Forums Hà Nội Aptech
Bạn có muốn phản ứng với tin nhắn này? Vui lòng đăng ký diễn đàn trong một vài cú nhấp chuột hoặc đăng nhập để tiếp tục.
Tìm kiếm
 
 

Display results as :
 


Rechercher Advanced Search

Latest topics
» TUYỂN SINH KHÓA ĐÀO TẠO LUVINA ACADEMY X/2014 (Hệ Sơ cấp)
Đề thi lý thuyết 2 môn Computer Fundamentals EmptyFri Jan 10, 2014 5:08 pm by trangan

» Luvina - Tuyển sinh Luvina Academy IX/2013
Đề thi lý thuyết 2 môn Computer Fundamentals EmptyTue Apr 09, 2013 2:21 pm by trangan

» LUVINA ACADEMY VIII TUYỂN SINH 2012
Đề thi lý thuyết 2 môn Computer Fundamentals EmptyMon Sep 17, 2012 3:16 pm by trangan

» Tuyển sinh khóa học lập trình viên_Luvina Academy VII (Hệ sơ cấp)
Đề thi lý thuyết 2 môn Computer Fundamentals EmptyTue Jul 10, 2012 7:01 pm by trangan

» Xin đề thi thực hành,lý thuyết và đáp án của môn Developing Web Services with Java
Đề thi lý thuyết 2 môn Computer Fundamentals EmptyTue Jan 10, 2012 12:58 pm by JinHoVN

» Nhờ các PRO vào làm giúp kái đề PCS này với
Đề thi lý thuyết 2 môn Computer Fundamentals EmptyFri Jan 06, 2012 1:06 pm by phongvan1991

» Đề cương ôn tập môn CF
Đề thi lý thuyết 2 môn Computer Fundamentals EmptyThu Nov 10, 2011 8:20 pm by thanhnc_b01392

» xin slide môn C
Đề thi lý thuyết 2 môn Computer Fundamentals EmptySun Sep 04, 2011 5:33 pm by anhchang064

» Drugs In Japan
Đề thi lý thuyết 2 môn Computer Fundamentals EmptyTue Aug 02, 2011 5:58 am by Khách viếng thăm

Affiliates
free forum

May 2024
MonTueWedThuFriSatSun
  12345
6789101112
13141516171819
20212223242526
2728293031  

Calendar Calendar

Affiliates
free forum


Đề thi lý thuyết 2 môn Computer Fundamentals

Go down

Đề thi lý thuyết 2 môn Computer Fundamentals Empty Đề thi lý thuyết 2 môn Computer Fundamentals

Bài gửi  Admin Mon Aug 23, 2010 9:40 pm

Code:

1. The value of each digit in the number system is determined by which three of the following ?
a. The digit itself.
b. The binary value of the digit.
c. The position of the digit in the number.
d. The base/radix of the number system.
e. The position of the radix.
2. Which three of the following statements are NOT TRUE ? (choose all correct answers)
a. One character is stored in one byte.
b. Character K is represented by 45 in ASCII code.
c. The number 35.795 cannot be represented in binary form.
d. The ASCII code uses 8 bits to represent a single character.
e. In the binary number system the value of the digit to the left will become twice its predecessor.
3. All digital computers use ________ number system to store the data.
a. Decimal.
b. Binary.
c. Octal.
d. Hexadecimal.
4. File Transfer Protocol is a part of TCP/IP suite of protocols.
a. True
b. False
5. Every web server has an IP address and a domain name.
a. True
b. False
6. In Windows 2000 Professional it is possible to restrict users from visiting a particular site.
a. True
b. False
7. Choose the correct representation for data used during data process in CPU
a. Decimal.
b. Binary.
c. Octal.
d. Hexadecimal.
8. Which of the following are the advantages of using hexadecimal or octal number systems for low level programming? (choose all correct answers)
a. Easy to remember.
b. Low hardware cost.
c. Accuracy of the result.
d. Ease of programming.
e. Saves the time.
9. The term gigabyte is used to represent
a. 10 raised to 6
b. 10 raised to 9.
c. 10 raised to 3.
d. None of the others.
10. The result of the multiplication of binary numbers 1011 and 111 is
a. 1101101
b. 1100110
c. 1001101
d. NONE OF THOSE
11. Which three of the following ports allow transfer of more than one bit at a time ? (choose all correct answers)
a. Centronics port.
b. Serial port.
c. Parallel port.
d. Printer port.
12. The tool used for writing the set of instructions is called
a. Keyboard.
b. Program.
c. Programming language.
d. Software.
e. NONE OF THOSE
13. The result of addition of binary numbers 1011011 and 1010110 is
a. 10100001
b. 10110101
c. 10110001
d. NONE OF THOSE
14. The product of binary numbers 100110 and 110 is
a. 11110101
b. 10011101
c. 10101110
d. NONE OF THOSE
15. Programs used to prevent virus are called
a. Vaccines.
b. Anti-virus programs.
c. NONE OF THOSE


