If Any request contact us :techtanu17@gmail.com << Catch on Facebook << If any link broken, Plz tell. we try to fix them.

Wednesday 12 June 2013

COMPUTER BASIC QUESTION PART-14

UGC NET JUNE 2013 SYLLABUS, MODEL PAPER/ PREVIOUS YEARS SOLVED QUESTION PAPERS.
UGC NET (NATIONAL ELIGIBILITY TEST) : OLD SOLVED/PREVIOUS EXAM QUESTION PAPERS WITH SOLUTIONS AND EXPLANATIONS AND FREE STUDY MATERIALS.
COMPUTER MEMORY BASED PREVIOUS YEARS SOLVED PAPERS I, II AND III TO PREPARE AND PASS THE UGC NET/SLET ENTRANCE EXAMINATION WITH HIGH PERCENTAGE.
COMPUTER BASIC QUESTIONS FOR BANK EXAM, HTAT, CTAT, TAT, UGC-NET, INTERVIEW AND OTHER EXAM'S, WHERE BASIC QUESTION'S ARE REQUIRED.

IF YOU KNOW ANSWER OF ANY QUESTIONS PLEASE TELL ME. THAT ANSWER HELP THE OTHER STUDENT IN FUTURE. THANKS. PLEASE REPLY RIGHT ANSWER.

101. A client-server system is based on
(a) mainframe technology
(b) WAN technology
(c)LAN technology
(d) Unix operating system

102. A multiplexor is a form of
(a) hub
(b) modem
(c) bridge
(d) none of the previous

103. A hub is a
(a) router
(b) a bridge
(c) repeater
(d) all of the previous

104. A search engine is
(a) hardware
(b) IR system for the Internet
(c) browser
(d) none of the previous

105. An ISP
(a) provides access to the Internet
(b) is a CPU register
(c) is a CPU functional unit
(d) make of processor

106. FTP is
(a) used to send email
(b) used to browse the Web
(c) is part of Netscape
(d) is aprotocol for the transfer of files between computers

107. Telnet
(a) used to send email
(b) uses telephone lines
(c) is part of Netscape
(d) is aprotocol that allows for remote login

108. A firewall is
(a) used to protect a computer room from fires and floods
(b) a form ofvirus
(c) a screen saver program
(d) none of the previous

109. A proxy server is
(a) a backup server
(b) an email server
(c) a poor file server
(d) noneof the above

110. An RDBMS is a
(a) remote DBMS
(b) relative DBMS
(c) Relational DBMS
(d)Reliable DBMS

111 Data Warehousing refers to
(a) storing data offline at a separate site
(b) backing up dataregularly
(c) is related to data mining
(d) uses tape as opposed to disk

112. A 4GL is
(a) DBMS system
(b) uses Java
(c) uses C++
(d) none of the previous.

113. The Pentium processor is
(a) 16-bit
(b) 32-bit
(c) 64 bit
(d) 8-bit

114. The IBM/Motorola PowerPC 601 processor is
(a) 16-bit
(b) 32-bit
(c) 64 bit
(d) 8-bit

115. The Motorola 68000 processor is
(a) 16-bit
(b) 32-bit
(c) 64 bit
(d) 8-bit

116. The Digital Alpha processor is
(a) 16-bit
(b) 32-bit
(c) 64 bit
(d) 8-bit

117. Apple’s iMac uses a
(a) ISA bus
(b) NuBus
(c) PCI bus
(d) USB bus

118 Which of the following is NOT a bus standard
(a) EISA
(b) VME
(c) MCA
(d) RS-232

120. The feature size of a Pentium is approx.
(a) 1 micron
(b) 0.1 microns
(c) 4 microns
(d) .4 microns

121. The resolution of an SVGA screen is
(a) 1024 x 768
(b) 512 x 512
(c) 640 x 480
(d)800 x 800

122. A 5 stage pipeline with the stages taking 1, 1, 3, 1, 1, units of time has a throughput of
(a) 1/3
(b) 1/7
(c) 7
(d) 3

123. Given a 5 stage pipeline with stages taking 1, 2, 3, 2, 1 units of time, the throughput of the pipeline is:
(a) 9
(b) 1/9
(c) 1/3
(d) 2

124. Given a 5 stage pipeline with stages taking 1, 2, 3, 1, 1 units of time, the clock period of the pipeline is:
(a) 8
(b) 1/8
(c) 1/3
(d) 3

125. Given a 5 stage pipeline with stages taking 1, 2, 3, 1, 1 units of time, the flowthrough time of the pipeline is:
(a) 8
(b) 1/8
(c) 1/3
(d) 3

126. The average memory access time for a machine with a cache hit rate of 90% where the cache access time is 10ns and the memory access time is 100ns is
(a) 55ns,
(b) 45ns,
(c) 90ns,
(d) 19ns

127. The clock speed of a modern PC is of the order of
(a) 400 Khz
(b) 400 Hz
(c) 400Mhz
(c) 400 Ghz

128. Given that the subprogram putc displays the character in al, the effect of the following instructions:
mov al, ‘c’
sub al, 2
call putc
is to
(a) display 2
(b) display 'c'
(c) display 'a'
(d) display a blank

129. Given that the bl register contains ‘b’, the effect of the following instruction
and bl, 1101 1111 is to
(a) clear bl
(b) store ‘B’ in bl
(c) store 0010 0000 in bl (d) leave bl unchanged

130. Which of the following is an illegal instruction
(a) MoV Ax, 30000
(b) iNc Al, 1
(c) aNd bx, bx
(d) add ax, 30

131 An OR gate generates a low output when
(a) any one of its inputs is low
(b) all of its inputs are high
(c)when all of its inputs are low
(d) power fails

132. Given that the subprogram putc displays the character in al, the effect of the following instructions:
mov al, ‘a’
add al, 2
call putc
is to
(a) display 2
(b) display c
(c) display a
(d) display a blank

133. Given that the bl register contains ‘B’, the effect of the following instruction or bl, 0010 0000 is to
(a) clear bl
(b) store ‘b’ in bl
(c) store 0010 0000 in bl
(d) leave bl unchanged

133b. Given that the bl register contains ‘B’, which of the following instructions will change bl so that it contains 'b'
(a) or bl, 0010 0000
(b) and bl, 0010 0000
(c) or bl, 1101 1111 in bl
(d) and bl, 1101 1111

13 Given that the bl register contains ‘b’, which of the following instructions will change bl so that it contains
'B'
(a) or bl, 0010 0000
(b) and bl, 0010 0000
(c) or bl, 1101 1111 in bl
(d) and bl, 1101 1111

134. Which of the following is an illegal instruction
(a) MoV Ax, 30000
(b) iNc Al
(c) aNd bx, bx
(d) add ax 30

135. An AND gate generates a high output when
(a) any one of its inputs is high
(b) all of its inputs are high
(c)when all of its inputs are low
(d) power fails

136. Given that the subprogram putc displays the character in al, the effect of the following instructions:
mov al, ‘0’
add al, 2
call putc
is to
(a) display ‘2’
(b) display '3'
(c) display '0'
(d) display a blank

137.Given that the bl register contains 1111 0000, the effect of the following instructionor bl, 0000 1111 is to
(a) clear bl
(b) store 1111 1111 in bl
(c) store 0000 1111 in bl
(d) leave bl unchanged

138. Which of the following is an illegal 8086 instruction
(a) mov 20, bx
(b) iNc Al
(c) aNd bx, bx
(d) add ax, 30

139. Which of the following is an illegal l8086 instruction
(a) mov ax, [bx]
(b) iNc [bx]
(c) aDd bx, [bx]
(d) add ax, [cx]

140. Which of the following is an illegal 8086 instruction
(a) mov ax, [bx]
(b) iNc [bx]
(c) aDd bx, [dx]
(d) add [bx], 1

141. Which of the following is an illegal 8086 instruction
(a) ret 2
(b) push al
(c) aDd bx, 25000
(d) and ax, dx

142. The net effect of calling the following subprogram in terms of program behaviour:
Subprog:
push ax
add ax, 10
ret
is to
(a) leave ax unchanged
(b) add 10 to ax
(c) cause the program to behave in an unpredictable manner
(d) do nothing

143. Branch prediction is used in the context of
(a) pipelining
(b) program loops
(c) cache memory
(d) ALUoperation

144. Delayed branching is used
(a) to introduce delays in program execution
(b) in pipelining
(c) in cachememory
(d) decoding instructions

145. A Harvard architecture means that a machine has
(a) separate memories for data and instructions
(b) unifiedcache memory
(c) multiple functional units
(d) an on-chip cache

146. Which is the most complex component of the following
(a) transistor
(b) flip flop
(c) AND gate
(d) decoder

147. An assembly language instruction
(a) always has a label
(b) always takes at least 1 operand
(c) always has an operation field
(d) always modifies the status register

148. An arithmetic instruction always modifies the
(a) stack pointer
(b) status register
(c) program counter
(d) anindex register

149. A conditional jump instruction
(a) always cause a transfer of control
(b) always involves the use of the status register
(c) always modifies the program counter
(d) always involves testing the Zero flag

150. An interrupt instruction
(a) causes an unconditional transfer of control
(b) causes a conditional transfer of control
(c) modifies the status register
(d) is an I/O instruction
GOTO COMPUTER BASIC PART-13 
IF YOU FIND ANY ANSWER WRONG,COMMENT ME, SO THAT I RIGHT THAT ANSWER


0 comments:

Post a Comment