*

.

Computer (Data Structure) 2


Computer (Data Structure) 2

Q-1 Program development life cycle is divided in how many parts?

(a) 6                                                      (b) 5
(c) 4                                                      (d) 3

Q-2 Program design is called …………

(a) Top- design program                      (b) top- down program design
(c) Down- top program design            (d) none of these

Q-3 How many program design tools are described in program development life cycle?

(a) 7                                                     (b) 6
(c) 5                                                     (d) 4

Q-4 A step-by-step description of how to arrive at a solution is called--------------.

(a) Decision tables                              (b) Structure charts
(c) Flow charts                                    (d) Algorithm

Q-5 A special kind of table, which is divided in to four parts by a pair of horizontal& vertical lines are called-------.

(a) Decision tables                             (b) Structure charts
(c) Flow charts                                   (d) Algorithms

Q-6 A diagram that shows the logic of the program is called-------.
(a) Algorithm                                     (b) Flow charts
(c) Decision table                               (d) None of these

Q-7 ----------- is an another tools to describe the way to arrive at a solution.

(a) Coding table                                 (b) Testing and debugging
(c) Pseudo codes                                (d) Flow charts

Q-8 A finite set of steps defining the solution of a particular problem is called-----------?

(a) Data structure                                (b) Implementing the program
(c) Documenting                                 (d) Algorithm

Q-9 The format for the formal presentation of the algorithm Consists of
how many parts?

(a) 2                                                     (b) 3
(c) 4                                                     (d) 5

Q-10 The comments begin with a-------and the explain the purpose of the instruction.

(a) Single slashes                                 (b) Double slash
(c) ¹ Sign                                              (d) None of these

Q-11 The assignments statement will use the notation as-----------.

(a) Set A ¹2                                            (b) Max¹ai
(c) Set A=3                                            (d) Int ¹c’

Q-12 Data may be input & assigned to variable by means of a -------------statement.

(a) Write                                               (b) Open
(c) Save                                               (d) Read

Q-13 The algorithm is completed with the execution of the------------------.

(a) Last instruction                              (b) First instruction
(c) Middle instruction                         (d) Statement block

Q-14 Structured Programming constructs how many following type of programming constructs?

(a) 4                                                     (b) 3
(c) 2                                                     (d) 1

Q-15 The steps are executes one after other is called-----------------?

(a) Selection programming                  (b) Iterative programming
(c) Sequential programming                (d) None of these

Q-16 The structure which implement conditions and depending on the out Come of the conditions may select one of the alternatives is called?

(a) Double attentive                              (b) Single alternative
(c) Multiple alternative                         (d) If structure

Q-17 Selection programming constructs how many following types of Programming constructs?

(a) 3                                                     (b) 2
(c) 1                                                     (d) None of these

Q-18 Which of these following selections programming construct are used in programming construct?

(a) Single alternatives                         (b) Double alternative
(c) Multiple alternative                        (d) All the above

Q-19 The instructions that are executed repetitively constitute the body of the loop is called---------?

(a) Selection programming construct
(b) Iterative programming construct
(c) Multiple programming construct
(d) None of these

Q-20 Iterative programming constructs & falls in to how many following categories?

(a) 5                                                     (b) 4
(c) 3                                                     (d) 2

Q-21 Which of the following iterative programming construct used in Programming construct?

(a) For construct                                 (b) While construct
(c) Do- while construct                       (d) All the above

Q-22 The choice of particular algorithm depends on which of the following considerations?

(a) Programming requirements          (b) Memory requirements
(c) Performance requirements            (d) All of these

Q-23 The space needed to store the executable version of the program and is fixed is called--------?

(a) Instruction space                          (b) Date space
(c) Record space                                (d) None of these

Q-24 An algorithm is the amount of time it needs to run to completion is called----------?

(a) Time space trade-off                      (b) Time complexity
(c) Expressing space trade-off             (d) None of these

Q-25 A characterization scheme that allows to measure prosperities of algorithms such as performance and for memory in a general fashion is called-----------?

(a) Recursion                                     (b) Depth recursion
(c) Big Of Notation                            (d) Minmax problem


ANSWERS:-

1 (a) 6
2 (b) top- down program design
3 (c) 5
4 (d) Algorithm
5 (a) Decision tables
6 (b) Flow charts
7 (c) Pseudo codes
8 (d) Algorithm
9 (a) 2
10 (b) Double slash
11 (c) Set A=3
12 (d) Read
13 (a) Last instruction
14 (b) 3
15 (c) Sequential programming
16 (d) If structure
17 (a) 3
18 (d) All the above
19 (b) Iterative programming construct
20 (c) 3
21 (d) All the above
22 (d) All of these
23 (a) Instruction space
24 (b) Time complexity
25 (c) Big Of Notation

G.K. (Computer Fundamental) # 3

          G.K. (Computer Fundamental)

Q-1 The bank use……………. Device to minimize conversion process.

