FUNGCAT COMPUTERR CH 1 TO 5th
FUNGCAT COMPUTERR CH 1 TO 5th
JAUHARABAD CAMPUS
Name: FUNGCAT
Roll Number: Unit No. 1 Basics of Information Technology
6. The physical components of the computer which one can see, touch and feel and move it from one
place to another is called ______.
Software Electronic Devices Hardware
Components
7. Data is always given as _________ to the computer system.
Input Output Processed Result None of these
9. ___________ accept the data in a form that the computer can use and then sends it to the processing
unit.
Input Devices Output Devices Processing Storing Devices
Devices
10. The processor executes the instructions (programs) in a _________ Sequence.
Natural Sophisticated Logical None of these
11. Storage devices means to store the data in computer system. The ________ storage devices
supplement main memory, which can hold data and programs only temporarily.
Primary Secondary Tertiary None of these
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
12. I/O devices is an acronym of _________.
Input/Output Inside/Outside Internal/External Inbound/Outbound
13. __________ are the softwares used to control the usage and allocation of different hardware
components and enables the other application programs to execute.
Application Pirated Softwares Packaged System Software
Softwares Softwares
14. __________ are the softwares that has been developed to solve a specific problem or to provide
audio, video, or multimedia entertainment to the users.
System Softwares Pirated Softwares Packaged Application
Softwares Softwares
15. ____________ are the softwares are programs or components developed for sale to the potential
software developers or users for their use.
System Softwares Application Packaged Pirated Softwares
Softwares Softwares
16. Device Drivers Softwares like Audio, Video etc, are the types of ___________ Softwares.
Application System Pirated Packaged
17. ___________ are the softwares that are designed and developed for a particular customer.
System Softwares Application Packaged Custom Built
Softwares Softwares Softwares
18. The Packaged softwares are also commonly termed as ____________ Softwares.
On the Shelf Off the Shelf In the Shelf Over the Shelf
19. The data entered directly form the source is called _______ input and ________ if entered through
some intermediate handling.
Indirect, Direct Direct, Indirect Input, Output None of these
20. The keyboard contains Numeric, Alphabetic, Fucntions and ____________ Keys.
Alphanumeric Alphasymbolic Special Purpose None of these
22. _________ Keys are used to give some certain commands to the computer system depending on the
softwares being used.
Numeric Alphabetic Function Symbolic
26. The _________ toggle key is pressed in combination with other keys to produce upper letters and the
upper symbols shown on the keyboard.
Alt Ctrl Shift Tab
27. The __________ toggle key is pressed in combination with the other keys to initiate commands as
specified by the software.
Alt Ctrl Tab Shift
28. __________ key is used to delete the character to the left of the cursor, moving the cursor back one
position.
Delete Space Backspace None of above
29. The ________ key moves the cursor to the beginning of the next line. For instance it is used at the
end of a paragraph.
Space Bar Alternative Key Arrows keys Enter Key
30. The numeric pad will work for numeric digits if the _________ key is toggled as on.
Capslock Scroll lock Print screen Num lock
31. The __________ key is used to delete the character to the right of the cursor.
Backspace Insert Home Delete
32. The _________ key is used to take the copy of the current screen display information or image.
Print screen Scroll lock Alt + Home Ctrl + Insert
33. The Function Keys contain ________ to _________ keys and are used as defined in different
softwares.
F1 to F9 F1 to F15 F1 to F12 F1 to F10
34. ______________ devices are used to control the position of the cursor or pointer on the screen.
Input Devices Output Devices Pointing Devices None of above
35. _____________ consists of vertical handle like a gearshift lever mounted on a base with one or two
buttoms and is used to control the position of item on the screen.
Trackball Mouse Light Pen Joy stick
36. The device used to sketch an image or to write on screen is called __________.
Mouse Light Pen Stylus Puck
37. A device which is much similar to the mouse but is used to copy the an image such as an
architectural map or drawing is called _________.
