Tuesday 31 January 2012

Basic Computer Troubleshooting Exam


Basic Computer Troubleshooting Exam


1. If you turn on a PC and the boot-up process halts, giving you the message: "Non-System disk or disk error....Replace and press any key when ready", the problem is likely:
  1. A non-bootable floppy disk is in the floppy-disk drive and you should remove it
  2. The hard-drive has failed and you should replace it
  3. RAM has failed and you should replace it
  4. A key on the keyboard is stuck and the keyboard should be replaced
2. If you turn on a PC and the system unit is clearly ON, but the monitor is dark, the problem could be that:
  1. The monitor is not turned ON
  2. The monitor is not plugged in
  3. The monitor is not connected to the PC
  4. Any or all of the above
3. If a PC freezes or behaves otherwise erratically, and the system unit is very quiet, the most likely cause is:
  1. A virus has infected the system
  2. The hard-drive is almost out of space
  3. The CMOS RAM is failing
  4. The power-supply fan has failed and the system is overheating
4. What should you do if you receive the following message:
Cannot find a device file that may be needed to run Windows or a Windows application...zyvxd.386
Press any key to continue?
  1. Power the machine OFF, then ON to resync the kernel
  2. Replace the hard drive
  3. Start Windows and run Scandisk to reload the missing file(s)
  4. Press any key to continue loading Windows and, then, either reload the missing file or remove the line in SYSTEM.INI that loads it
5. Which answer best describes the following:
"g:\progra~1\indexes\mydocs\gregfoot\bigbaby.doc"
  1. A line of Grep programming code relating to the bigbaby time constant
  2. The location of a file called BIGBABY.DOC which is located in the gregfoot subdirectory on drive g:
  3. Programming code which defines a small footprint, mini tower PC
  4. An illegal error from a document called Programming for UNIX, which the word processor, DOS, can't find
6. What is a GPF?
  1. A hard drive with insufficient available space
  2. Part of the Microsoft General Procedures For Windows operating systems
  3. A Windows General Protection Fault
  4. All of the above
7. The physical part of the PC that keeps track of the hardware resources on the system is the:
  1. ROM BIOS Chip
  2. CMOS RAM
  3. Hard Drive
  4. Power Supply
8. For ALL PC generations beyond the first, when most PCs are powered OFF, the clock and calendar in the system:
  1. Continue to function because they are powered by an on-board battery
  2. Continue to function because they are powered by wind-up spring like a wristwatch
  3. Cease to function and must be reset after re-boot
  4. None of the above
9. Which of the following contains the PATH variable in an MS-DOS environment?
  1. AUTOEXEC.BAT
  2. PATHSET.EXE
  3. This cannot be set in MS-DOS
  4. The PATH can only be set by the System Administrator during times of peak usage
10. What's likely to happen when Windows' System Resources drop below 60%?
  1. Intel Pentium CPU chips run more efficiently
  2. Anti-viral applications can safely scan system files
  3. The system will crash
  4. The system will overheat
11. If a user wants to add another adapter card into a PC, the first concern would be:
  1. Is the card a "Plug-and-Play" card?
  2. Would there be enough hard-drive space for the driver-software for the card?
  3. Would the power supply be able to provide enough power for the card?
  4. Is there a vacant slot available for the card?
12. Which Windows file loads applications that run when Windows opens?
  1. AUTOEXEC.BAT
  2. WIN.INI
  3. SYSTEM.INI
  4. Either A or C above