1. The access point for entry and exit of data are known as?
a) Connectors b) Ports c) Buses d) Controller

2. Which three of the following statements are TRUE?
a) Data processing cycle is information in, process and data out
b) Two categories of software are application and system software
c) Computers can take decisions on their own, like human beings.
d) The operating system has to take on conducting a process called as booting
e) The unit storing any data that comes into the CPU while processing is so called register

3. The string of bits needed to represent a character is called a .
a) Word b) Kilobyte c) Byte d) None of the above

4. The two advantages of domain model over workgroup model are
a) Centralised administration is possible b) Convenient for limited number of users
c) Security management is centralised d) Sharing of resources is easy

5. Each operating System organizes data internally with help of a program knows as file system
a) True b) False

6. Centronics ports are called as
a) Printer ports. b) Parallel ports. c) RS-232.

7. A translator that translates a statement of high-level language to machine language and immediately executes it is………
a) Translator b) Assembler c) Compiler
d) Interpreter e) None of the above

8. Advantages of a workgroup include (choose three)
a) Centralised management b) Easy to share resources c) Efficient on a large network.
d) Convenient for a limited number of users.
e) Simple design makes it easy to implement.

9. Which of the following statements related to NTFS are TRUE? (choose three)
a) Supports file compression b) No security if user logs in locally
c) Supports long file names d) Partitions as file size can be a maximum of 16 exabytes
e) Not very reliable since it does not support bad cluster mapping

10. Which of the following are TRUE about primary partition? (choose three)
a) The system partition can be located on it b) Can contain only one logical drive.
c) Can contain one and more logical drives d) The boot partition can be located on it.

11. Which two of the following are TRUE about NTFS permission?
a) NTFS permission can be assigned to both file and folder
b) NTFS permission can be assigned only to folder
c) NTFS permission are not effective if the user logs on locally.
d) NTFS permission are effective even if the user logs on locally

12.The various functions performed by Operating System are (three options)
a) It acts as a manager for the various resources and allocates them to various programs and users as and when required by them
b) It allows the user to interact with the hardware to obtain results.
c) It is used to store both data and information
d) It is referred to as the hardware of the computer machine.
e) It interprets the program instructions one at a time

13. Which of the following statement is TRUE while logging on to Windows 2000?
a) The user name is not case sensitive. b) The password is not case sensitive
c) Both name and password is case sensitive d) None of them is case sensitive.

14. Shared permissions can be applied to____________
a) Only FAT partitions b) Only NTFS partitions
c) Both FAT and NTFS partitions d) None of the above

15. Why is protocol used?
a) To connect different computers b) To share the resource on the network
c) To establish communication between computers

16. Which of the following are TRUE about extended partition? (two options)
a) The system partition can be located on it
b) The active partition can be located on it
c) Can contain one and more logical drives.
d) The boot partition can be located on it.

17. Which of the following statements related to NTFS are NOT TRUE? (choose three)
a) Supports file compression b) No security if user logs in locally
c) Supports long file names d) Partitions as file size can be 4 gigabytes maximum
e) Not very reliable since it does not support bad cluster mapping

18. The various functions performed by the Operating System are (three options)
a) It load the user program into the memory
b) It is used to store both data and information.
c) It controls the whole process of data transfer from one place to the other while computations are going on.
d) It gives instruction to display the result on the monitor.
e) It controls the computer hardware. It co-ordinates the flow of data between the various application program and the users.