Mouse Trackball Light Pen Puck
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
38. The devices which used to enter data directly to the computer system are called ___________.
Sink Data Entry Source Data Entry Pointing Devices None of above
Devices Devices
39. The ____________ device is used to read the vertical zebra-stripped marks we find on most of the
manufactured products in the market.
MICR OCR Bar-Code Smart Card
40. The ________ is the method of machine reading characters made of magnetized particles.
MICR OCR OMR Bar Code
41. _________________ System uses a light beam to scan input data to convert it into electrical/digital
signals which are then sent to the computer for processing.
Optical Character Optical Mark Both a and b None of above
Recognition Recognition
42. OCR stands for _________.
Optical Character Optical Character Optical Character None of above
Record Readiness Recognition
43. The ___________ has a strip of magnetically encoded data on them and are used for peripheral
identification.
Smart Cards Magnetic Strip ATM Cards CNIC cards
Cards
44. The _________ consists of a credit card but has a microprocessor and memory chip which is when
inserted into the reader, exchanges with the corresponding information on central computer.
Identity Cards Smart Cards Magnetic Strip None of above
cards
45. The ___________ can capture and digitize only a single frame of image at a time.
Full Motion Frame Grabber Expansion Card None of above
Grabber Video Video Card
Card
46. The _________ video cards can convert analog to digital signals at the rate of upto 30 frame per
second giving the effect of continuously flowing motion picture.
Frame grabber Full Motion Video Cards None of above
47. The __________ uses a light sensitive processor chip to capture photographic image in digital form on
a small diskette inserted in the camera or on flash memory chips.
Analog Camera Digital Camera Hybrid Camera None of above
48. CRT were some of the earlier monitors used to display the output of System unit. CRT stands for
_____________.
Common Ray Tube Cathode Ray Tube Cathode Rewind Cathod Row Tube
Tube
49. Monitors used RGB colors which can create _________ colors and several thousand variations on
screen.
228 568 256 180
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
50. All the characters and images on a monitor are made up of dot patterns the number of dots or pixels.
The number of pixels per inch is called ______________ of the Dislay unit.
Size Quality Resolution Color
51. VGA stand for Video Graphic Adaptors which can support upto _________ colors depending upon the
screen resolution.
20-262 16-256 16-520 15-250
54. SVGA (Super Video Graphics Array) contains a _________ bit of colors.
4 8 16 32
55. XGA (Extended Graphics Array) is also called ________ bit color.
4 8 16 24
Medial
57. The two types Display Screen are Cathode Ray Tubes and _____________.
Light Emitting Liquid Crytals Flat Panel Display None of above
Diodes Display
58. ___________ display is like a neon bulb in which the display uses a gas that emits light in the
presence of an electric current.
Liquid Plasma Flat Plasma Gas Plasma Electric Plasma
Display Display Display Display
59. The electric device which is used to give soft Copy is called_________.
Monitors Speakers Printers All of above
61. The __________ printers uses a Paper Striking Mechanism such as Print Hammer or Wheel against an
inked ribbon, leaving an image on the paper.
Impact Non-impact Plotters Scanners
62. The __________ printer contains a print head with small pins, which strike an inked ribbon against
paper, forming characters or images.
Daisy Wheel Line Dot Matrix Matrix
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
63. The Dot Matrix printer with __________ pins offers a best quality.
4 8 16 24
64. The ___________ printer uses a series of petals arranged on a petal wheel, having a character at the
end of each petal.
Dot Matrix Daisy Wheel Line Printer None of above
66. Chain printer and Band printer are the types of __________ printer.
Dot Matrix Daisy Wheel Line Printer Laser Printer
67. The type of Printer that prints the document without making direct physical contact between printing
mechanism and paper is called __________.
Impact Non-Impact Both a and b None of above
68. The ___________ printer uses a spary of small electrically droplets of ink from four nozzles through
holes in a matrix at high speed paper.
Laser Ink-Jet Thermal Flatbed
70. The ___________ printer uses colored waxes and heat to produce images by burning dots on to
special paper.
Ink-jet Potters Thermal Drum
71. The __________printer is used to produce high quality graphics in many colors and used for
specialized applications i.e Architectural Drawings, maps, graphs and charts.
Dot Matrix Daisy Wheel Plotters Thermal
73. For measuring the earth quakes which types of printer is used for printing seismographic charts.
Flat Bed Plotters Thermal Printers Ink jet printers Drum Plotters
85. Data is collection of raw facts and figures. The word raw means ___________.
Processed form Unprocessed form Common form Decision making
form
86. Due to the modern computer technology the world has become _________.
Common City Global Village Global City Global Area
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
Name: FUNGCAT
Roll Number: Unit No. 2 Information Networks
1. Information networks are the convergence of two important technologies ____________ and
____________.
Computing Telecommunicatio Both A and B None of these
ns
2. When two or more nodes are connected together it forms _____________.
Internet Network Topology Design
3. _____________ enables the individuals and teams of certain projects to use computer network for the
purpose of cooperation, consultation and information sharing.
Networks Internet Workgroup Cloud Computing
Computing
4. Workgroup computing is also called ____________.
Cloud Computing Modern Computing Collaborative Digital Computing
Computing
5. _____________ is an acronym of E-Mail.
Electric Mail External Mail Electronic Mail Electron Mail
6. The physical components of the computer which one can see, touch and feel and move it from one
place to another is called ______.
Software Electronic Devices Hardware
Components
7. When two or more networks are connected together it forms ___________.
Internet Network Topology None of these
13. The process of Copying a file from Server Computer to Client Computer is called_________.
Upload Downlink Uplink Download
14. The process of copying a file from Client Computer to a Server computer is called ________.
Uplink Downlink Download Upload
15. ________ is a an internet application which allows to browse many different kind of resource by
looking at the menu and listings of information available.
Protocol Gopher Protocol FTP Pirated Softwares
16. __________ is a privately owned, secure, business network based on internet technology, although
not necessarily connected to the internet.
Internet Intranet Extranet Network
17. The combination of two or more Intranet in such a way that they enable collaboration among the
companies that own the separate intranets is called _________.
Internet Intranets Network Extranet
24. The ___________ is used to find the best shortest possible path between the source and destination
on two different networks.
Switches Routers Hubs None of above
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
25. The two main pieces of softwares which are used by the router to operate are called ___________ and
__________.
Operating System, Operating System, Operating System, Operating System,
Application Routing Protocols Microsoft Office Telnet
Software
26. The set of formal agreement between two network nodes to send and receive the message is called
__________.
Computer Software Network Network Protocol Network Software
Component
27. ATM in networking stands for ____________.
Synchronous Asynchronous Automated Teller None of above
Transmission Transmission Machine
Mode Mode
28. Before transmitting the message, a node listens the cable to find out if the cable is free if not than it
waits. When the cable is free from other transmission than the node can transmit the data. This
process is known as ____________.
CSMA/CR CSMA/CS CSMA/CD None of above
33. Ring Topology uses the _________ to send message from source to destination.
Network Protocol Media Access Token Ring ATM
Code
34. TCP stands for ____________.
Transmission Transmission Transmission None of above
counter protocol Control Packet Control Protocol
35. ISDN is an acronym of __________.
Internet Services Internet Services Internet Services Internet Services
Domain network Definition network Data network Digital network
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
36. DSL stands for ___________.
Digital Services Digital Services Digital Subscriber Digital Static Line
Line Local Line
37. The larger computers like mainframe or supercomputer are designed to be accessed by terminal, a
PC can communicate with larger computers on if the PC imitates to be terminal. This made possible
by using _______________ on PC.
Terminal Extended Terminal Emulation Terminal Enhanced Terminal Extra
Software Software Software Software
38. The larger computers like Mainframe or supercomputer to which the terminal or PC are attached are
called __________.
Client Computers Host Computers Data Computers None of above
43. The combination of Client-server Model and Peer-to-Peer Model is called ____________.
Wide Area network Hybrid Model Digital Model Network Model
46. The network standards which are formulated by proper research and has been approved by network
governing body are called __________.
De-Facto De-Proto De-Jure None of above
50. The ________ topology contains a central cable which allows multipoint connection of nodes.
Bus Star Ring Mesh
51. The devices which are used to destroy the unecessary signals.
Nodes Terminators Protocols None of above
52. In which network topology every node has two neighbours for communication purposes.
Bus Ring Star Mesh
53. The switch uses ___________ address to identify the exact destination computer.
IP MAC LLC TCP
54. The __________ is the intelligent device used in star topology which ensures the data security.
Hub Coaxial Switch Router
55. The topology which has a dedicated connection between the sender and receiver.
Star Bus Ring Mesh
56. The most commonly used topology used for the interconnection of the devices in Labs, Houses,
Offices and Institutions is:
Bus Star Mesh None of above
Medial
57. Internet which is also called Networks of Networks uses _____________ topology for interconnection
of two or more networks to share data and information.
Star Bus Mesh None of above
62. The application layer uses _________ for the proper identification of the file type at the destination
computer.
Filename File Category Port Number Peripheral Port
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
63. OSI model has ________ number of layers.
4 8 16 7
65. The Network Layer divides the message into the ________.
Frames Bits Packets Segments
66. The Physical Layer divides the message into the ________.
Frames Bits Segments Packets
67. The ________ layer is directly connected to the Communication Medium in OSI reference model.
Application Layer Physical Layer Session Layer Datalink Layer
68. Presentation Layer uses the __________ Number system to encode the Message into a format that is
travelable on the Transmission media.
Unicode ASCII BCD EBCDIC
69. The process of encryption and decryption is performed by _________ layer of the OSI Model.
Application Layer Session Layer Transport Layer Presentation Layer
70. The layer which determines how two devices establish, maintain and terminate the connection
between them over the network.
Presentation Layer Session Layer Physical Layer Network Layer
71. Network Layer used _________ networking device to find the best shortest possible path between the
sender and receiver.
Switch Hub Router Gateway
72. TCP(Transmission Control Protocol) and UDP (User Datagram Protocol) is used by which layer of OSI
Model.
Physical Layer Transport Layer Network Layer Session Layer
75. Router perform _______ addressing while Switches perform ______ addressing in a network.
Identical, Physical Logical, Physical Physical, Distinct Distinct, Identical
78. The _______layers of OSI Model focus on how the actual communication takes over the network.
Upper Layers Session Layer Transport Layer Lower Layers
1. The exchange of the data between two devices via some communication medium is called
__________.
Information Telecommunicatio Data None of these
Networks ns Communication
2. There are ________ components of the communication system.
4 2 3 5
3. The _________ consists of text, audio, video, image, and any combination of these.
Sender Receiver Document Message
4. The device which sends the message from source to destination using communication medium is
called __________.
Source Sender Transmitter All of these
6. The physical path by which the data passes from source to sink is known as ____________.
Transmission Communication Communication All of above
Channel Medium Channel
7. The __________ is a device which converts the digital signal into a form which can travel on the
transmission medium.
Encoder Decoder Sender Transmitter
8. The device which is used to convert the signal received from transmission medium into a digital form
which can understandable by the sink is known as__________.
Encoder Decoder Transmitter Sink
9. The encoder and decoder acts as a ___________ between source and sink in a data communication
process.
Messenger Translator Sender Receiver
10. __________ are the actual carriers which take the mesage from the transmitter to the sink in a data
communication process.
