The LSB of binary number 10111 has a weight of
1
2
2*2
2*2*2
Real number are represented in memory by exponent &mantissa
2"s compliment
1"s compliment
sign & magnitude
Expansion of ASCII is
American Standard Code For information interchange
American Standard Code for internet information
American source code for information interchange
none of these
Unicode provides capacity to encode
all charactors in all languages
latin only
english
ASCII
2's compliment of a binary number is calculated by
adding 1 to 1"s compliment
adding 1 to mantissa
multiplying by -1
adding 1 to exponent
Integer can be represented in binary by
Sign & magnitude
1s compliment
2s compliment
All of these
Total number which can be represented by 1's compliment
2^(n-1)
2^(n+2)
2^n
2n-1
Pick out the odd one
Validity
Storage
Input of data
Output of data
In sign & magnitude method 0 stands in MSB for
+ve number
-ve number
integer
real number
ASCII code is --------bit code
7 bit
7 MB
7GB
7byte
2's compliment of 0 is
0
1
2
-1
To calculate 1's compliment of a binary number replace
0 to 1&1to 0
1 to 2& 2 to 1
0 to 2 & 2 to 1
none of these
addition of binary number 1+1=
0
2
-1
101
In substraction of binary number 0-1=
1
010
-1
0
Nowadays which type of data processing is used
Commercial
Industrial
Electronic
scientific
Number system used nowadays is
Decimal
Octal
Hexa decimal
Binary
Which is 1's compliment of 0111
1000
1111
1100
0001
The most widely used alpha numeric code is
ASCII
ASCI
Unicode
none of these
Some More Computer GK for Govt Jobs
1. In a memory, the minimum time delay between the initiation of successive memory operations is : cycle time
2. The first Operating System used in Microprocessor based system was : CP/M
3. The Boolean expression A(B+C)+AB+AC is independent of the Boolean variable : B
4. A byte addressable computer has memory capacity of 4096 KB and can perform 64 operations. An instruction involving 3 memory operands and one operator needs :
72 bits
5. Which addressing mode used in an instruction of the form ADD X, Y : Absolute
6. The addressing mode used in the stack related instruction PUSH B is : Register indirect
7. Parallel printers use : Centronics interface
8. An assembler that runs on one machine, but generating code for another machine is called : Cross assembler
9. A computer with a 32 bit wide data bus implements its memory using 8 K x 8 static RAM chips. The smallest memory that this computer can have is : 32 KB
10. To construct a binary Mod-N counter, the number of flip-flops needs is : Log2N
11. The total number of possible ordered trees using 3 nodes A,B,C is : 12
12. The binary search algorithm is of order : log n
13. The minimum number of edges in a connected cyclic graph on N vertices is : N
14. The execution time of a recursive algorithm is given as ; T(n)=c+T(n-1), if n>1 =d, if n≤1. The order of the algorithm is : n
15. Assuming 2 sorted lists of sizes ‘S1 ’ and ‘S2’, the worst case number of comparisons needed by the merge sort algorithm is : S1+S2 -1
16. If an M x N matrix is stored in column major form, the index calculation required to access the (i, j)th entry is : M .(j-1)+i
17. Four different algorithms L1, L2, L3 and L4 with orders of log(n), log{log(n)}, n log(n) and n/log(n) respectively have been proposed to solve a specified problem.
