1 |
Which of the following is termed ad minimum error code? |
Binary code
Gary code
Excess 3-code
Octal code
|
2 |
The act of reading new data into a register |
erases the previous contents of the register
is usually not possible
is possible only when the register is an accumulator
is possible only when the register is an accumulator or instruction register
|
3 |
The correct order of data hierarchy is |
bit-byte-record-field-file-data base
bit-byte-record-field-file-data base
bit-byte-file-record-field-data base
bit-byte-field-record-file-data base
|
4 |
An error in a computer hardware and software is called a bug. Another name for its is |
glitch
hacker
virus
pixel
|
5 |
How many input leads will be required for a chip containing four two-input Not gates? |
7
14
12
13
|
6 |
Which of the following IC logic family has maximum fan out capacity? |
TTL
DTL
MOS
CMOS
|
7 |
A computer process information |
as direct by the operator
automatically
at once
gradually and eventually
|
8 |
Diodes are used in analog computer circuit as |
phase shifter
rectifier
binary logic
limiter
|
9 |
Pick up wrong statement regarding analog computers |
Initial conditions during integration operation are imposed in an analog computer during reset mode
Differentiators is analog circuit are not popular, became they are incapable of handling noisy ramp signals
Memory or storage is an essential component of an analog computer
Repetitive operations of analog computers are done to get a display on oscilloscope
|
10 |
A typical microcomputer has 64 K memory. It has 65,536 registers,each register storing 1 byte Each register is called |
memory location
address
byte
word
|
11 |
The five basic parts of a computer system are |
hardware, software, memory,VDU, and magnetic tape
store,arithmatic and logic unit, control unit, input device, and output device
CPU, ALU,software,firmware, and operating system
data bus,control lines,address bus,memory, and printer
|
12 |
Most of the errors in computer system could be attributed due to |
virus
programming errors
hardware problems
data entry errors
|
13 |
The fastest type of ADC is |
time interval
parallel
closed loop
successive
|
14 |
A group of electronic, magnetic, or mechanical devices that store data is called |
register
address
program
software
|
15 |
The term 'word' in computer terminology refers to |
bit formed into groups
coded instructions
memory size
language used
|
16 |
Retaining data for future reference is called |
storing
sorting
memorizing
programming
|
17 |
Computer follows a simple rule called GIGO, GIGO stand for |
good input, good output
great instructions, great output
garbage in, garbage out
gated input, gated output
|
18 |
In EBCDIC (extended binary coded decimal interchange code) each character is denoted by |
3 bits
4 bits
5 bits
8 bits
|
19 |
Super computers are usually designed to process complex scientific applications and the computational speed of the system is most important. Each address in the CRAY-1 holds |
16 bits of information
32 bits of information
48 bit of information
64 bits of information
|
20 |
NOS refers to |
network open system
booting
network operating system
round-robin scheduling
|
21 |
Another name for virtual memory is |
virtual page
foregound
background
utility
|
22 |
The signal that the computer is awaiting a command from the user |
prompt
time slice
event
interrupt
|
23 |
Prewritten standard file-handling programs are called |
pull-down menus
language
supervisors
utilities
|
24 |
The memory area for programs with highest priority |
page frames
the background
shells
queues
|
25 |
Page frames are typically |
1K or 2K bytes
3K or 4K bytes
2K or 3K bytes
2K or 4K bytes
|
26 |
Take-a-turn time-sharing |
spooling
interfacing
round-robin-scheduling
prompting
|
27 |
An on-screen picture |
page
NOC
icon
spool
|
28 |
The time between the user's request and the computer's reply |
concurrent time
response time
allocation time
event time
|
29 |
The corresponding memory spaces for pages are called |
page utility
page frames
page blocks
page modules
|
30 |
In multiprogramming, the process of confining each program to certain defined limits in memory is called |
spooling
time-sharing
program scheduling
memory protection
|