Sender Receiver Communication Signals
Path
11. The sink must capable of receiving the ________ in a data communication process.
Sending Encoding Terminating Receiving
12. The __________ signals are a continuous electrical signal in the form of wave.
Digital Analog Discrete Signal None of above
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
13. Frequency and amplitude are the two characteristics of ___________ signals.
Analog Digital Discrete None of above
14. The number of waves passing per unit time through an area is called _____________.
Amplitude Frequency Signals Transmission
15. The unit of the frequency is measured in _________ and is denoted by _________.
Kilogram, Kg Megatons, Mt Hertz, Hz All of above
16. The height of the given wave at a given period of time is called __________.
Frequency Amplitude Signal Waveform
17. The __________ signal uses the on-off electrical pulses in the form of discontinuous or discrete form.
Waveform Frequency Analog Digital
18. Digital or Discrete signals are represent by the ________ and ________ bits.
2, 4 0, 2 0, 1 8, 16
19. The term __________ refers to the text stored in the ASCII code that is without any formating.
Text Numeric Alphabetic Digital
20. The ___________ data consists of digits from 0 to 9, positive and negative and a decimal point.
Alphabetic Alphanumeric Symbolic Numeric
21. The _________ data includes charts, graph, pictures and freehand drawings.
Alphabatic Numeric Images Animations
22. Which type of the data is sent as a continuous bit, which, for transfer is packed into the 8-bit transfer
bytes.
Numeric Alphabetic Alphanumeric Images
24. Audio is converted into the digital signals by sampling the sound waves __________times per second
and each sample is converted into a __________ bit of number.
65535, 8 220, 16 44056, 16 256, 32
25. The ______________ are used to represent each binary number inside the computer system.
Sound Waves Electrical Pulses Light Pulses Radio Waves
32. Universal Code is ____________ bit code and can represent __________ characters.
8, 256 4, 16 6, 64 16, 65536
37. The ____________ transmission in which the data can be sent in both directions but not at the same
time.
Simplex Half Duplex Full Duplex None of Above
38. The ____________ is a transmission in which the data is transmitted in both directions
simultaneously.
Simplex Half Duplex Full Duplex None of above
39. Full Duplex is made possible by the ____________ devices and is limited to __________ computers
because of expensive hardware required to support bidirectional mode.
Switches, Personal Routers, Super Gateways, Multiplexers,
Computers Computers Mainframe Mainframe
Computers Computers
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
40. There are _____________ types of Data Transmission.
1 2 3 4
41. The concurrent flow of data bits through separate communication lines is called ____________.
Parallel Serial Synchronous Asynchronous
Communication Communication Communication Communication
42. The Transmission in which data is send from source to sink in byte by byte or character by character
format is called ____________.
Parallel Serial Synchronous Asynchronous
44. The operation or activity of two or more thing at the same time is called Synchronization. Which
Transmission requires a full synchronization between the sender and receiver.
Asynchronous Synchronous Parallel Serial
45. Start and Stop bits are added with the data in _____________ Transmission.
Synchronous Asynchronous Parallel Serial
46. The transmission in which data is sent block by block or in frames is called ____________
transmission.
Serial Parallel Synchronous Asynchronous
52. The ___________ is the difference between upper and lower frequencies in a continuous band of
frequencies.
Baseband Broadband Bandwidth All of above
57. The __________ requires the transmission of large quantity of signals over long distnaces
simultaneously by modulating each signal on to a different frequency.
Broadband Baseband Bandwidth Amplitude
Modulation
58. Broadband uses the ____________ technique to transmit several signal streams over the transmissio
medium.
Frequency Division Frequency Division Frequently Frequency Domain
Multiplexing Multiple Division Modulating
Muliplexing
59. Broadband are ____________Signals.
Wireless Un-guided Un-bounded All of above
60. Coaxial cable, Twisted Pair Cable and optical fiber cable is ____________ transmission medium.
Wired Baseband Guided All of above
61. Twisted pair cable contains ________ wires twisted into __________ number of pairs.
6, 3 8, 4 12, 6 20, 10
62. Twisted pair cable is also known as ___________ and is commonly used in connecting networking
nodes together.
Token Ring Coaxial Cable Ethernet Cable Firewire Port
63. The twisted pair cable contains __________ jack mounted at its end to connect to NIC card Port of
System Unit or Networking Node.
