Tuesday 18 November 2014

HPSSB Computer Operator 2013 Part-II

51.  To print the PowerPoint presentation, press
a)    Ctrl + T
b)    Ctrl + E
c)    Ctrl + S
d)    Ctrl + P
52.  What is a slide show ?
a)    A Movie show
b)    Overheads
c)    An electronic presentation
d)    Microsoft
53.  How can you see all your slides at once ?
a)    Through normal view
b)    Through slide view
c)    Through slide sorter view
d)    Through slide show
54.  What would I choose to create a pre-formatted style ?
a)    Slide sorter view
b)    Slide layout
c)    Format
d)    None of the above
55.  What is a slide transistor?
a)    Overheads
b)    Letters
c)    A special effect used to introduce a slide in a slide show
d)    The way one slide looks
56.  Console is
a)    A device that enables human operators to communicate with the computer.
b)    A device that enables human operators not to communicate with the computer.
c)    Communication between computers.
d)    None of these
57.  The speed at which date is transferred from the main memory to another medium on which data are recorded is referred as
a)    Byte
b)    Data transfer rate
c)    Buds
d)    None of these
58.  Document reader is
a)    An optical input device used to read documents.
b)    A device that arrange the documents
c)    A device that is used to edit document
d)    None of these
59.  A data communication facility on which data can be transmitted in two directions is refereed as
a)    Triplex
b)    Simplex
c)    Duplex
d)    None of these
60.  The personal computer are also referred as
a)    Desk top micros
b)    Advanced computers
c)    Palmtop computers
d)    All the above
61.  A semiconductor memory which allows the eraser of the information stored in it so that new information can be stored in it is referred as
a)    EPROM
b)    ROM
c)    RAM
d)    None of these
62.  A method of providing virtual memory
a)    Paging
b)    De-fragmentation
c)    Segmentation
d)    None of these
63.  Human beings are referred to as Homosapines, which device is called Sillico sapiens ?
a)    Monitor
b)    Hardware
c)    Robot
d)    Computer
64.  Cache memory is a
a)    Small buffer storage
b)    Permanent storage
c)    Main memory
d)    None of these
65.  Bubble memory is
a)    Volatile
b)    Non-volatile
c)    Permanent
d)    None of these
66.  Central processing unit is combination of
a)    Control and storage
b)    Control and output unit
c)    Arithmetic logic and input unit
d)    Arithmetic logic and control unit
67.  Binary circuit elements have
a)    One stable state
b)    Two stable state
c)    There stable state
d)    None of above
68.  A computer program that converts an entire program into machine language is called a/an
a)    Interpreter
b)    Simulator
c)    Commander
d)    Compiler
69.  Which of the following memories must be refreshed many times per seconds ?
a)    Static RAM
b)    Dynamic RAM
c)    EPROM
d)    ROM
70.  A digit computer did not score over an analog computer in terms of
a)    Speed
b)    Accuracy
c)    Cost
d)    Memory
71.  An error in software or hardware is called a bug. What is the alternative computer jargon for it ?
a)    Leech
b)    Squid
c)    Slug
d)    Glitch
72.   A method of implementing a memory management system is
a)    Buddy system
b)    Bridge ware
c)    Broadband coaxial system
d)    All of the above
73.  The octal equivalence of 111010 is
a)    81
b)    72
c)    71
d)    None of these
74.  Daisy wheel printer is a type of
a)    Matrix printer
b)    Impact printer
c)    Laser printer
d)    Manual printer
75.  What types of control pins are needed in a microprocessor to regulate traffic on the bus, in order to prevent tow device form trying to use it at the same time?
a)    BUS control
b)    Interrupts
c)    Bus arbitration
d)    status
76.  These hacker breaks security for altruistic or at least non-malicious reasons.
a)    White hat
b)    Grey hat
c)    Blue hat
d)    None of these
77.  Blue hat is
a)    Hacker breaks security for altruistic or at least non-malicious reasons.
b)    Hackers of ambiguous ethics and/or borderline legality, often frankly admitted.
c)    Someone outside computer security consulting firms the are used to bug test a system prior to its launch, looking for exploits so that can be closed.
d)    None of these.
