Basic MCQs of Computer Science (IT) for NTS and PSC Test
. Mostly which of the following device is used to carry user files?
A. Floppy Disk B. Hard Disk
C. RAM D. CDROM
Answer: A
2. Which device is used to backup the data?
A. Floppy Disk B. Tape
C. Network Drive. D. All of the above
Answer: D
3. In order to play and hear sound on a computer, one needs:
A. a sound card and speakers B. a microphone
C. all of them required D. none of them required
Answer: A
4. Which of the following are the cheapest memory devices in terms of Cost/Bit?
A. Semiconductor memories B. Magnetic Disks
C. Compact Disks D. Magnetic Tapes
Answer: C
5. Which of the following are the best units of data on an external storage device?
A. Bits B. Bytes
C. Hertz D. Clock cycles
Answer: B
…show more content…
2 B. 10
C. 16 D. 32
Answer: A
16. Which number system is usually followed in a typical 32-bit computer?
A. Binary B. Decimal
C. Hexadecimal D. Octal
Answer: A
17. Which of the following is not an output device?
A. Scanner B. Printer
C. Flat Screen D. Touch Screen
Answer: D
18. Which of the following devices have a limitation that we can only store information to it but cannot erase or modify it?
A. Floppy Disk B. Hard Disk
C. Tape Drive D. CDROM
Answer: D
19. Which technology is used in Compact disks?
A. Mechanical B. Electrical
C. Electro Magnetic D. Laser
Answer: D
20. Which of the following storage devices can store maximum amount of data?
A. Floppy Disk B. Hard Disk
C. Compact Disk D. Magneto Optic Disk
Answer: B
21. Which of the following is the largest manufacturer of Hard Disk Drives?
A. IBM B. Seagate
C. Microsoft D. 3M
Answer: B
22. The programs which are as permanent as hardware and stored in ROM is known as
A. Hardware B. Software
C. Firmware D. ROM ware
Answer: C
23. Memory unit is one part of
A. Input device B. Control unit
C. Output device D. Central Processing Unit
Answer: D
24.Who built the first Mechanical Calculator
A. Joseph Marie Jacquard B. John Mauchly
C. Blaise Pascal D. Howard Aiken
Answer:
We are following it closely. The Connector insert cavity dimensional nonconformance which violates Mil-Standard interchangeability requirements. Part numbers GHN20076-447, GHN20076-452 and GHN20076-523; total quantity of 557 shipped between, 4/2015 to 8/2015. That were made Nogales, Mexico. It was also reveal from C-130 Design acknowledging that a total of 15 out of the potential 17 D38999 part numbers are used on C-130 builds.
31. Which level of RAID refers to disk mirroring with block striping? a) RAID level 1 b) RAID level 2 c) RAID level 0 d) RAID level 3 Answer: a 32. A unit of storage that can store one or more records in a hash file organization is denoted as a)
a). Based on the observation, we assume that the distance between two stations is 0.375 KM Mean time to send = propogation time + transmission time = 375m. + 1000bits 200 x 106 m/sec. 10 000 000 bps. = 102 μsec. b).
____ What is the average amount of money spent on books among our NJ customers? $____ What is the average amount of money spent on nonbooks among our NJ customers $____ What is the type of book most likely to be bought by our NJ customers?
PS/2 Ports are starting to be replaced with USB Ports which are more upto date, and able to be used for multiple types of devices and not just mouse and keyboard. 1.8 Internal Memory 1.8.1 RAM (Random Access Memory) Random access memory (RAM) is the memory in a computer that is used to store computer programs while they are running as well as any other information the programs need to do their job.
5.06 Assignment 1. Describe events that explain the border differences between these maps. Use information from the maps and the lesson in your response. Use complete sentences.
Components Computers have one or a lot of big or small R-A-M chips inside. RAM chips are a random access memory chip inside, the computer uses it to store information that will be used anytime or used to store something like the copy clipboard(The copy clipboard is the thing that stores what you copy to paste later) to delete/change later. There is also a spinning or solid state hard drive that uses DVD like disks that stores information like your video games, pictures, or other things. A CPU is the thing that your computer uses to do all the processing work, like our brain but not like it. CPU stands central-processing-unit.
Good Evening Ms. Seed, I am working on the 2.03 assignment. I am having some difficulties and was wondering if you would be able to help me. I choose the Federalist side and only have my introduction completed. I am having some difficulties explaining the two sides. If yuo could please help me so that I could move on with the rest of the needed compleed assignements.
Benjamin Crowley Champlain College CMIT-135-45 Week 4: Assignment 4 #18 When keeping in mind that MIPS stands for Million Instruction Per Second, 500 MIPS comes out to 500 million instructions per second. Since the question states that 56,000 bits over a second the transfer time would be 1/56000. 500,000,000*1/56,000= 8928 instructions per bit
1. Network and trust are availed to everyone-There is the allowance to edit, share, reuse… of data. Content sourcing-Users are motivated and encouraged to update data; the better it gets. Trust-Workers and clients can gain access and use web tools on their own.
Kernel Structure (Windows) What is a kernel? Basically kernel is a computer program which manages input and output requests from the S/W, and then translates them into data processing instructions for the central process unit (CPU) and other electronic components of a PC. Application Kernel CPU Memory Devices Actually the kernel is the heart of an operating system. The task of this software is to run the programs and provide secure access to the computer’s hardware.
Describe different types of business documents that may be produced and the format to be followed for each. There are many different types of business documents that are used daily in business environments, for example; Emails- The fastest way to send documents and information and follow the format of recipient and subject. Spreadsheets- These are used to store information electronically.
is in one place which is the file server. These machines still have a monitor, motherboard, network card, keyboard and mouse. It loads up the operating system from the network instead of a hard drive. Use of backup The backup is when we take a copy of files or system to store it.
The following section will consider advantages and limitation of the first two mentioned types of digital forensics: Traditional (dead) and Live computer forensics. TRADITIONAL (DEAD) VS LIVE DIGITAL FORENSICS Traditional (Dead) Forensics In order forensic acquisition to be more reliable it must be performed on computers that have been powered off. This type of forensics is known as ‘traditional’ or 'dead ' forensic acquisition. The whole process of dead acquisition, including search and seizure flowchart and acquisition of digital evidence flowchart is shown on Figure 2 and Figure 3 respectively.