    13. If, upon booting up a PC, you see a message that says: Keyboard error, it could very likely be:
  1. The keyboard is not attached to the PC
  2. The keyboard has failed
  3. Either A or B above
  4. Neither A nor B above
14. If, upon booting up a PC, you see a message that says: Invalid drive configuration, it could very likely be:
  1. The hard drive cable within the system unit is not attached to the controller
  2. The hard drive has failed
  3. The hard drive has not been partitioned
  4. Any of the above
15. If you add an internal modem to a PC and it does not function, the cause could be:
  1. An interrupt conflict
  2. A port conflict
  3. A memory range conflict
  4. Any of the above
16. An external modem connects to a PC via:
  1. A docking port
  2. A serial port
  3. A mouse port
  4. Either B or C above
17. What MS-DOS command will make the file SYSTEM.DOC Read Only?
  1. MAKE SYSTEM.DOC RO
  2. SYSTEM.DOC MAKE RO
  3. ATTRIB +R SYSTEM.DOC
  4. SYSTEM.DOC is a program file, so it can't be done
18. Which of the following describes the best approach to getting Windows 95/98 booted if it fails because you set the screen display incorrectly?
  1. Delete SYSTEM.DAT and USER.DAT, and restart Windows 95/98
  2. Reboot the PC and change the CMOS video setting to low resolution until the problem is corrected
  3. Switch OFF the Turbo switch on the PC's front panel and reboot Windows
  4. Start Windows in Safe Mode and correct the setting
19. Which of the following best describes the proper way to shutdown Windows 95/98?
  1. Close all applications and turn OFF the power switch
  2. Press Ctrl-Alt-Del
  3. Click Start->Shut Down->Shut down the computer?->Yes
  4. Click File->Exit and double-click OK
20. What significance do the "beeps" have during the boot process of a PC?
  1. The number of beeps describe the quality of the processor
  2. The number of beeps describe the speed of the RAM Chips
  3. The number of beeps describe the overall condition of the PC's hardware
  4. You can tell how powerful the PC is by the loudness or intensity of the beeps
21. Which of the following best describes the relationship between a network Server and a network Client?
  1. A Server executes commands on a Client
  2. Servers control Distributed Area Value Independent Driver nodes and Clients control Critical Unified Resource Transfer stations
  3. A Server stores data and applications and may link one or more Clients together
  4. Clients generate checksum values that Servers use to verify the accuracy of data
22. Approximately, how long should it take to download a 3 megabyte file from the Internet using a 56K bps modem?
  1. 1 hour
  2. 15 hours
  3. 15 minutes
  4. 45 seconds
23. Which of the following could be used to edit a text file on a PC.
  1. DOS EDIT
  2. Microsoft Windows NOTEPAD
  3. Microsoft Windows Write or Windows 95/98 Wordpad
  4. All of the above
24. Where is California?
  1. Mars
  2. The United States
  3. Japan
  4. Blue
25. What is 2+2?
  1. 6
  2. 24,232
  3. 4
  4. True

1. a ... CORRECT
2. d ... CORRECT
3. d ... CORRECT
4. d ... CORRECT
5. b ... CORRECT
6. c ... CORRECT
7. a ... CORRECT
8. a ... CORRECT
9. a ... CORRECT
10. c ... CORRECT
11. d ... CORRECT
12. b ... CORRECT
13. c ... CORRECT
14. d ... CORRECT
15. d ... CORRECT
16. d ... CORRECT
17. c ... CORRECT
18. d ... CORRECT
19. c ... CORRECT
20. c ... CORRECT
21. c ... CORRECT
22. c ... CORRECT
23. d ... CORRECT
24. b ... CORRECT
25. c ... CORRECT


LECTURER COMPUTER SCIENCE MCQS PAPER 2011


Q.1. Select the best option/answer and fill in the appropriate box on the Answer Sheet. (20)

(i) AX register is also known as:
(a) Accumulator
(b) Collector
(c) Distributor
(d) Counter
(e) None of these

(ii) In the Base + Offset addressing, Offset address is also known as:
(a) Physical Address
(b) Logical Address
(c) Actual Address
(d) Instruction Address
(e) None of these

(iii) The technique for allowing a unit to check the status of another independently function unit is known as?
(a) Interrupt
(b) System call
(c) Polling
(d) Trape
(e) None of these

(iv) The method for storing data temporarily such that the input-output of the same job is overlapped with its own processing, is known as:
(a) Spooling
(b) Contention
(c) I/O wait
(d) Buffering
(e) None of these

(v) The DMA that uses Busses when CPU is not using them is termed as:
(a) Shared DMA
(b) Cycle Stealing
(c) Channel
(d) Transparent DMA
(e) None of these

(vi) _________ Scheduler deals with the decision as to whether to admit another new job to the system.
(a) High Level
(b) Medium Level
(c) Low Level
(d) Short term
(e) None of these

(vii) When the process is in the states of Blocked Suspended or Ready Suspended, its relevant data is
stored in:
(a) Main Memory
(b) Hard Disk
(c) Magnetic Tape
(d) Buffer
(e) None of these

(viii) Priority, P = (Time Waiting + Run Time) / Run Time is used to calculate priority in __________ scheduling algorithm:
(a) Shortest Job First
(b) Priority Scheduling
(c) Longest Wait First
(d) Highest Response Ratio Next
(e) None of these

(ix) HDLC Protocol stands for:
(a) High-Level Data Link Control
(b) High Level Development Protocol
(c) Huge Level Data Link Control
(d) High Development Level Control
(e) None of these

(x) _________ is the generic name for a set of standards issued by the International CommunicationsStandards Body CCITT, designed to support Message Handling Systems; i.e. Electronic Mail.
(a) TCP/IP
(b) ISDN
(c) X.400
(d) X.25
(e) None of these

(xi) ________ layer is responsible for the transfer of a packet of data along one link in the network. It organizes data into frames and detects errors in transmission.
(a) Physical Layer
(b) Data Link Layer
(c) Network Layer
(d) Transport Layer
(e) None of these