19. Which three of the following statements related to memory are NOT TRUE?
a) Primary memory is called the main memory or the central memory
b) ROM memory is read/write memory
c) RAM memory is non volatile, its storage is permanent
d) The secondary memory is the internal memory.
e) Data is stored and retrieved from the disk in blocks.

20. The software, which has been developed for a specific application is called
a) System software b) Application software c) Accounting software
d) Used software e) Non of the above

21.With reference to primary memory, which two of the following statements are TRUE?
a) It is so called central memory
b) It is thought of as a collection of many gramophone records stacked on each other without all of them actually touching each other.
c) It is resident on the mother board. d) It is used for only read operation.

22.CPU is also referred as ___________________
a) Calculator b) Micro-Calculator c) Microprocessor d) None of them

23. The two standard types of ports are (Choose 2)
a) Serial b) Printer Port c) Parallel

24. ____________ is a collection of wires used for data transmission from one part of computer to another.
a) Cable b) Bus c) Wire Set

25. When we type the URL of any Web Site, it is converted into an IP address.
a) True b) False

26. Web site is a collection of _____________
a) Web Pages b) Web Sites c) Presentation

27. Which one of the following is used to download softwares?
a) File Transfer Protocol b) Folder Transfer Protocol c) Download Transfer Protocol

28. Conversion of decimal number 80 to binary is
a) 1100010 b) 1010000 c) 1010001 d) 1011000

29. The Decimal equivalent of 111001
a) 52 b) 47 c) 56 d) 57

30. The result of subtraction of the binary number 11100101 from 101100 is

a) -11111000 b) 1000110 c) -10111001 d) None of the above

31. Which of the following statements are FALSE? (3)
a) POST is the process of the booting the computer
b) The POST process requires a bootable disk to perform its checks
c) The user must perform the POST process when the machine is booted
d) The POST process is carried out before the operating system is loaded
e) The POST process always effectively detects hardware errors

32. The codes defined to convey information like end-of-file, end-of-page, etc. to the computer are called

a) Binary code b) Non-printable control characters
c) Symbolic codes d) ASCII code e) Character code

33. Computers that are mainly used for scientific and engineering purposes is

a) Analog b) Digital c) Hybrid

34 Hexadecimal A45C when converted to octal gives

a) 141636 b) 122134 c) 156334 d) 122243

35 Which three of the following statements are TRUE?
a) A computer virus may also be called a biological virus
b) The infection caused from a computer virus can be prevent via inoculation
c) The computer virus may spread via a floppy disk from one computer to another
d) The execution of a virus program can take place without any user intervention
e) A virus may delete data, increase the file size and also affect the hardware components

36 Binary 110111 multiplied with 110 results in

a) 1011001010 b) 101010110 c) 101001010

37 Examples of mainframes include

a) IBM 4381 b) CRAY XMP-24 c) NEC-500 d) ICL 39 series

38 Which three of the following statements related buses are TRUE?
a) The data bus controls the data flow
b) The microchips seen inside the computer are called buses
c) The transport data between the processor and other components
d) The entry and the exit points of the buses are called ports.
e) The buses do not allow the expansion of the computer

39 Which of the following are required to be maintained for proper housekeeping ? (3)
a) Power supply b) Hardware c) Software
d) Printouts e) Data


40 Programs used to prevent virus are called
a) Vaccines b) Anti-virus program c) None of the above



41 The octal equivalent of the binary number 10001010101 is


a) 215 b) 2135 c) 2125 d) None of the above



42 With reference to booting a computer, Which three of the following statements are NOT TRUE?
a) After the POST, the RAM searches for the operating system and loads it into the ROM.
b) The operating system files are first searched in the floppy disk and if not found, then on the hard disk
c) A bootable disk is used to store the backup of all data in the computer
d) A bootable disk allows the operating system to get loaded onto the computer
e) The booting process involves getting all data inside the computer ready for use.

