How To Exam?

a knowledge trading engine...


Tamil Nadu Open University (TNOU) 2006 Certification CIC The Technology - Question Paper

Sunday, 07 July 2013 08:15Web


The Technology

2202    CIC-2

CERTIFICATE PROGRAMME IN COMPUTING JANUARY 2006. Term-End Examination

THE TECHNOLOGY Time : 2 hours    Maximum marks : 100

Note :

(i)    Do not start answering until the invigilator asks you to start.

(ii)    Question paper contains 100 questions. Student is required to answer all the questions. There is no choice.

(iii)    All questions carry equal marks.

(iv)    Each question must be given one answer only. If more than one answer is given, zero mark will be awarded for that question.

A. Multiple Choice (Question Numbers 1 to 30)

Note: Four choices are given for a question, out of which one choice may be correct. Mark correct answer in relevant box of the answer sheet given to you.

1,    The basic function performed by a computer is

(a)    The execution of a program

(b)    For mass storage

(c)    Used for data collection

(d)    None of the above.

2.    The full form of IT is

(a) Industrial Trade    (b) Information Technology

3.    Valves are used in

(a)    First Generation Computer    

(b)    Second Generation Computer

(c)    Third Generation Computer

(d)    None of the above.

4.    2 Bites equal to

(a) 1 Nibble    (b) 2 Nibble

(c) 3 Nibble    (d) None of the above.

5.    Cray XMP-14 is used by

(a)    Meteorological department

i

(b)    Textile department

(c)    Microbiology department

(d)    All of the above.

6.    Which of the following is not hardware?

(a) Magnetic tape    (b) Hard disk

(c) VDU Terminal    (d) Assembler.

7.    Access mode of Magnetic tape is

(a)    Direct Access

(b)    Sequential Access

(c)    Random Access,

(d)    None of the above.

8.    Which of the following is an example of a volatile memory?

(a) RAM    (b) ROM

b. me iaea OI automatic computing was me nrst attempt Dy (a) Charles Babbage    (b) Blaise Pascal

(c) Von Neumann    (d) All of the above.

10.    The dynamic memory stores information as long as

(a)    Power is not supplied to memory

(b)    Power is supplied to memory

(c)    Power is supplied and the memory is refreshed continuously

(d)    Tape controller is in working condition.

11.    The widely used code in data communication is (a) 8 bit ASCII    (b) 7 bit ASCII

(c) EBCDIC    (d) None of the above.

12.    Which of the following is associated with optics?

(a) CD-ROM    (b) Winchester disk

(c) RAM    (d) None of the above.

13.    Error reports are an example of

(a) Scheduled reports    (b) Ondemand reports

(c) Exception reports    (d) External reports.

14.    The speed unit of Line Printer is

(a) CPS    (b) LPM

(a)    System Software, Application Software

(b)    DBMS Software, RDBMS Software

(c)    OS, Utilities

(d)    None of the above.

16.    A smart modem can dial, hang up and answer incoming calls automatically. Can you tell who provides the appropriate instruction to the modem for this purpose?

(a)    Communication software

(b)    Error detecting protocols

(c)    Link access procedure

(d)    ' Telecommunications.

17.    Computer allows - different characters to be

represented uniquely

(a) 214    (b) 28

(c) 22    (d) 210.

18.    One way working is

(a) Simplex mode    (b) Half duplex

(c) Full duplex    (d) None of above,

19.    A talking terminal is associated with

(a)    Artificial intelligence

(b)    Networking

(c)    Fourth generation computer

(d)    Electronic mailing.    .

20.    EDI stands for

t (a) Electronic Data Interchange

(b)    Electronic Development Integration

(c)    Electronic Double integration

(d)    None of above.

21.    What is the name given to the molecular sale computer?

(a)    Super computer

(b)    Nano computer

(c)    Femno computer

(d)    Microcomputer.

22.    Railway Reservation System is

(a)    Multi-user operating system

(b)    Multitasking operating system

(c)    Time sharing operating system

(d)    None of above.

23.    - are the programs that claim to do something

but do something completely different and damage the computer system

(a) Virus    (b) Worms

(c) Trojans    (d) Either (a) or (b).

24. Which one of the following virus attacks the executable files?

(a)    Friday the 13th

(b)    Lehigh Virus

(c)    Scores Virus

(d)    All of the above.

25.    Antivirus Scanner are used to

(a)    Detect out the virus    A

(b)    Clean the virus

(c)    Both (a) and (b)

(d)    None of the above.

26.    The idea of self replicating program is developed by

(a)    John Neumann

(b)    Pascal

(c)    Aristotle

(d)    None of the above.

27.    The term "computer security" in cipher system would be

(a)    FRPSXWHU VHFXULWB

(b)    FFXSWRUH VHPBULBW

(c)    PXFBRSTM ZHOFWRMP

(d)    None of the above.

28.    RSA is an approach to

(a) Decoding    (b) Decryption

(c) Encryption    (d) None of the above.

29.    A scanff ) statement in C language

(a) A function    (b) A subroutine

(c) A library function    (d) None of the above.

30.    Which among the following is not a pointing device?

(a) Mouse    (b) Track ball

B. State whether True or False (Question Numbers 31 to 100)

Note: In the following 70 questions, write True, if the statement given is true and write False if the statement given is false.

31.    By distributing FAT, we can loss our program files only.

32.    FROM is an example of a volatile memory.

33.    Demultiplexer is used for parallel to serial conversion.

34.    Present day computers are based on Hybrid technology.

35.    C is the mid level language.

36.    Machine language is called Low Level Language.

37.    Interpreter translate the program Line by line.

38.    DATACOMM stands for Data Commerce.

39.    TCP/IP is a protocol.

40.    Two modems are required when analog signal facility is used between two digital devices.

41.    Vector processing are used in weather forecasting.

42.    MIMD stand Multiple Instruction Multiple Data.

43.    Pipelining and simple decoding are key to RISC.

44.    RISC management is used to make decisions regarding the costs of protecting against possible events endangering the organization.

45.    A hard disk becomes totally inaccessible when a computer virus corrupts its route directory.

*

46.    Control unit is often called the Nerve Center of a digital computer.

47.    Size of the word is independent of the architecture of the computer.

48.    Data buffering is helpful for smoothing out the speed difference between CPU and input/output devices.

49.    Novell Netware is LAN- Software.

50.    4Ul generation languages are dependent on databases they are using.    ,

51.    In Excel, we can create graph by using data in sheet.

52.    In MS-Excel, the extension of worksheet is XLS,

53.    User may interact with operating system directly by means of operating system commands.

54.    In distributed operating system the files of a user are kept on known machine.

55.    The main advantage of multiprogramming is to support multiple user at a time.

56.    A good graphics editor can move a diagram.

57.    We cannot increase the worksheet in MS-Excel.

58.    Microwave transmission are classified as voicegraded channels.

......-.q- Uj \jtnw wjuio 10 ingu wsi, iui iea.auiitiDit3 level 01

sophistication.

60.    The use of a leased line requires the user to dial the computer system to be used during processing.

61.    CPU can read information directly from second memory.

62.    Lan Access Method are CSMA/CD and Toke Passing.

63.    Star, bus and ring topology are used in LAN networking.

64.    The MSWORD is used for doing word-processing work.

65.    MS-DOS is a LAN software.

66.    Bridges are used for two identical LAN using same protocol.

67.    Networking is used in one building is Internet.

68.    Synchronous and Asynchronous are two data communication modes.

69.    A network consists of interconnected microwaves.

70.    Sharing of executable files in LAN is not possible.

71.    Password is a characteristic of security.

72.    Digital signal may take on only a discrete set of values with in a given range.

73.    The main servers which are used in networking is Printer Server.

w    v v i awu v** vuv AibbiTUiifc bUii tjl 1 inini.m nrt Ij*-! WiLll UCVlL'Utt UU

another network via a Gateway.

75.    In full-duplex mode, the communication channel is used in both directions at the same time.

76.    Radio is an example of Simplex mode.

77.    Modems are used to convert signal from analog to digital and from digital to analog.

78.    Radio, Microwave and satellite channels use electromagnetic propagation in open space.

79.    Subscriber can use switched line.

80.    In a PC to telephone hookup for long distance communication, modem is connected between the telephone line and PC.

81.    Email is the inter-organizational exchange of business documentation in structured, machineprocessable form.

82.    BITNET was established to exchange information between universities.

83.    The objectives of NICNET is to help government in better planning administration.

84.    The virus are classified as Boot Infectors, System Infectors, Gen. Executable Program Infectors.

85.    The viruses are come in computer by Floppy, Internet etc.

86.    TVPO virus affect EXE and COM files only.

87.    Smart DOG, Dr. Soloman, McAfee etc. are Virus scanners.

88.    Hyderabad is a cyber city of India in IT field.

89.    DieHard2 virus comes in computer through air.

90.    Cryptology is defined as "The design and analysis of codes and ciphers".

91.    Datagram takes a fixed logical path through network in packet switching method.

92.    Authentication process verifies that a person or object is who he, she or it claims to be.

93.    The WORD ART is the feature of MSWord.

94.    The Microsoft Corporation is the company of America.

95.    The processing capability of a microcomputer can be enhanced with the help of Buffer Memory.

96.    Oracle and ingres have query optimizer.

97.    A list of instructions given to a computer for solving a given problem is classified as programmer.

98.    Fiber optic cable carries signals in the form of fluctuating light in a glass or plastic fibre.

99.    OOP stands for Obje.ct Oriented Progamming.

100.    Cache memory has the shortest access time.

11    2202







Attachment:

( 0 Votes )

Add comment


Security code
Refresh

Earning:   Approval pending.
You are here: PAPER Tamil Nadu Open University (TNOU) 2006 Certification CIC The Technology - Question Paper