78.  It is a tool used to quickly check computers on a network for known weaknesses.
a)    Security exploit
b)    Vulnerability scanner
c)    Packet sniffer
d)    Rootkit
79.  Word processors that is the part of windows operating system.
a)    Wordpad
b)    Notepad
c)    Adobe photoshop
d)    Jasc paint shop
80.  A situation where two or more processes coordinate their activities bases on a condition is refereed as
a)    Synchronization
b)    Dead lock
c)    Starvation
d)    Par begin
81.  The transfer time in disk scheduling is
a)    Proportional to rotation speed
b)    Inversely proportional to rotation speed
c)    Equal to rotation speed
d)    None of these
82.  Producer-consumer problem can be solved using
a)    Semaphores
b)    Event counters
c)    Monitors
d)    All of the above
83.  Object model is a
a)    Rule
b)    Process guidance
c)    System model
d)    Entity
84.  Validation plan describes
a)    Quality procedure
b)    Schedule procedure
c)    Management procedure
d)    None of these
85.  Which one is not structured design model ?
a)    Data flow model
b)    Entity relation model
c)    Object oriented model
d)    Debugging
86.  A computer program is a
a)    Software
b)    Hardware
c)    System
d)    None of these
87.  Use documentation define
a)    Computer program
b)    Computer system
c)    Use of computer system
d)    Structure of computer system
88.  COCOMO cost model
a)    It takes project product hardware and personnel attributes into account when formulating a cost estimate.
b)    In it server provides set of services and set of clients uses these services
c)    Extent to which standards are used to achieve interoperability
d)    None of these
89.  Fat-client model,
a)    It is a measure of number of function that calls some other function.
b)    It is measure of number of functions that are called by a function.
c)    In it server is only responsible for data management.
d)    None of these
90.  Binary search algorithm  cannot be applied to
a)    Sorted binary trees
b)    Sorted linear array
c)    Pointer array
d)    Sorted linked list
91.  The following name does not related to stacks
a)    FIFO lists
b)    LIFO lists
c)    Piles
d)    Push-down lists
92.  The following data structure is non-linear type :
a)    String
b)    Lists
c)    Stacks
d)    None of the above
93.  The following data structure store the non-homogeneous data elements :
a)    Arrays
b)    Records
c)    Pointers
d)    None of these
94.  In a heap tree values in a node is greater than
a)    Every value in left sub tree and smaller than right sub tree.
b)    Every value in children of it.
c)    Both of above conditions are true
d)    None of above condition is true.
95.  Adaptive system management is
a)    It uses machine-learning techniques. Here program can learn form past experience and adapt themselves to new situations.
b)    Computational procedure that takes some value as input and produces some value as output.
c)    Science of making machines performs tasks that would require intelligence when performed by humans.
d)    None of these.
96.  Black boxes
a)    This takes only two values. In general these values will be 0 and 1 and they can be coded as one bit.
b)    The natural environment of a certain species.
c)    System that can be used without knowledge of internal operations.
d)    None of these.
97.  Data mining is
a)    The actual discovery phase of a knowledge discovery process.
b)    The stage of selecting the right data for a KDD process.
c)    A subject-oriented integrated time-variant non-volatile collection of data in support of management.
d)    None of these
98.  Data warehouse is
a)    The actual discovery phase of a knowledge discovery process.
b)    The stage of selecting the right data for a KDD process.
c)    A subject-oriented integrated time-variant non-volatile collection of data in support of management
d)    None of these
99.  A result of computer virus cannot lead to _________
a)    Disk crash
b)    Mother board crash
c)    Corruption of program
d)    Deletion of files
100. Prolog is
a)    A programming language bases on logic.
b)    A computer where each processor has its own operating system, its own memory , and its own hard disk.
c)    Describes the structure of the content of a database.

d)    None of these.

No comments: