Search this site

BSNL TTA Question Paper 2007 - Computer Science with Answers

BSNL TTA Exam Paper 2007 - Computer Science

1. What is the name of the software that allows us to browse through web pages?
(a) Browser
(b) Mail Client
(c) FTP Client
(d) Messenger
Answer: A

2. What is the address given to a network called?
(a) System Address
(b) SYSID
(c) Process ID
(d) IP Address
Answer: D



3. Which one of the following is a valid DOS command?
(a) LIST *.*
(b) LIST???.
(c) RECOVER A:
(d) RENAME A:SAMPLE.TXT C:TEST.DOC
Answer: D

4. All system settings in WINDOWS are stored in:
(a) CONTROL.INI
(b) MAIN.INI
(c) SYSTEM.INI
(d) SETTING.INI
Answer: C

5. Which number system is usually followed in a typical 32-bit computer?
(a) 2
(b) 10
(c) 16
(d) 32
Answer: C

6. Which of the following is not an output device:
(a) Printer
(b) Scanner
(c) Flat Screen
(d) Touch Screen
Answer: B

7. A microprocessor is a processor with reduced
(a) instruction set
(b) power requirement
(c) MIPS performance
(d) none of the above
Answer: B

8. Which of the following is not an output of an assembler?
(a) executable program
(b) source listing with line numbers and errors
(c) a symbol table
(d) object program
Answer: C

9. Which layer of OSI model is responsible for routing and flow control:
(a) Presentation
(b) Transport
(c) Network
(d) Data Link
Answer: C

10. Arrays are passed as arguments to a function by
(a) value
(b) reference
(c) both a and b
(d) none of the above
Answer: B

11. Array is:
(a) linear data structure
(b) non-linear structure
(c) none of the above
Answer: A

12. A data structure in which elements are added and removed from only one end, is known as:
(a) Array
(b) Stack
(c) Queue
(d) None of the above
Answer: B

13. A diamond-shaped box in an Entity-Relationship diagram refers to:
(a) Entity
(b) Relationship
(c) Attribute
(d) All of the above
Answer: B

14. The principle means of identifying entities within an entity set is:
(a) Primary Key
(b) Record
(c) Attribute
(d) Tuple
Answer: A

15. Modem refers to:
(a) Modulator
(b) Modulation
(c) Demodulator
(d) Modulator and Demodulator
Answer: D

16. C language is available for which of the following Operating Systems?
(a) DOS
(b) Windows
(c) Unix
(d) All of the above
Answer: D

17. Which of the following have the fastest access time?
(a) Magnetic Tapes
(b) Magnetic Disks
(c) Semiconductor Memories
(d) Compact Disks
Answer: C

18. DMA stands for:
(a) Direct Memory Allocation
(b) Distinct Memory Allocation
(c) Direct Memory Access
(d) Distinct Memory Access
Answer: C

19. Array subscripts in C always start at:
(a):1
(b) 0
(c) 1
(d) Value provided by user
Answer: B

20. Which type of commands in DOS needs additional files for their execution?
(a) Batch Commands
(b) Internal Commands
(c) External Commands
(d) All of the above

Answer: C

21. Which of the following statements in regard to Directories is false?
(a) Directories can exist inside directories
(b) The root directory is always at the highest level
(c) Directories with files can be deleted
(d) Directories cannot be renamed
Answer: D

22. It is better to buffer a table when
(a) When a table is read infrequently
(b) When a table is linked to check tables
(c) When a table is read frequently and the data seldom changes
(d) When a single record is to be picked up
Answer: C

23. The Operating System is responsible for:
(a) Controlling peripheral devices such as monitor, printers, disk drives
(b) Provide an interface that allows users to choose programs to run and to manipulate files
(c) Manage users’ files on disk
(d) All of the above
Answer: D

24. A company whishes to connect two sites in different parts of the country together. It is decided to use the telephone system. What device should be connected to the fileservers on each site?
(a) Router
(b) Modem
(c) Switch
(d) Hub
Answer: B

25. What is a file server?
(a) A computer that performs a service for other computers
(b) A computer that controls the printers on the network
(c) A computer that stores files that are created by network users
(d) All of the above
Answer: C