RJ-43 RJ-42 RJ-46 RJ-45
64. RJ 45 is a jack used to connect ethernet cable to networking nodes. The RJ is the abbrevation of
____________.
Random Jack Registered Jack Round Jack Rectangle Joint
65. The cable through which the data signal passes in the form of light pulses is called __________.
Optical Fiber Coaxial Cable Twisted Pair Ethernet Cable
68. The communiction that uses the electromagnetic waves and is at the height of about 23,300 miles
above the earth surface is called___________.
Microwaves Satellite Infrared Stations Radio Stations
Stations communication
69. The process of sending a data signal from ground station to satellite is known as __________.
Uplink Downlink Upload Download
70. The process of receiving the data signal from Satellite to Ground station is known as ___________.
Uplink Downlink Upload Download
71. The device which converts the digital signals to the analog form is called ___________.
Encoder Decoder Demodulator Modulator
72. ____________ device is reponsible for decorating the signals that can travel on the any type of
transmission medium.
Econder Decoder Multiplexer Modem
73. On long distances __________ of a transmission wave decreases and the booster stations are used to
reboost the signal to travel further.
Frequency Amplitude Range None of above
74. On long distances amplitude of a transmission wave decreases and the booster stations are used to
reboost the signal to travel further. This process is known as __________.
Attenuation Boosting Interference Noise
75. Unwanted signals that can degrade the quality of the signal is known as ________.
Attenuation Boosting Interference Noise
76. Attenuation, Interference and Noise are termed as _________ in Communication System.
Transmission Transmission Loss Transmission Transmission
Drawbacks Impairements degradation
77. (4DE)16 to binary form is .
(10011011000)2 (10011011110)2 (10011010010)2 (00011011110)2
5. The Control Unit reads the instructions from __________ and than decodes these instructions.
RAM Primary memory Main memory All of above
10. The electronic components on System Board are connection together using ___________.
Electronic Wires Direct Connection Busses Physical Paths
11. A computer cannot work if it do not have some kind of ____________ in it and most commonly used is
________.
Storage, Harddisk Memory, Cache Memory, RAM Memory, Registers
Memory
12. Each cell on the RAM can store one _________ of a data.
Byte Kilobyte Megabyte Bit
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
13. Main memory is built using a _________ material.
CMOS (Copper MOS (Metal Oxide SOS (Silicon Oxide GDOS (Germinium
Metal Oxide Semiconductor) Semiconductor) Dioxide
Semiconductor) Semiconductor)
14. RAM is an abbrevation of ____________.
Read And Memory Random And Read Allocation Random Access
Memory Memory Memory
15. RAM uses __________ method to store the data temporarily for the processing process.
Sequential Random Indexed None of above
19. In which memory the memory cells are made up using Digital Gates ?
DRAM RAM SRAM ROM
20. The memory which loses all of its content if an electric supply is cut-off is called ______________.
Volatile Memory Non-Volatile Secondary Both A and B
Memory Memory
21. ROM stands for __________.
Random Only Read Only Memory Random Only Read Only
Memory Motherboard Motherboard
22. PROM stands for ___________.
Progressive Read Programmable Programmable Programmable
Only Memory Read Only Memory Random Only Read On Memory
Memory
23. ROM is _____________ memory.
Simple Complex Volatile Non-Volatile
24. Buses are a set of _________ lines which connects the electronic components of the system board
together.
Serial Parallel Cross Wire Both B and C
25. The Buses which are used to internal components of system unit together are called ____________
and the buses used to connect peripheral components/devices are called ____________.
External, System System, External System, Internal System, Expansion
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
26. Data bus, Control bus and Address bus are types of ____________buses.
System Buses Expansion Buses Peripheral Buses Parallel lines
27. The bus that is used to transfer the data form RAM to CPU is called ____________.
System Bus Address Bus Control Bus Data Bus
28. The _________ bus takes the control and command signals from the CU to all other components of the
System Unit.
Address Bus Control Bus Data Bus Expansion Bus
29. Each memory location in RAM has a unique address. The address of the instruction is sent and
received between electronic components on CPU uses __________ bus.
Address Bus Control Bus Data Bus Expansion Bus
30. The _____________ command is sent by Control Unit to RAM for reading an instruction form a
memory cell using a Control Bus.