       (a) Keyboard                            (b) MICR
       (c) OCR                                   (d) Scanner

Q-2 ………………can’t be used for source of data automation.

        (a) POS terminal                      (b) OCR
        (c) Keyboard                            (d) UPC

Q-3 Under which case will intranet be an effective networking tool/s?

       (a) In a distributed decision-making environment
       (b) Where heterogeneous applications are involved
       (c) In a centralised organization
       (d) In a decentralized organization

Q-4 When an organization gives contract for development of software; it has to
        give data to the service provider. In Such cases, the ownership of data
         should be_________

       (a) Transferred to the service provider
       (b) With the client/organization that outsource services
       (c) Shared by both parties
       (d) Not transferred

Q-5 A modem performs_________

        (a) Modulation                      (b) Demodulation
        (c) Data compression            (d) All of these

Q-6 Which of the following is NOT done by modem?

        (a) Transmission Speed                      (b) Data Accuracy
        (c) Error detection and Correction     (d) Data Compression

Q-7 A program coded in programming language is____________ .

       (a) Target code                    (b) Source code
       (c) Block                            (d) None of these

Q-8 “Platform” in computer world means___________ .

       (a) Computer hardware used    (b) Operating Systems used
       (c) Both of these                       (d) None of these

Q-9 Which of these biometric tools use thermal sensors along with infrared
        rays for identification?

        (a) Key stroke dynamics          (b) Iris/ Retinal scan
        (c) Speech recognition             (d) Fingerprint scanning

Q-10 what is incorrect about software?

    (a) It can manipulate computer   (b) It has programs, instructions
    (c) It can be touched                   (d) It can be touched

Q-11 Disadvantage of distributed database is..

    (a) Unreliability                      (b) Easy implementation
    (c) Insecurity                           (d) High communication cost

Q-12 which of the following transmission techniques let computer to
        alternatively send and receive data ?

     (a) Simplex                             (b) Half duplex
     (c)Full duplex                         (d) Multiplexing

Q-13 What is NOT a feature of networking?

    (a) Reliability                        (b) Greater storage space
    (c) Connectivity                    (d) All are features of networking

Q-14 Taking back-up of a file against crash is a

    (a) Preventive measure          (b) Curative measure
    (c) Decisive measure             (d) None of these

Q-15 A memory that is referred by its contents instead of physical
        address is called--------------------.

         (a) Associative memory     (b) Content addressable storage
         (c) Both (a) and (b)             (d) None of these

Q-16 Most dangerous risk in leaking of information is :

        (a) ready access to online terminals
        (b) Online processing of data
        (c) Ignorance about the existence of risk
        (d) All of these

Q-17 A camera is an........

       (a) Input device                 (b) Can be either input or output
       (c) Processing machine     (b) Output device

Q-18 Using anti-virus software is----------

      (a) Preventive measure       (b) Detective measure
      (c) Corrective measure       (d) All the above

Q-19 An online transaction is -----------------

      (a) One that is done in real time   
      (b) Transaction done via internet
      (c) One that is done via telephone 
      (d) None of these

Q-20 A clerk in a bank has to access data in customer account. Logical access
         control for these users would be.

       (a) Use of individual passwords
       (b) Use of a Accounts Receivable Section password
       (c) Use of individual passwords plus separate access passwords for
            customer data and product data
       (d) Can’t say

Q-21 To stop unauthorized access to the computer system we should

      (a) Have a trustworthy system administrator
      (b) Have a good passwords policy
      (c) Have a sound encryption policy
      (d) All of the above

Q-22 Which can not assure data accuracy in an application?

     (a) Limit and reasonableness test       (b) Echo checking
     (c) Control total                                  (d) None of these

Q-23 Maximum storage space is available on
     (a) CDs                                               (b) ROM
     (c) Hard disks                                    (d) Floppies

Q-24 Jon Von Neumann developed:

         (a) First electronic chip flip flop    (b) Stored-program concept
         (c) The first electronic computer    (d) None of these

Q-25 Which of the following is single user computer with many features
          and good processing power?