43 Which two of the following statements are NOT TRUE?
a) Microcomputer cannot be used for computer graphics, CAD and CAM applications
b) Mainframes are large computers, which have multiple processors that allow parallel processing of different tasks
c) Microcomputers are also known as personal computers.
d) Supercomputers have a superior technology and are used for complex scientific applications
e) Minicomputers are more powerful than the microcomputer

44 RS-232 refers to which two of the following ?
a) Mouse port b) Electronic Industry Standard c) Centronics port
c) Parallel port d) None of the above

45 With reference to EEPROMS which three of the following statements are TRUE ?
a) Are useful in process control equipment, where real time response is necessary
b) Can be erased and reprogrammed by exposing them to ultra violet rays
c) Are used where the software programs stored require to be modified continuously
d) Does not have to be removed from its socket for programming since its circuitry can be integrated into the computer.
e) Are programmed to a “1” and “0” by burning out a fusible link between selected cells.

46 Three examples of fourth generation language are
a) Fortran b) Ingres c) Cobol
d) Dbase e) Foxpro


47 The tool used for writing the set of instructions is called
a) Keyboard b) Program c) Software
d) Programing language e) None of above

48 The inherent benefits of a computerised system are: (3 options)
a) Repetitive calculation have done by the system b) All details are available at one place
c) Errors due to manual calculation are eliminated d) Data entry is reduced to nil
e) Records are maintained at a faster rate

49 With reference to hard disks which three of the following statements are NOT TRUE ?
a) The vacumed container, which protects the set of platters in a disk pack, is called a spindle
b) In a fixed head disk there is one read write head per track
c) Access time is the time taken by read write head to reach the specified cylinder
d) During a read / write operation the platter is stationary and the head rotates.
e) Certain control data is recorded at the start and end of each sector.

50 Which two of the following statements are TRUE ?
a) Control data recorded on a disk during formatting is used only by the disk drive
b) The density of data stored on a disk decreases towards the innermost tracks
c) Each track has the same width as the head
d) The hard disk is known as the main memory of the computer system

51 Which two of the following statements are TRUE about primary partition?
a) Any primary partition on a hard disk can be designated as the active partition
b) Primary partition can never be made as an active partition
c) It is also known as the boot partition
d) It is also known as the root partition

52 All digital computers use number system to store the data
a) Decimal b) Binary c)Octal e)Hexadecimal

53 Which of the following are NOT TRUE about extended partition? (two options)
a) The system partition cannot be located on it
b) The active partition can be located on it
c) Can contain only one logical drive.
d) The boot partition can be located on it.

54 Which two of the following statements about Positional numbering system are TRUE?
a) The numer of the symbols are very few
b) Each symbol represented some value irrespective of its position in the number
c) Each symbol represented different value depending on the position it occupies
d) Numer system consisted of bar like I, II, ... is positional number system

55 In Windows 2000 Professional it is possible to restrict users from visiting a particular site
a) true b) false

56 ASCII uses bits per character
a) 8 b) 7 c) 6 e) None of above

57 Which three of the following statements are NOT TRUE?
a) One character is stored in one byte
b) Character K is represented by 45 in ASCII code
c) The number 35795 cannot be represented in bynary form
d) The ASCII code uses 8 bits to represent a single character
e) In the binary number system the value of the digit to the left will become twice its predecesor

58 The result of addition of binary numbers 1011011 and 1010110 is
a) 10100001 b)10110101 c)10110001 d)None of those

59 Which of the following statements are NOT TRUE about single user operating system?(2 choices)
a) Only one user can interact with it at a time
b) It supports 2 processor
c) MS-DOS is a single user operating system which acts as a client in networking environment

60 Which three of the following statements with reference to registers in CPU are TRUE?
a)They are the collection if wires used for data transmission from one part of the computer to another
b) The speed and performance of the CPU does not depend upon the number and size of the register
c) They are special high-speed storage area within the CPU
d) All data must be represented in the register before it can be processed
e) They can have the address of the memory where the data is stored instead of having the data itself
Admin
Admin
Admin
Admin

Tổng số bài gửi : 31
Join date : 23/08/2010
Age : 35
Đến từ : Hà Nội 5

https://hn-aptech.forumvi.com

Về Đầu Trang Go down

Về Đầu Trang

- Similar topics

 
Permissions in this forum:
Bạn không có quyền trả lời bài viết