Memory Write Memory Write Memory Read Memory Access
Signal Command Command Command
31. The Acknowledgement signal is sent back and forth between electronic components on system
board using ___________ bus.
Data Bus Address Bus Control Bus Expansion Bus
32. The __________ device is used to compensate the speed differences between CPU and the
Input/Output Devices.
Expansion buses System Buses Registers Input/Output Unit
(I/O Unit)
33. __________ is a high priority hardware generated call which when arrives Processor suspends all
other operations and deals with that call.
System Call Interrupt DMA Error
35. The technique in which the Input/Output device has a direct access to RAM is known as ___________.
Interrupt System Call DMA RMA
38. The register which is used to store the address of the next fetched instruction to be executed is
called _______.
Instruction Program Counter Memory Address Memory Buffer
Register Register Register
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
39. The control unit usually issues an instruction or command. The register which is used to the
Instruction is called ________.
Memory Address Instruction Set Instruction Instruction Cycle
Register Register
40. When CPU wants to store some data in the memory or reads the data from the memory, it places the
address of the requried memory location in ___________.
Memory Loction Memory Buffer Memory Address Memory State
Register Register Register Register
41. The uses the _________ register to store the data coming from or going to the main memory.
Memory Buffer Memory Data Program Counter Both A and B
Register Register
42. The register that is used for storing Arithmetic and data operations is called___________.
General Purpose Memory Data Segment Register Accumulator
Register Register Register
43. The register that is used to count the cycle of loop and is used for the counting purposes is called
___________.
Program Counter Automatic Counter Counter Register Address Register
44. The software that is designed for a particular customer is called _____________.
Packaged Software Customized Specific Software Pirated Software
Software
45. Package Software is also called ____________ software.
On the Shelf Off the Shelf Up the Shelf Down the Shelf
46. The set of programs running in background on a computer system and providing an environment in
which other prgrams can be executed and the computer system can be used efficiently is called
__________.
Device Drivers Application Utility Programs Operating System
Softwares
47. The __________ provide programs to manage the hardware resources of the computer like Disks,
Memory and CPU.
Device Drivers Operating System Application Packaged Software
Software
48. The register which points to the next fetched instruction to be executed is called __________.
Instruction Pointer Program Counter Stack Pointer Both A and B
Register
49. Stack Pointer register is used to the ___________ in a Fist In Last Out Structure.
Instructions Address of Operand Operator
Instructions
50. The ____________ provides icons, menus and list to perform different tasks on computer visually.
CLI GUI Both A and B None of above
STEM INSTITUTE OF ENTRY TEST PREPARATION
JAUHARABAD CAMPUS
51. GUI is an abbrevation of _________.
Graphical User Graphical Graphical User Graph Under
Intermediate Unidentified Interface Interface
Interface
52. The program must be placed in __________ before a processor executes it.
ROM RAM Main Memory Both B and C
53. The process of placing a program into the main memory before execution is termed as __________.
Loading Executing Input Storing
54. The Softwares that are used to convert the programs written in some high level language into
machine code are called __________.
Language Converters Shifters Custom Softwares
Translators
55. The software that converts program written in some high level language as a whole is called
___________.
Compiler Interpreter Assember None of above
56. The software that converts the program written in Assembly Language into Machine code is called
__________.
Compiler Interpreter Assember Translator
57. The Instruction or Program Code before compilation is called _________ and after is called
__________.
Source Code, Software Code, Source Code, Off Source Code,
Software Code Oriented Code the Shelf Code Object Code
58. BIOS stands for ____________.
Basic Input Output Basic Indirect Basic Input Output Basic Indirect
Software Output Software System Oriented System
59. The program that contain an instructions to operate a device is called ___________.
Operating System Off the Shelf Device Drivers Utility Programs
Software
60. Which one of the following is much faster?
RAM Cache Hard Disk USB
61. The software that converts the program written in some high level language in to machine code line
by line is called___________.
Compiler Interpreter Assember Processor