Search This Blog

Friday, April 27, 2012

Information Technology Quiz - 16

1. Which of the following commands in Novell Netware Operating System opens a spool file that traps data for printing?
[A]CAPTURE
[B]REMOVE
[C]SALVAGE
[D]REVOKE


2. Which of the following commands in Novell Netware Operating System permits the alteration of the file attributes?
[A]NCOPY
[B]REMOVE
[C]SALVAGE
[D]FLAG


3. Which of the following statements is/are true?
I. In cooperative multitasking, the user has to restart the computer when the application stops running and crashes.
II. In preemptive multitasking, the operating system regains control if an application stops running and crashes.
III. Multitasking operating systems enable a single user to work with two or more programs at once.
[A]Only (I) above
[B]Only (II) above
[C]Only (III) above
[D]All (I), (II) and (III) above


4. Information systems that process data generated out of business transactions like sales, purchases,paymentsetcarecalled payments, etc. are called
[A]Transaction Processing Systems
[B]Management Information Systems
[C]Decision Support Systems
[D]Executive Information Systems


5. Which of the following data models are used in describing the data at the logical and view levels?
I. Object based logical models (OBLM).
II. Record based logical models (RBLM).
III. Physical data base model.
[A]Only (I) above
[B]Only (II) above
[C]Only (III) above
[D]Both (I) and (II) above


6. Which of the following softwares runs on the background of the user’s computer screen, letting him know when his friends or coworkers are online?
[A]Buddy list
[B]Telecommunication software
[C]DBMS software
[D]Telecommunication control software


7. Which of the following type of file(s) can be copied using File Transfer Protocol?
I. Graphic.
II. Video.
III. Audio.
[A]Only (I) above
[B]Only (II) above
[C]Only (III) above
[D]All (I), (II) and (III) above


8. In World Wide Web, the documents are formatted in a script called
[A]HTML
[B]VB Script
[C]Shell Script
[D]Java Script


9. What is the range of integer constant in C language?
[A]-2^16 to 2^16
[B]0 to 2^16 -1
[C]-2^15 to 2^15
[D]-2^15 to 2^15 -1


10. In a C program, Mr. Suresh initialized ‘a’ and ‘b’ as 50, 50 respectively.
a = a++ + ++b;
b = b++ + ++a;
What will be the values of ‘a’ and ‘b’ after executing the above statements?
[A]103, 153
[B]102, 154
[C]104, 154
[D]102, 153


11. Which of the following functions can be effectively used to so lve problems where the solution is found by repetitively applying the same solution to subsets of the problem?
I. Recursive.
II. Static.
III. Main.
[A]Only (I) above
[B]Only (II) above
[C]Both (I) and (II) above
[D]Both (II) and (III) above


12. In C language , the structure definition is terminated with
[A]Semicolon
[B]Colon
[C]Comma
[D]Period


13. In C language, which of the following functions is used to read an integer from a file?
[A]getc()
[B]putc()
[C]getw()
[D]putw()


14. Which of the following statements is/are false about Ring topology?
I. In ring network, the system depends entirely on the central host.
II. Ring network remains operational even if one computer in the network fails.
III. The main advantage of ring network is a substantial reduction in the cost of cabling.
[A]Only (III) above
[B]Both (I I) and (III) above
[C]Both (I) and (II) above
[D]Both (I) and (III) above


15. An ATM switch breaks voice, video and other data into fixed cells of
[A]51 bytes
[B]52 bytes
[C]53 bytes
[D]54 bytes


0 comments: