CPCT Previous Paper 20 November 2016-Shift-1
1) The Terms EDVAC Stands for:
Ans: Electronic Discrete Variable Automatic Computer
2) Which of the following is used to store intermediate arithmetic and logic results in a CPU?
A) Accumulators
B) Buffers
C) Virtual Memory
D) Secondary Storage
Ans: A) Accumulators
3) A device or computer program capable of coding and decoding audio data stream is known as:
A) Audio Signal
B) Audio Throughput
C) Audio Stream
D) Audio Codec
Ans: D) Audio Codec
4) A computer device used to draw images and create graphics and animation is known as:
A) Scanner
B) Graphics Tablet
C) Copier
D) PDA
Ans: B) Graphics Tablet
5) The term OLED in Video Display stands for:
Ans: Organic Light Emitting Diode
6) Which of the following is employed in Physical security systems to read personnel credentials to allow passage through a locked door?
A) Access Control Card Readers
B) Security Scanners
C) VR Sets
D) Memory Card Readers
Ans: A) Access Control Card Readers
7) Which of the following is not used with regards to Integrated circuits?
A) SSI
B) PSI
C) MSI
D) VLSI
Ans: B) PSI
8) Which of the following protocols was designed by Microsoft to facilitate communication between computers and USB Mass storage devices to transfer Images, Audio and Video File?
A) Media Transfer protocol
B) File Transfer Protocol
C) Voice Over Internet Protocol
D) Simple Mail Transfer Protocol
Ans: Media Transfer protocol
9) A 2-Dimensional patterned array used to represent characters, symbols and images is known as:
A) Line Work
B) Resolution
C) Dot Matrix
D) Vector
Ans: C) Dot Matrix
10) Which of the following has the fastest access time in terms of data retrieval?
A) SSD
B) HDD
C) Magnetic Tape
D) CD
Ans: A) SSD
11) A self-contained step by step of operations that only models the actual working of a computer program but cannot be executed directly is known as:
A) Algorithm
B) Batch file
C) Executable
D) Shell Script
Ans: A) Algorithm
12) Which of the following is NOT a flavour of UNIX?
A) Linux
B) FreeBSD
C) Python
D) Darwin
Ans: C) Python
13) Flight simulator usually belongs to which of the following categories?
A) Open Source Software
B) Embedded Software
C) System Software
D) Application Software
Ans: D) Application Software
14) Assembly language is converted into executable machine code by utility program referred to as:
A) Assembler
B) Debugger
C) Macro
D) Parser
Ans:- A) Assembler
15) A Software program that operates or controls a particular type of device that is attached to a computer is known as:
A) Interrupt
B) Device Driver
C) Trap
D) Micro Controller
Ans: B) Device Driver
16) Which of the following files is a default operating system shell for DOS O.S.?
A) Autoexect.bat
B) Commnand.com
C) Kernel132.dll
D) Run32.dll
Ans: B) Command.com
17) The process of booting a computer from a network rather than a local drive is known as:
A) Scheduled booting
B) Network booting
C) Attended booting
D) Silent booting
Ans: Network booting
18) Which of the following devices is responsible for forwarding data packets between computer networks?
A) Repeater
B) Hub
C) Modem
D) Routers
Ans: D) Routers
19) The digital image that is used as a decorative background on the screen of a computer is known as:
A) Desktop
B) Screen Saver
C) Wallpaper
D) Image
Ans: C) Wallpaper
20) Which of the following components of windows acts as a safety net for mistakenly deleted files or folders from the hard disk?
A) My Documents
B) Internet Explorer
C) Task Bar
D) Recycle Bin
Ans: D) Recycle Bin
21) Which of the following options is used for powering down a computer while retaining its current state and saving electrical power?
A) Hibernate
B) Sleep
C) Restart
D) Shutdown
Ans: A) Hibernate
22) The process of encoding messages in such a way that only authorized users can read it is referred to as:
A) Decryption
B) Encryption
C) Privacy
D) Message Secrecy
Ans:- B) Encryption
23) In securing websites, which of the following methods identifies a user as a human and not an automated program feeding in the data?
A) SPAM Locker
B) Firewall
C) Honeypot
D) Captcha
Ans: D) Captcha
24) Which of the following options is the measure of the effectiveness of a password in restricting password guessing?
A) Password Code
B) Password Length
C) Password Strength
D) Password Scope
Ans: C) Password Strength
25) Which of the following terms describes an error in computer program that causes it to produce undesired results?
A) Software Boot
B) Software Crash
C) Software Malfunction
D) Software Bug
Ans: D) Software Bug
26) Which of the following options is used to prevent, detect and remove malicious software from the computer system?
A) Anti-Virus
B) Antigen
C) Anti-Spam
D) Antibody
Ans: A) Anti-Virus
27) The file extension .PNG is a short for:
Ans:- Portable Network Graphics
Which of the following is not a file/folder attribute in traditional DOS and Windows systems?
A) Archive
B) Hidden
C) Read Only
D) Write Only
Ans:- D) Write Only
28) In file management, a permanent reproduction of file data in the form of printed document in known as:
A) Soft Copy
B) Document Backup
C) Hard Copy
D) Blue print
Ans: C)Hard Copy
29) In Windows O.S the key combination of “Ctrl+Shift+ESC” Would open:
Ans: Windows Task Manager
Ans: Electronic Discrete Variable Automatic Computer
2) Which of the following is used to store intermediate arithmetic and logic results in a CPU?
A) Accumulators
B) Buffers
C) Virtual Memory
D) Secondary Storage
Ans: A) Accumulators
3) A device or computer program capable of coding and decoding audio data stream is known as:
A) Audio Signal
B) Audio Throughput
C) Audio Stream
D) Audio Codec
Ans: D) Audio Codec
4) A computer device used to draw images and create graphics and animation is known as:
A) Scanner
B) Graphics Tablet
C) Copier
D) PDA
Ans: B) Graphics Tablet
5) The term OLED in Video Display stands for:
Ans: Organic Light Emitting Diode
6) Which of the following is employed in Physical security systems to read personnel credentials to allow passage through a locked door?
A) Access Control Card Readers
B) Security Scanners
C) VR Sets
D) Memory Card Readers
Ans: A) Access Control Card Readers
7) Which of the following is not used with regards to Integrated circuits?
A) SSI
B) PSI
C) MSI
D) VLSI
Ans: B) PSI
8) Which of the following protocols was designed by Microsoft to facilitate communication between computers and USB Mass storage devices to transfer Images, Audio and Video File?
A) Media Transfer protocol
B) File Transfer Protocol
C) Voice Over Internet Protocol
D) Simple Mail Transfer Protocol
Ans: Media Transfer protocol
9) A 2-Dimensional patterned array used to represent characters, symbols and images is known as:
A) Line Work
B) Resolution
C) Dot Matrix
D) Vector
Ans: C) Dot Matrix
10) Which of the following has the fastest access time in terms of data retrieval?
A) SSD
B) HDD
C) Magnetic Tape
D) CD
Ans: A) SSD
11) A self-contained step by step of operations that only models the actual working of a computer program but cannot be executed directly is known as:
A) Algorithm
B) Batch file
C) Executable
D) Shell Script
Ans: A) Algorithm
12) Which of the following is NOT a flavour of UNIX?
A) Linux
B) FreeBSD
C) Python
D) Darwin
Ans: C) Python
13) Flight simulator usually belongs to which of the following categories?
A) Open Source Software
B) Embedded Software
C) System Software
D) Application Software
Ans: D) Application Software
14) Assembly language is converted into executable machine code by utility program referred to as:
A) Assembler
B) Debugger
C) Macro
D) Parser
Ans:- A) Assembler
15) A Software program that operates or controls a particular type of device that is attached to a computer is known as:
A) Interrupt
B) Device Driver
C) Trap
D) Micro Controller
Ans: B) Device Driver
16) Which of the following files is a default operating system shell for DOS O.S.?
A) Autoexect.bat
B) Commnand.com
C) Kernel132.dll
D) Run32.dll
Ans: B) Command.com
17) The process of booting a computer from a network rather than a local drive is known as:
A) Scheduled booting
B) Network booting
C) Attended booting
D) Silent booting
Ans: Network booting
18) Which of the following devices is responsible for forwarding data packets between computer networks?
A) Repeater
B) Hub
C) Modem
D) Routers
Ans: D) Routers
19) The digital image that is used as a decorative background on the screen of a computer is known as:
A) Desktop
B) Screen Saver
C) Wallpaper
D) Image
Ans: C) Wallpaper
20) Which of the following components of windows acts as a safety net for mistakenly deleted files or folders from the hard disk?
A) My Documents
B) Internet Explorer
C) Task Bar
D) Recycle Bin
Ans: D) Recycle Bin
21) Which of the following options is used for powering down a computer while retaining its current state and saving electrical power?
A) Hibernate
B) Sleep
C) Restart
D) Shutdown
Ans: A) Hibernate
22) The process of encoding messages in such a way that only authorized users can read it is referred to as:
A) Decryption
B) Encryption
C) Privacy
D) Message Secrecy
Ans:- B) Encryption
23) In securing websites, which of the following methods identifies a user as a human and not an automated program feeding in the data?
A) SPAM Locker
B) Firewall
C) Honeypot
D) Captcha
Ans: D) Captcha
24) Which of the following options is the measure of the effectiveness of a password in restricting password guessing?
A) Password Code
B) Password Length
C) Password Strength
D) Password Scope
Ans: C) Password Strength
25) Which of the following terms describes an error in computer program that causes it to produce undesired results?
A) Software Boot
B) Software Crash
C) Software Malfunction
D) Software Bug
Ans: D) Software Bug
26) Which of the following options is used to prevent, detect and remove malicious software from the computer system?
A) Anti-Virus
B) Antigen
C) Anti-Spam
D) Antibody
Ans: A) Anti-Virus
27) The file extension .PNG is a short for:
Ans:- Portable Network Graphics
Which of the following is not a file/folder attribute in traditional DOS and Windows systems?
A) Archive
B) Hidden
C) Read Only
D) Write Only
Ans:- D) Write Only
28) In file management, a permanent reproduction of file data in the form of printed document in known as:
A) Soft Copy
B) Document Backup
C) Hard Copy
D) Blue print
Ans: C)Hard Copy
29) In Windows O.S the key combination of “Ctrl+Shift+ESC” Would open:
Ans: Windows Task Manager
Comments
Post a Comment