         (a) Minicomputer                            (b) Workstation
         (c) Macintosh                                   (d) None of these


Answers:-

1. b 2. d 3. c 4. b 5. d 6. b 7. b 8. c 9. c 10. d 11. c 12. b 13. d 14. b 15. b
16. c 17. b 18. a 19. b 20. a 21. b 22. a 23. b 24. a 25. b

GK (Computer Fundamental) # 2

          GK (Computer Fundamental)

Q-1 The executable file for Windows Explorer is ----------.

        (a) Expol.EXE                    (b) Explorer.EXE
        (c) Explorer.TXT                (d) Explorer. EXT

Q-2 ----------------is a tool to browse all disks connected to the computer.

       (a) Internet Explorer            (b) Windows Explorer
       (c) Windows Navigator       (d)  None of these

Q-3 The menu option to delete all the files present in the Recycle Bin is -----------.
       (a) Empty Recycle  Bin        (b) Full Recycle Bin
       (c) Half Empty Recycle Bin (d) None of these

Q-4 The facility to reduce the Taskbar to thin line when the taskbar or Start button
        is not in use is called as ----------------------

        (a) Auto hide                         (b) Hide
        (c) Automatic                        (d) None of these

Q-5 The extension for a created shortcut is------------.

         (a) .KLN                              (b) .NLK
         (c) .LNK                              (d) .LKN

Q-6 The shortcut key to switch between different applications is ----------.

        (a) Alt + Tab                         (b) Alt + Shift
        (c) Shift + Tab                       (d) Alt + Ctrl

Q-7 The Taskbar can be moved to ------------ of the screen.

         (a) Right corner                   (b) Left corner
         (c) Any corner                     (d) Top corner

Q-8 It is not possible to add items to the ---------------------.

         (a) Program menu                 (b) Start menu
         (c) Accessories menu            (d) None

Q-9 Files can be deleted from Windows with or without confirmation.

          (a) True                                  (b) False

Q-10 Shortcuts can be created on the desktop.

          (a) True                                  (b) False

Q-11 Unix is an example for :

          (a) Input Device                     (b) Output

          (c) Operating system              (d) Terminal

Q-12 Virus is a:........

          (a) OS                                      (b) Destructive Program

          (c) Useful Hardware                (d) Useful Software

Q-13 Loading Operating System onto RAM is called:

          (a) Booting                                (b) Saving
          (c) Printing                               (d) Opening

Q-14 An example for Virus:

         (a) Virus Rx                               (b) Nashot
         (c) Raindrops                             (d) Undelete

Q-15 Multiple CPUs help processing multiple instructions simultaneously:

         (a) Multiprogramming               (b) Memory Management
         (c) Multiprocessing                    (d) None of these

Q-16 DOS Command to view the contents of the file -------EDUCATION.BAT is :

        (a) TYPE EDUCATION.BAT   (b) DEL EDUCATION.BAT

        (c) View EDUCATION.BAT    (d) REN EDUCATION.BAT

Q-17 Start button of windows 98 is available in :

       (a) Control Panel                        (b) MS-Paint
       (c) Taskbar                                 (d) WordPad

Q-18 In Web Style, a single click on a program icon on desktop will:

       (a) Copy the program               (b) Delete the program
       (c) Open the program               (d) Close the program

Q-19 In Unix, mv command is used to :

        (a) View the contents of a file (b) Change the name of a file
        (c) Delete a file                        (d) None of these

Q-20 Windows 98 supports:

        (a) Plug & Play                (b) Creating Web pages
        (c) Multitasking                       (d) All of these

Q-21 Memory Management is performed by ------------------------.

       (a) Operating System               (b) Application
       (c) Software                              (d) None

Q-22 A wall paper effect can be created by using ---------------picture.

       (a) JPEG                                   (b) GIF
       (c) Bitmap                                 (d) JPG

Q-23 Deleted files can be recalled in windows 98 using ----------.

       (a) Recycle                                (b) Recycle Bin
       (c) Bin Recycle                         (d)  None

Q-24 To edit a scanner image, in Windows 98, use -----------.

       (a) Image                                   (b) Images
       (c) Imaging                               (d) None

Q-25 The two files used by Web View is ------------& -----------.