26. What is the Protocol used for the Internet?
(a) IPX/SPX
(b) NetBIOS/NetBEUI
(c) CDMA/CA
(d) TCP/IP
Answer: D

27. Which one of the following is not a Normal Forms (Normalization) rule with regards to the Relational Model?
(a) All fields within a table must relate to or directly describe the Primary Key.
(b) Repeating Groups must be eliminated from tables.
(c) Fields that can contain non-numeric data are to be removed and placed within their own tables with an associated Primary Key.
(d) Redundant data is to be eliminated by placing the offending fields in another table.
Answer: A

28. Choose the answer which best describes the term Primary Key:
(a) The Primary Key is a field that contains data that can be duplicated.
(b) The Primary Key is a field that contains data that is unique.
(c) The Primary Key is a field that is never associated with any field in other tables.
(d) The Primary Key field is a concept used only in Microsoft Access.
Answer: B

29. Which technique is used to reduce the size of a file:
(a) Compression
(b) Decompression
(c) Encryption
(d) Decryption
Answer: A

30. BIOS stands for
(a) Binary Input Output Set
(b) Binary Input Output System
(c) Basic Input Output Set
(d) Basic Input Output System
Answer: D

31. A floppy disk is consisting of 40 tracks, each track contains 100 sectors, and the capacity of a sector is 512 bytes, what is the approx. size of that disk?
(a) 1 MB
(b) 2 MB
(c) 4 MB
(d) 8 MB
Answer: B

32. What is the binary equivalent of a decimal number 68:
(a) 1000100
(b) 1100100
(c) 1000010
(d) 1000001
Answer: A

33. Assembly language to machine language translation is:
(a) One-to-One
(b) One-to-Many
(c) Many-to-One
(d) Many-to-Many
Answer: A

34. Maximum size of IP address is:
(a) 12 bits
(b) 24 bits
(c) 32 bits
(d) 48 bits
Answer: C

35. RAM stands for
(a) Read Access Memory
(b) Read After Memory
(c) Random Access Memory
(d) Random After Memory
Answer: C

36. What is the final value of sum?
main ()
{
int sum=1;
for(;sum<=9;)
printf(%d\n, ++sum);
}
(a) 9
(b) 10
(c) 11
(d) none of the above
Answer: B

37. If c is a variable initialized to 1, how many times the following loop be executed:
while(c>0 && c<60)
{
c++;
}
(a) 59
(b) 60
(c) 61
(d) none of the above
Answer: A

38. The declaration void fun(int) indicates the fun is a function which:
(a) has no arguments
(b) returns nothing
(c) both a and b
(d) none of the above
Answer: B

39. Out of the following which is not valid network topology:
(a) Bus
(b) Star
(c) Circle
(d) Tree
Answer: C

40. The overall logical structure of a database can be expressed graphically by:
(a) Data Flow Diagram
(b) Flow Chart
(c) Directed Graph
(d) Entity-Relationship Diagram
Answer: D

41. CARRY, in a half-adder, can be obtained using:
(a) OR gate
(b) AND gate
(c) EX-OR gate
(d) EX-AND gate
Answer: B

42. The memory that requires refreshing of data is:
(a) SROM
(b) DROM
(c) SRAM
(d) DRAM
Answer: D

43. The minimum number of bits required to represent numbers in the range: -28 to +31 is
(a) 5
(b) 6
(c) 7
(d) 8
Answer: B

44. Which bus carries information between processors and peripherals?
(a) Data bus
(b) Control bus
(c) Address bus
(d) Information bus
Answer: A

45. Which part of the computer perform arithmetic calculations?
(a) Control unit
(b) Registers
(c) ALU
(d) CPU
Answer: C

46. A gigabyte represents:
(a) 1 billion bytes
(b) 1000 kilobytes
(c) 230 bytes
(d) 10 megabytes
Answer: A

47. The minimum number of bits required to store the hexadecimal number FF is:
(a) 2
(b) 4
(c) 8
(d) 16
Answer: C

48. Cache memory enhances:
(a) memory capacity
(b) memory access time
(c) secondary storage capacity
(d) secondary storage access time
Answer: B

49. A UPS:
(a) increases the storage capacity of a computer system
(b) increases the processor speed
(c) provides backup power in the event of a power cut\
(d) none of the above
Answer: C

50. An RDBMS is a:
(a) Remote DBMS
(b) Relative DBMS
(c) Reliable DBMS
(d) Relational DBMS
Answer: D

No comments:

Post a Comment