Which of these is the best one : L2
18. The principle of locality of reference is cited to justify the usage of : Cache memory
19. On a particular system, using Quick sort, if it takes 100 msec to sort 1000 records, time taken to sort 100 records will be : 6.7msec
20. In traversing a tree using Breadth First Search, the data structure used is : Queue
21. In a data base, the column of a table is referred to as the : Attribute
22. The part of a program which accesses a shared resource and which should be executed indivisibly is called : Critical section
23. In a database design, if every non-key attribute is functionally dependent on the primary key, then the relation will be in : Third normal form
24. An attribute of one table matching the primary key of another table is known as : Foreign Key
25. Given the functional dependencies X →Y; Y→Z; X →W and Z →AB, which of the following does not hold good : W → Z
26. SQL stands for ------------ Query Language : Structured
27. In SQL databases, the memory area used for internal processing is called : Cursor
28. The number of relationships in which an entity can appear in an E-R diagram is called its : Cardinality
29. The process of analyzing, archived data to obtain tactical and strategic information is often called : Data mining
30. If a relation is in Boyce-Codd normal form, then it is also in : 3rd Normal form
31. RAID is a standard used in the design of : Disk Memory
32. In an OS, the process of buffering data intended for a peripheral device, onto a disk area, for later bulk transfer is known as : Spooling
33. Kernel in Operating System is : A set of primitive functions upon which OS functions are built.
34. Which of the following scheduling policy is most suited for a time sharing OS : Round Robin
35. For real time OS, which of the following is the most suitable scheduling scheme : Preemptive
36. In a paged memory, access times of primary and secondary memories are 10ns and 100ns respectively. If the average access time is 23.5 nsec, hit ratio is : .85
37. The size of the virtual memory depends on the size of : Address bus
38. Three processes A, B, C have peak time demands of 3, 4, 6 resource units respectively of a particular type. What is the minimum number of resources to be provided
to ensure that deadlock never occurs : 11
39. A computer has 8 MB in main memory, 128 KB cache with block size of 4KB. If direct mapping scheme is used, how many different main memory blocks can map into
a given physical cache block : 64
40. The technique that allows only one user to work with a file at a particular time is called : Locking
41. The UNIX operating system was first installed in : PDP/7
42. MS-DOS makes use of a hardware ROM containing device drivers called : BIOS
43. In UNIX, which of the following system calls transform an executable binary file into a process : Exec
44. Berkeley UNIX is popularly known as : BSD Unix
45. In UNIX, ‘grep’ program is used for implementing : Filters
46. TSR software refers to : Terminate and Stay Resident
47. Unix and MS-DOS file system differ in the following feature : Mounted file systems
48. In DOS, file allocation is carried out using : FAT
49. In UNIX ‘link’ refers to : New directory entry pointing to an existing file
50. For implementing recursion in a programming language, its compiler uses the following data structure extensively : Stack
51. In a hypothetical language, assume that all arithmetic operators have equal precedence and associate to the left. The expression 6x3-2-1x2 evaluates to : 18
52. Which of the following instructions is redundant (can be implemented by other conventional ones) : Clear x
53. BNF is a meta language for : Specifying a context free grammar
54. In JAVA language, what will be result of evaluating the expression 25 & 13 : 9
55. In JAVA , after execution of the following statements, the values of x, m, and n will be :
int x, m, n;
m=10;
n=15;
x=++m +n++; : x=26, m=11,n=16
56. What will be the output of the following JAVA code :
byte x=64, y;
y=(byte)(x<<2);
system.out.println(y); : 0
57. Hot Java is a : Web browser
58. Which of the following typecasts result in loss of information : float to int
59. JAVA toolkit package containing classes that implement platform independent GUI is : AWT
60. The JAVA language was originally called : OAK
61. A program Graph has ‘start’ and ‘end’ nodes. The total number of paths from start to end is equivalent to the -----------set of test data required to test the software
: minimum
62. In a Program Graph, ‘X’ is an if-then-else node. If the number of paths from start node to X is ‘p’ number of paths from if part to end node is ‘q’ and from else part
to end node is ’r’, the total number of possible paths through X is : P(q+r)
63. The quality of a software which causes it to continue to operate despite application of invalid input is called : Robustness
64. A program P calls 2 subprograms P1 and P2. If P1 can fail 50% of the times and P2, 40% of the times, P can fail -----------of the times : 70%
65. Consider a Program Graph (PG) with statements as nodes and control as edges. Which of the following is not true for any PG : Always acyclic
66. In program design, if the number of conditions in a decision table is ‘n’, the maximum number of rules(columns) possible is : 2n
67. In Data Flow Diagrams(DFD), the procedure of expanding a process in the DFD into a set of equivalent smaller processes is called : levelling
68. In programming languages, literal means : String Constant
69. In Object Oriented Software Design, which of the following is not true : An object can belong to 2 classes
70. Consider the program segment comprising of 3 statements :
y=x+y;
x=y-x
y=y-x where x and y are integers. Execution of these 3 statements do the following : Swap the contents of x and y
71. What will be the output of execution of the following statements in C :
for (i=3;i<15;i+=3)
{printf(“% d”, i);
++i;
} : 3 7 11
72. In C, puts (arg V[0]; prints the : File name of executable code file
73. Who is credited with the creation of WWW : Tim Berners-Lee
74. Which of the following is not a web browser : HTML
75. MIME is associated with the following : E mail
76. The mode of communication in which transmission can be bidirectional. But in only one direction at a time is called : Half Duplex
77. Error detection at the data link layer is achieved using : CRC codes
78. In Serial communication, start and stop bits are used for : Synchronization
79. In a transmitter, the unmodulated signal is known as : Baseband signal
80. In a computer network, routing issues are handled in : Network Layer
81. In a computer network, functions of dialog management and synchronization are taken care of in the : Session’s layer
82. Which of the following topologies has the highest reliability : Mesh
83. In data communications, bauds signify ---------- rate : Signaling
84. ADSL is abbreviation for : Asymmetric Digital Subscriber Line
85. The topmost layer in the ISO model that needs to be implemented in an intermediate node is the -----------layer : Network
86. VPN denotes a : Virtual Private Network
87. Data rate of a ring network is 20Mbps and signal propagates at 200m/µsec. The number of bits that can be placed on the channel of length 200km is : 20000bits
88. The frequency range over which coaxial cables are typically used is : 106 to 108 Hz
89. In internet, the well known port 21 refers to the application : FTP
90. The maximum data rate possible through a noise free 4 kHz binary channel is : 8000 bps
91. The transparency provided in a distributed system where users cannot tell how many copies of a resource exist is termed as : Replication transparency
92. Which of the following configurations can be said to be tightly coupled : Shared memory multiprocessors
93. In distributed systems, RPC stands for : Remote Procedure Call
94. Assume there are 4 file servers each with a 0.95 chance of being up at any instant. Probability of at least one being available is : 1-(.05)4
95. Which of the following category of classification of multiple computer systems is not generally used in practice : MISD
96. In a distributed system, to ensure that concurrent transactions do not interfere with each other, the transactions must have the following specific property :
Serializability
97. Translation Lookaside Buffer(TLB) is also called : Associative Memory
98. In Internet Standards Terminology, RFC refers to : Request For Comments
99. Which of the following denotes a network management protocol in an internet : SNMP
100. IEEE 802.11 is an IEEE standard for : Wireless LAN
Computer Science Questions Asked in SSC Data Entry Operator Exam
1. The banks use ................ device to minimize conversion process.
(a) Keyboard
(b) MICR
(c) OCR
(d) Scanner
2. .................. can't be used for source of data automation.
(a) POS terminal
(b) OCR
(c) Keyboard
(d) UPC
3. Under which case will intranet be an effective networking tool?
(a) In a distributed decision-making environment
(b) Where heterogeneous applications are involved
(c) In a centralised organization
(d) In a decentralised organization
4. When an organization gives contract for development of software, it has to give data to the service provider. In Such cases, the ownership of data should be_________
(a) Transferred to the service provider
(b) With the client/organization that outsource services
(c) Shared by both parties
(d) Not transferred
5. A modem performs_________
(a) Modulation
(b) Demodulation
(c) Data compression
(d) All of these
6. Which of the following is NOT done by modem?
(a) Transmission Speed
(b) Data Accuracy
(b) Error detection and Correction
(d) Data Compression
7. A program coded in programming language is____________.
(a) Target code
(b) Source code
(c) Block
(d) None of these
8. "Platform" in computer world means___________.
(a) Computer hardware used
(b) Operating Systems used
(c) Both of these
(d) None of these
9. Which of these biometric tools use thermal sensors along with infrared rays for identification?
(a) Key stroke dynamics
(b) Iris Retinal scans
(c) Speech recognition
(d)Fingerprint scanning
10. What is incorrect about software?
(a) It can manipulate computer
(b) It has programs, instructions
(c) It can be touched
(d) It can be touched
11. Disadvantage of distributed database is.
(a) Unreliability
(b) Easy implementation
(c) Insecurity
(d) High communication cost
12. Which of the following transmission techniques let computer to alternatively send and receive data?
(a) Simplex
(b) Half duplex
(c) Full duplex
(d) Multiplexing
13. What is NOT a feature of networking?
(a) Reliability
(b) Greater storage space
(c) Connectivity
(d) All are features of networking
14. Taking back-up of a file against crash is a
(a) Preventive measure
(b) Curative measure
(c) Decisive measure
(d) None of these
15. A memory that is referred by its contents instead of physical address is called ________
(a) Associative memory
(b) Content addressable storage
(c) Both (a) and (b)
(d) None of these
16. Most dangerous risk in leaking of information is :
(a) Ready access to online terminals
(b) Online processing of data
(c) Ignorance about the existence of risk
(d) All of these
17. A camera is an
(a) Input device
(b) Can be either input or output
(c) Processing machine
(b) Output device
18. Using anti-virus software is
(a) Preventive measure
(b) Detective measure
(c) Corrective measure
(d) All the above
19. An online transaction is
(a) One that is done in real time
(b) Transaction done via internet
(c) One that is done via telephone
(d) None of these
20. A clerk in a bank has to access data n customer account. Logical access control for these users would be.
(a) Use of individual passwords
(b) Use of an Accounts Receivable Section password
(c) Use of individual passwords plus separate access passwords for customer data and product data
(d) Can't say
21. To stop unauthorized access to the computer system we should
(a) Have a trustworthy system administrator
(b) Have a good passwords policy
(c) Have a sound encryption policy
(d) All of the above
22. Which cannot assure data accuracy in an application?
(a) Limit and reasonableness test
(b) Echo checking
(c) Control total
(d) None of these
23. Maximum storage space is available on
(a) CDs
(b) ROM
(c) Hard disks
(d) Floppies
24. Jon Von Neumann developed:
(a) First electronic chip flip flop
(b) Stored-program concept
(c) The first electronic computer
(d) None of these
25. Which of the following is single user computer with many features and good processing power?
(a) Minicomputer
(b) Workstation
(c) Macintosh
(d) None of these
PSC Solved Paper.
1. _________ is a powder used in laser printers to form the images on a paper.
Toner
2. Worms and Trojan Horses are examples of:
Malware
3. ___________ Printers work by selectively heating regions of special heat-sensitive paper.
Thermal
4.The ISI mark is given by:
BIS
5. The laser printer was invented at:
Xerox
7. A flaw in a system whereby the output is unexpectedly dependent on the sequence or timing of other events is called a:
Race condition
8. A 56k modem can transfer data at up to bits per second over the phone line.
56000
9. The original implementation of the C programming language was standardized by :
ANSI
10. ________Is a signaling method that handles a relatively wide range of frequencies.
Broadband
11. The port number used by SMTP is:
25
13. A packet filter is a type of
Firewall
15. Which among the following utilities can detect a bad sector?
CHKDSK and SCANDISK
16. In 100BASE-T, 'T' stands for:
Twisted pair
17. A head crash is said to occur when the read-write head of a hard disk drive:
Touches the magnetic media
18. Category 5 cable includes ---twisted pairs in a single cable jacket.
4
19. The port number used by the HTTP protocol is
80
20. In PowerPoint presentations, individual pages are called:
Slides
21. Power-on-self-test is built into the:
BIOS
22. PowerPoint can embed content from other applications through:
OLE
23. The latest release of Microsoft Windows is called:
Vista
24. GRUB is an:
Boot loader
25. __________Is a family of programmable interrupt controller chips.
8259
26.card allows television signals to be received by a computer.
TV tuner
27. ________Is an IEEE 1394 implementation.
Fire Wire
28 'Windows protection error' messages may result from:
Damage to the system registry
29 Sound Blaster line of audio cards were made by :
Creative Technology Ltd.
31 Indiscriminate sending of unsolicited bulk messages is known as :
Spamming
32 The 'blue screen of death' may occur due to:
All the above
33 FAT manages files in contiguous groups of sectors called:
Clusters
34 The utility which can be used to clean the windows registry is:
regedit
36. Ultra Wide SCSI had a throughput of: (A) 10 MB/s
40 MB/s
37. A dual-core processor has L1 cache.
2
40. Port 110 is used by _______
POP3
41. A file extension .ogg indicates an ______format
Audio codec
42. Kerberos ts a__________protocol.
Network authentication
43. Athlon series of processors are made by:
AMD
44. Which among the following is a real-time operating system?
QNX
45. The internet top level domain .cn refers to :
China
47. _____________ Is a protocol used by networked computers (clients) to obtain IP addresses and other parameters from a server.
DHCP
48. is the brand name for 64-bit Intel microprocessors with IA-64 architecture.
Itanium
49. is an organization which develops internet standards through RFCs.
IETF
50. The ability to replace components of a computer, while it is operating, is called:
Hot swapping
E&OE
1. All of the following are examples of real security and privacy risks EXCEPT:
a) hackers
b) Spam*
c) Viruses
d) Identity theft
Answer 1:
Spam is the use of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, social networking spam, television advertising and file sharing network spam.
2. A process known as ____________ is used by large retailers to study trends.
a) data mining*
b) data selection
c) POS
d) Data conversion
Answer 2:
Data mining, a branch of computer science and artificial intelligence, is the process of extracting patterns from data. Data mining is seen as an increasingly important tool by modern business to transform data into business intelligence giving an informational advantage. It is currently used in a wide range of profiling practices, such as marketing, surveillance, fraud detection, and scientific discovery
3. ________ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
a) Data Card Reader
b) Point-of-sale (POS)*
c) Sales inventory
d) Magnetic Swipe Reader
Answer 3:
Point-of-sale (POS) terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. Magnetic Swipe Reader: Reads the magnetic strip on the back of a credit or debit card. The information stored on the magnetic strip includes the credit card number, expiration date, customer name, and address. The information is transmitted to a credit card processing network through the point-of-sale system for payment of merchandise.
4. A(n) _______ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop.
a) BCS*
b) POS
c) Data retrieval
d) Data mining
Answer 4:
Bar Code Scanner: A laser type of device (gun style, counter style) that when triggered over a bar code, converts bar code lines into numbers. This number or SKU (Stock Keeping Unit) is then transmitted back to the POS computer for automatic price lookup
5. The ability to recover and read deleted or damaged files from a criminal computer is an example of a law enforcement speciality is called:
a) robotics
b) simulation
c) computer forensics*
d) animation
Answer 5:
Computer forensics is a branch of digital forensic science pertaining to legal evidence found in computers and digital storage media. The goal of computer forensics is to examine digital media in a forensically sound manner with the aim of preserving, recovering, analyzing and presenting facts and opinions about the information. Although it is most often associated with the investigation of a wide variety of computer crime, computer forensics may also be used in civil proceedings. The discipline involves similar techniques and principles to data recovery, but with additional guidelines and practices designed to create a legal audit trail.