       (a) Desktop,INI, Folder,HTT     (b) Desktop,INS, Folder,HTP
       (c) Desktop,SNI, Folder,HST    (d) None


Answers:-

1. b 2. b 3. a 4. a 5. c 6. a 7. c 8. c 9. a 10. a 11. b 12 c 13. d 14. c
15. b 16. c 17. b 18. b 19. c 20. d 21. a 22. c 23. b 24. c 25. a

G.K. Computer ( Fundamental) # 1

                                G.K. Computer (Fundamental)


Q-1 MS-Windows support file names up to---------characters.

        (a) 256                                               (b) 255
        (c) 254                                               (d) 257

Q-2 WYSIWYG stands for ----------------

      (a) What you sing in what you Got    (b) What you see is what you get
      (c) What you seen in what you Got    (d) What you see in what you Got

Q-3 The Application that is used to make telephone calls from the computer using a MODEM is -----

       (a) Phone Divert                                (b) Phone Dialing
       (c) Phone Dialer                                (d) None of these

Q-4 ----------- is used to select some special characters,

       (a) Character chart                           (b) Control panel
       (c) Character Map                            (d) None of these

Q-5 The Text editor available under MS-Windows is -----------

     (a) MS –Word                                  (b) Word Pad
     (c) Notepad                                      (d) None

Q-6 The extension of a file created in MS-Paint ----------

      (a) .BBM                                       (b) .BMP
      (c) .BMM                                      (d) .BPP

Q-7 The executable file for WordPad is :

      (a) TXT.EXE                                 (b) WINDOWS.EXE
     (b) WINWORD.EXE                     (d) WORDPAD.EXE

Q-8 MS-Windows is :

     (a) An spreadsheet                        (b) An Operating System
     (c) An application software          (d) None

Q-9 In the Calculator program, the font of the result can be -------

     (a) Changed                                 (b) Unchanged
     (c) Increase                                  (d) None

Q-10 Paint is an application program, which allows the user to ---------using
        different tools present.

      (a) text entered                            (b) draw pictures
      (c) text in ASCII code                 (d) None

Q-11 Notepad is a application program which allows the text entered by the user to be I in the---------
     (a) ASCII code                            (b) Binary code
     (c) Machine language                 (d) Assembly language

Q-12 The screen saver starts automatically, if the computer is idle for----------------------

   (a) Specified number of minutes  (b) specified number of character
   (c) specified number of hours      (d) specified number of Seconds

Q-13 To select a screen saver, select Screen Saver from Desktop in ---------.

    (a) Programme                          (b) Files
    (c) Control Panel                      (d) None

Q-14 Different mouse pointers can be selected from -------------.

    (a) .CUS or .ANI files             (b) .CUR or .ANS files
    (c) .CUR or .ANI files            (d) .CUT or .ANI files

Q-15 Allows the user to specify the decimal symbol. Default decimal symbol is a ------.

    (a) Dot                                      (b) Comma
    (c) Semi colon                          (d) Colon

Q-16 Determines whether the system of measurement will be -----------.

     (a) U.K.                                    (b) U. S.
     (c) U. P.                                    (d) None

Q-17 Determines which symbol will separate items in a list or series. Default is --------

     (a) Dot                                      (b) Comma
     (c) Colon                                  (d) Semi colon

Q-18 In MS-Windows the default currency symbol is -----------
     (a)  @                                       (b)  $
     (c) #                                          (d)  &

Q-19 Number of digit in-group is used to determine how many digits determine a number group.                 Default is -----.

     (a) 4                                          (b) 5
     (c) 3                                          (d) 2

Q-20 In Keyboard properties, the default language is -------------.

     (a) English (United)                  (b) English (United States)
     (c) English (United Kingdom)  (d) English (United City)

Q-21 The extension of Screen Saver file is -----------.

     (a) .SCS                                    (b) .SCR
     (c) .SCP                                    (d) None

Q-22 The item to change the format of the System Date and Time is -----------

     (a) D and T                               (b) Date and Time
     (c) System Date                        (d) None

Q-23 The executable file for Control Panel is -- ---------.

     (a) Control.EXE                        (b) Control.TXE
     (c) Control.TXT                        (d) Control.PXE

Q-24 The default time separator is -------------------.

     (a) @                                         (b) $
     (c) :                                            (d) :

Q-25 How many printer can be install at a time?

