(c) To define class of IP used in networks. (d) None of the above
Ans: A
42. The IPv4 addresses have
(a) 8 bits (b) 16 bits (c) 32 bits (d) 64 bits
Ans: C
43. In network, each router has two ________
(a) Masks (b) Addresses (c) Blocks (d) Segments
Ans: B
(a) (i), (ii), (iii) (b) (ii), (iii), (iv)
(c) (ii), (iii), (iv), (v) (d) All of the above
Ans: C
2. Which out of following uses secure electronic transaction protocol ?
(a) Credit card payment (b) Cheque payment (c) Electronic cash payment (d) Payment of small amount for internet services
Ans: A
3. Which out of the following is most suitable for firewall implementation ?
(a) Router which connects intranet to internet (b) Bridge used in internet (c) Expensive modem (d) User application program
Ans: A
4. Which of the following statement is most appropriate for B2C commerce ?
(a) It includes services like legal advice. (b) It is limited to shopping of physical goods only. (c) Customer should approach customer for selling only. (d) Customer should approach business to buy.
Ans: B
5. What could be an implication for an organization if e-business strategy is not clearly defined ?
(a) Greater opportunity from evaluation of opportunity. (b) Effective integration of e-business at technical level.
(c) Increase in profit. (d) None of the above
Ans: D
6. Which of the following technique is used to find the biconnected components of the graph ?
(a) Greedy method (b) Dynamic programming
(c) Divide and conquer (d) Depth first search
Ans: D
7. Which of the following problems can be solved efficiently by greedy technique ?
(a) Travelling Salesman Problem (b) Minimum Spanning Tree (c) Matrix Multiplication (d) None of the above
Ans: B
8. The number of edges in an undirected complete graph with five (5) vertices is
(a) 5 (b) 10 (c) 20 (d) 15
Ans: B
9. In which layer of the OSI reference model router is supposed to operate ?
(a) Physical layer (b) Network layer (c) Transport layer (d) Application layer
Ans: B
10. Which of the following protocal(s) is/are defined in Transport layer ?
(a) FTP and TCP (b) FTP and UDP (c) TCP and UDP (d) FTP
Ans: C
11. There are four algorithms A1, A2, A3, A4 with complexity orders log(n), log (log n), n log(n) and n/log(n) respectively. Which of these algorithms is best ?
(a) A1 (b) A2 (c) A3 (d) A4
Ans: B
12. Which of the following is not a guided media ?
(a) Fibre optical cable (b) Coaxial cable (c) Wireless Lan (d) Copper wire
Ans: C
13. Which of the following is contained in program counter ?
(a) Address of next instruction (b) Address of current instruction
(c) Address of stack pointer (d) Count of executed instructions
Ans: A
14. Which out of the following scheduling policy is most suitable for a time shared operating system ?
(a) Shortest Job First (b) Elevator (c) Round Robin (d) FCFS
Ans: C
15. Which of the following scheduling algorithm is non-premptive ?
(a) Round Robin (b) FCFS (c) Multilevel Queue Scheduling (d) Multilevel Queue Scheduling with Feedback
Ans: B
16. Fence register is used for ________.
(a) CPU protection (b) Memory protection (c) File protection (d) None of the above
Ans: B
17. The time interval between the time of submission and completion of the job is termed as
(a) waiting time (b) through put time (c) turn around time (d) response time
Ans: C
18. Which of the following is a filter command of UNIX ?
(a) ls-l (b) grep (c) dir (d) None of the above
Ans: B
19. A graph with all vertices having equal degree is termed as
(a) Multi-graph (b) Regular graph (c) Simple graph (d) Complete graph
Ans: B
20. If a connected planar graph G is having 6 vertices and 7 edges, then how many regions are in G ?
(a) 15 (b) 11 (c) 1 (d) 3
Ans: D
21. Which of the following is associated with MAC address ?
(a) Transport layer (b) Data link layer (c) Application layer (d) Physical layer
Ans: B
22. A graph which is connected and acyclic is termed as
(a) Cyclic graph (b) Regular Graph (c) Tree (d) None of the above
Ans: C
23. Which among the following is a service provided by cloud computing ?
(a) Platform (b) Software (c) Infrastructure (d) All of the above
Ans: D
24. Which of the following is not a type of hardware cloud virtualization ?
(a) Full virtualization (b) Service virtualization (c) Para virtualization (d) Emulation virtualization
Ans: B
25. Which of the following is a distributed cloud type ?
(a) Volunteer cloud (b) Private cloud (c) Community cloud (d) Hybrid cloud
Ans: A
26. Which of the following statement is true about cloud ?
(a) The virtual cluster node can be physical machine or virtual machine.
