ECAT Computer Science Online Test With Answers

image
image
image

ECAT Computer Science Online Test

Sr. # Questions Answers Choice
1 Which of the following is termed ad minimum error code? Binary code Gary code Excess 3-code Octal code
2 The act of reading new data into a register erases the previous contents of the register is usually not possible is possible only when the register is an accumulator is possible only when the register is an accumulator or instruction register
3 The correct order of data hierarchy is bit-byte-record-field-file-data base bit-byte-record-field-file-data base bit-byte-file-record-field-data base bit-byte-field-record-file-data base
4 An error in a computer hardware and software is called a bug. Another name for its is glitch hacker virus pixel
5 How many input leads will be required for a chip containing four two-input Not gates? 7 14 12 13
6 Which of the following IC logic family has maximum fan out capacity? TTL DTL MOS CMOS
7 A computer process information as direct by the operator automatically at once gradually and eventually
8 Diodes are used in analog computer circuit as phase shifter rectifier binary logic limiter
9 Pick up wrong statement regarding analog computers Initial conditions during integration operation are imposed in an analog computer during reset mode Differentiators is analog circuit are not popular, became they are incapable of handling noisy ramp signals Memory or storage is an essential component of an analog computer Repetitive operations of analog computers are done to get a display on oscilloscope
10 A typical microcomputer has 64 K memory. It has 65,536 registers,each register storing 1 byte Each register is called memory location address byte word
11 The five basic parts of a computer system are hardware, software, memory,VDU, and magnetic tape store,arithmatic and logic unit, control unit, input device, and output device CPU, ALU,software,firmware, and operating system data bus,control lines,address bus,memory, and printer
12 Most of the errors in computer system could be attributed due to virus programming errors hardware problems data entry errors
13 The fastest type of ADC is time interval parallel closed loop successive
14 A group of electronic, magnetic, or mechanical devices that store data is called register address program software
15 The term 'word' in computer terminology refers to bit formed into groups coded instructions memory size language used
16 Retaining data for future reference is called storing sorting memorizing programming
17 Computer follows a simple rule called GIGO, GIGO stand for good input, good output great instructions, great output garbage in, garbage out gated input, gated output
18 In EBCDIC (extended binary coded decimal interchange code) each character is denoted by 3 bits 4 bits 5 bits 8 bits
19 Super computers are usually designed to process complex scientific applications and the computational speed of the system is most important. Each address in the CRAY-1 holds 16 bits of information 32 bits of information 48 bit of information 64 bits of information
20 NOS refers to network open system booting network operating system round-robin scheduling
21 Another name for virtual memory is virtual page foregound background utility
22 The signal that the computer is awaiting a command from the user prompt time slice event interrupt
23 Prewritten standard file-handling programs are called pull-down menus language supervisors utilities
24 The memory area for programs with highest priority page frames the background shells queues
25 Page frames are typically 1K or 2K bytes 3K or 4K bytes 2K or 3K bytes 2K or 4K bytes
26 Take-a-turn time-sharing spooling interfacing round-robin-scheduling prompting
27 An on-screen picture page NOC icon spool
28 The time between the user's request and the computer's reply concurrent time response time allocation time event time
29 The corresponding memory spaces for pages are called page utility page frames page blocks page modules
30 In multiprogramming, the process of confining each program to certain defined limits in memory is called spooling time-sharing program scheduling memory protection
Download This Set