    (a) One                                       (b) Two
    (c) Three                                    (d) None


Answers

1. b 2. b 3. c 4. c 5. c 6. b 7. d 8. b 9. b 10. b 11. a 12. a 13. c
14. c 15. a 16. b 17. b 18. b 19. c 20. b 21. b 22. b 23. a 24. c 25. a



Some Important Expected Questions of Computer Fundamentals

                                                           




Computer (Data Structure 1)

Computer (Data Structure 1)


Q-1 A value or set of values is called-------?
(a) File (b) Entity (c) Data (d) Key

Q-2 A data item in a record that takes unique values and can be used to distinguish
a record from other record is called---------?
(a) Key (b) Information
(c) Data time (d) Record

Q-3 What is information?
(a) Set of values (b) A processed data
(c) A collection of record (d) None of these

Q-4 Which amongst the following is definition of record?
(a) A collection of similar entities (b) A collection of related records
(c) A collection of related items (d) None of these

Q-5 A collection of values and a set of operations that act on those values is called---------?
(a) Abstract data type (b) Primitive data type
(c) Polymorphic (d) Data type

Q-6 A primitive data type is a data type that is--------?
(a) Predefined (b) Post defined
(c) Abstract (d) None of these

Q-7 The pre defined data type is also known as--------?
(a) Set of values (b) Built – in data type
(c) Polymorphic (d) Abstract data type

Q-8 A data type that is organized in such a way that the specification of the values and
the specification of the operation on those values are separated from the
representation of the values and the implementation of the operation is called-------?
(a) Primitive data type (b) Polymorphic data type
(c) Abstract data type (d) None of these

Q-9 What is a list?
(a) A collection of record which can be ordered or unordered
(b) A collection of data type which can be ordered or unordered
(c) A collection of different values
(d) A collection of elements which can be ordered or unordered

Q-10 ---------- Is important because it supplies two essential pieces of information.
(a) Data typing (b) Data hiding
(c) Data typing (d) None of these

Q-11 A data structure is a ---------of a particular organization of data.
(a) Algorithm (b) Logical model
(c) Analytical (d) None of these

Q-12 What is a linear data structure?
(a) The records form a sequence (b) The files form a sequence
(c) The elements from a sequence (d) The logic form a sequence

Q-13 A list of finite number of elements of same data type is called-----------?
(a) Arrays (b) Data type
(c) Record of file (d) None of these

Q-14 -------- that requires only one index to access an individual element of the array?
(a) Two-dimensional array (b) One- dimenstrional array
(c) Multi dimensional array (d) Single ten arrays

Q-15 A linked list is a liner collection of data elements is----?
(a) Array (b) Station
(c) nodes (d) None of these

Q-16 In liner linked list each node is dinded into how many parts?
(a) 5 (b) 4
(c) 3 (d) 2

Q-17 In liner linked list first part contains the information of the element and second
called------ contains the address of the node in the list?
(a) The linked field or next pointer field (b) The pervious pointer field
(c) The information of the element (d) None of these
Q-18 In doubly linked list each node is dinded in to how many parts?
(a) 4 (b) 3
(c) 5 (d) 6

Q-19 LIFO stands for-------?
(a) Left-in-first-off (b) Long- inbox- from- on
(c) Last-in-first-out (d) Last-in-from-open
Q-20 What is a stack?
(a) LIFO (b) FILO
(c) LOFT (d) FOLI

Q-21 FIFO stands for---------?
(a) First-out-first-in (b) First-inner-from-out
(c) First-inter-for-offer (d) First-in-first-out

Q-22 A data structure that represents hierarchical relationship between various elements
is called?
(a) Trees (b) Queues
(c) Heaps (d) Shape

Q-23 How many children are there in a binary tree?
(a) 3 (b) 2
(c) 4 (d) 5

Q-24 Finding the location of a given element is called----?
(a) Sorting (b) Deletion
(c) Searching (d) In serration

Q-25 Combining the elements of two similar sorted structures in to a single structure
are called------?
(a) Traversal (b) Heaps
(c) Sorting (d) Merging


Answers With Reasons:-

1 (c) Data
2 (a) Key
3 (b) A processed data
4 (c) A collection of related items
5 (d) Data type
6 (a) Predefined
7 (b) Built – in data type
8 (c) Abstract data type
9 (d) A collection of elements which can be ordered
10 (a) Data typing
11 (b) Logical model
12 (b) Logical model
13 (a) Arrays
14 (b) One- dimensional array
15 (c) Nodes
16 (d) 2
17 (a) The linked field or next pointer field
18 (b) 3
19 (c) Last-in-first-out
20 (a) LIFO
21 (d) First-in-first-out
22 (a) Trees
23 (b) 2
24 (c) Searching
25 (d) Merging

G.K. Computer Fundamental

G.K. Computer Fundamental

Q-1 Manual data can be put into computer by ………….’