(b) A virtual machine runs on guest operating system.
(c) Virtual machines can be replicated in multiple servers.
(d) All of the above
Ans: D
27. Which of the following cloud service provides the necessary software support ?
(a) SaaS (b) PaaS (c) LaaS (d) None of the above
Ans: A
28. Which of the following SQL statements can be used to remove data from table “users” ?
(a) REMOVE TABLE users (b) DROP TABLE users (c) DELETE TABLE users (d) ALTER TABLE users
Ans: C
29. Which one is true about relational database ?
(a) A column can store values of different data types. (b) A table consists of rows and columns.
(c) Different rows in the same table can have different set of columns. (d) Rows are also known as fields of the table.
Ans: B
30. Which one is false about keys in the relational model ?
(a) Primary keys are defined by a subset of attributes of a relation. (b) Primary keys uniquely identify each tuple of the relation.
(c) Primary keys define the relation between two tables. (d) A relation can have multiple foreign keys.
Ans: C
31. Which of the following is true about columns ?
(a) Each columns consists of one or more records. (b) Columns are where the individual pieces of information are stored for each record. (c) Columns must be designated by a specific data type. (d) Columns is also known as record.
Ans: C
32. Which one of the following is optional and need not to be specified at table creation time ?
(a) Table name (b) Column name (c) Default constraint (d) Column Data type
Ans: C
33. Which of the following cannot be used to restrict specific values from being inserted into a column in particular table ?
(a) Index (b) Check constraint (c) Referential constraint (d) Default constraint
Ans: D
34. An entity set that does not have sufficient attributes to form a primary key is termed as
(a) Strong entity set (b) Weak entity set (c) Simple entity set (d) Primary entity set
Ans: B
35. In PHP, a function which starts with (double underscore) is ________
(a) Magic function (b) Inbuilt function (c) Default function (d) User Defined function
Ans: A
36. Which version of the PHP introduced Try/catch exception ?
(a) PHP 4 (b) PHP 5 (c) PHP 5.3 (d) PHP 6
Ans: B
37. In PHP, the statement equivalent to $add + = $add is
(a) $add = $add (b) $add = $add + $add
(c) $add = $add + 1 (d) $add = $add + $add + 1
Ans: B
38. In PHP, which function will return True if a variable is an array and False if it is not ?
(a) this_array ( ) (b) do_array ( ) (c) is_array ( ) (d) in_array ( )
Ans: C
39. Which one of the following functions is used in PHP to determine whether a class exists ?
(a) exist ( ) (b) exist_class ( ) (c) class_exists ( ) (d) _exist ( )
Ans: C
40. Which of the following PHP function is used to determine the time when the file was last modified ?
(a) fileltime ( ) (b) filectime ( ) (c) filetime ( ) (d) fileatime ( )
Ans: C
41. What is the purpose of a „Bridge‟ in computer network ?
(a) To affect the transmission capacity of communication channels. (b) To connect computers in a network.
(c) To define class of IP used in networks. (d) None of the above
Ans: A
42. The IPv4 addresses have
(a) 8 bits (b) 16 bits (c) 32 bits (d) 64 bits
Ans: C
43. In network, each router has two ________
(a) Masks (b) Addresses (c) Blocks (d) Segments
Ans: B
- Computer Application
- Computer Application- Page 1
- Computer Science
- Computer Science- Page 1
- Computer Science- Page 2
- Computer Science- Page 3
- Computer Science- Page 4
- Computer Science- Page 5
- Computer Science- Page 6
- Computer Science- Page 7
- Computer Science- Page 8
- Computer Science- Page 9
- Computer Science- Page 10
- Computer Science- Page 11
- Computer Science- Page 12
- Computer Science- Page 13
- Computer Science- Page 14
- Computer Science- Page 15