(a) Keyboard (b) MICR
(c) OCR (d) Scanner

Q-2 The ………… provides the go-ahead approval for the development of projects

(a) The project head (b) The user department head
(c) The senior management (d) All of the above

Q-3 Which not the following does not fall under the category of operations to be performed during development of software

(a) Personnel security (b) Logical access control
(c) Physical protection (d) Environmental protection

Q-4 The term ‘remote’ wrt network means

(a) A device that cannot control network functions
(b) Machine located far off
(c) Any peripheral or application located far off
(d) FEP

Q-5 Which access control mechanism does security label fit into ?

(a) Logical access control (b) Discretionary access control
(c) Physical access control (d) None of these

Q-6 A character that retains its value during program execution is …………..

(a) Constant (b) Variables
(c) Type definitions (d) Function

Q-7 All decisions for a LAN are taken by

(a) The it steering committee (b) The top management
(c) A business analyst (d) A project manager

Q-8 Generation of PIN in Bank ATM would require :

(a) Acquirer validates
(b) Acquirer sends response to the acceptor
(c) Authorizations request is sent to the acquirer
(d) PIN entered is encrypted

Q-9 …………. Are self replicating malicious code independent of the action of the user, but slow down the processor on entering a network

(a) Viruses (b) Worms
(c) Trojan Horse (d) None of the above

Q-10 Physical access to a database can be altered by which factors ?

(a) OS used by the software (b) Hiring Procedure
(c) Biometric security tools (d) Access privileges

Q-11 Which is NOT a feature of www ?

(a) Retrieving information (b) Enabling multimedia
(c) Built in hyper text capability (d) None of these

Q-12 Organization would prefer in house development of software to

(a) Ensure that development adhere to defined quality
(b) Maintain vendor relations
(c) Use the technology that is being widely used for development
(d) None of these

Q-13 Which of the following is the fastest ?

(a) Tapes (b) Hard disk
(c) Floppy disk (d) CDs

Q-14 Which of the memory is fastest ?

(a) Auxiliary` (b) Buffer
(c) Hard disk (d) Optical drive

Q-15 Which of the following cannot be shared ?

(a) Printer (b) Scanner
(c) Plotter (d) Mouse

Q-16 Which one of the following statements is true with respect to VSAT ?

(a) Usage is restricted to geographical boundaries
(b) Very high cost due to the usage of fibre optic cables
(c) Though quality of data is high, it does not support high bandwidth
(d) It operates in two frequency bands namely Ku and C

Q-17 The CPU ( Central processing unit ) has

(a) Input ,output and processing
(b) Control unit primary storage and secondary storage
(c) Control unit , arithmetic – logic unit, and primary storage
(d) None of the above

Q-18 What should be considered while division of duties in an IT environment bank ?

 (a) Nature of business operations (b) Managerial policy
(c) Organization structure with job description (d) All the above

Q-19 Which of the following is used to append a digital signature ?

(a) Public key (b) private key
(c) Digital key (d) None of these

Q-20 Computer program looking “normal” but containing harmful code is infected by

(a) Trojan Horse (b) Virus
(c) Worm (d) None of these

Q-21 Steganography is

(a) Hiding the data to make it necessarily invisible and not easily detectable
(b) Hiding the data but not necessarily making it invisible and not easily detectable
(c) Detecting and destroying the hidden data
(d) None of these

Q-22 Mark I computer was

(a) Electrical machine (b) Mechanical Machine
(c) Electronic Machine (d) None of these

Q-23 A computer faster with

(a) GUI (b) Mouse
(c) Keyboard (d) None of these

Q-24 Which of the following do you think is NOT required to develop an application for computer ?

(a) Feasibility study (b) Designing
(c) Testing (d) None of these

Q-25 The data flow diagram is for analyzing

(a) How to do a function efficiently
(b) Restrict the number of times a function can be performed
(c) Requirements of user
(d) None of these

ANSWERS:-

1. d 2. c 3. a 4. b 5. d 6. a 7. a 8. d 9. c 10. b 11. d 12. a 13. b
14. b 15. d 16. d 17. d 18. c 19. b 20. a 21. b 22. c 23. c 24. d 25. c

Reasons:

8. so that no one is able to understand it
12. In house development is company developing its own software
20 Trojan horse is software that has ‘virus hidden in it
24 All of these are required
25. These diagrams are just like flowcharts only difference is they show data movement instead of flow control in charts.

..