(xii) Encryption is the conversion of data in some intelligible format into an unintelligible format called _________ to prevent the data from being understood if read by an unauthorized party.
(a) Clear Text
(b) Encrypted Text
(c) Cipher Text
(d) Coded Text
(e) None of these

(xiii) Binary search requires about ______ comparisons with an initial list of 1,000,000 elements.
(a) 10
(b) 20
(c) 35
(d) 100
(e) None of these

(xiv) A _________ header list is a header list where the last node contains the null pointer.
(a) Grounded
(b) Circular
(c) One way
(d) Rooted
(e) None of these

(xv) ________ are small applications that are accessed on an internet server, transported over the internet, automatically installed and run as part of a web document.
(a) Applets
(b) Java Bean
(c) Sockets
(d) Java Component
(e) None of these

(xvi) AWT stands for:
(a) Abstract Window Technique
(b) Abstract Window Toolkit
(c) Actual Window Technique
(d) Added Window Toolkit
(e) None of these

(xvii) GIF images can have only upto _______ colors.
(a) 128
(b) 256
(c) 512
(d) 1024
(e) None of these

(xviii) ________ is stored on a client and contains state information of the website visited.
(a) Cookies
(b) Servelet
(c) History
(d) Resident Page
(e) None of these

(xix) In software Engineering KPA denotes.
(a) Key Process Audit
(b) Key Process Area
(c) Key Process Analysis
(d) Key Problem Area
(e) None of these

(xx) The ________ Process Model defines a series of events that will trigger transitions from state to state for each of software engineering activities.
(a) Spiral
(b) Operational
(c) RAD
(d) Concurrent Development
(e) None of these

PCS/MCQ'S PAPER 1 2010-2012


 PCS/MCQ'S PAPER 1


1-object (also called_____) is a common data type that includes photograph, audio, vedio, or a document in other applications.
(a) Number (b) BLOB (c) Integer (d) binary (e) none of these

2. in database, a(n) ____ field is a group of related fields.
(a) Table (b) Key (c) Record (d) Primery field (e) Non of these

3. In a database, a(n) ____ field is a field that uniquely identifies each record in a file.
(a)
Main (b) Identifying (c) Master (d) Key (e) none of these

4. If a lowest annual fee at a discount wherehouse is Rs.2025 and the highest is Rs.5550, a(n)______ on annual fee field ensure it is a value between Rs.2025 and Rs.5550.
(a) Range Check (b) compelteness check (c) consistency Check (d) alphabetic/numeric check (e) none of these

5. A DBMS uses the _____ to perform validation checks.
(a) Data Server (b) data smart (c) data wherehouse (d) data dictionary (e) none of these

6. _______ is a network technology that defines how messages are routed from one end of a network to other, ensuring the datat arrives correctly by dividing it into packets.
(a) HTML (b) XML (c) HTTP (d) TCP/IP (e) none of these

7. When a computer sends data over the internet, the data is divided into small pieces , or _______
(a) Bundles (b) packets (c) slices (d) baskets (e) none of these

8. The amount of data, instructions and information that can travel over a communication channel somtimes is called _______
(a) broadband (b) baseband (c) latency (d) bandwidth (e) none of these

9. fiber optic cables have all of the following advantages over cables that used wire except _______
(a) lower costs & easier installation and modification
(b) Faster data transmission & smaller size
(c) Less susceptible to noise from other divices
(d) Better security for signals during transmission
(e) none of these

10. A_____ is a network that connects compter and divices in a limited geographical area, such as home, school computer laboratory , or office building
(a) LAN (b) MAN (c) WAN (d) VAN (e) none of these

11. with _______ memory , the operating system allocates a portion of storage medium, usually the hard disk , to function as additional RAM
(a) Virtual (b) performance (c) device (d) Manged (e) none of these

12. If a new a device such as printer or scanner is attached to a computer, its _________ must be installed before the divice can be used
(a) Driver (b) platform (c) manager (d) kernel (e) none of these

13. A ________ is an icon on the desktop that provides a user with immediate access to a program or file.
(a) kernel (b) spooler (c) buffer (d) Shortcut (e) none of these

14. ________ a disk or reorgnizing it so the files are stored in contiguous sectors, speeds up disk access and thus performance of entire computer .
(a) Formating (b) Defregmenting (c) Spooling (d) compressing (e) none of these

15. the term cmputer _______ discribes potentially damging computer program that affects or infects a computer by altering the way the compter works without the users knowledge or permission .
(a) Hot spot (b) File compression Utillty (c) Virus (d) File conversion Utillity (e) none of these

16. In a diagram ( a DFD diagram was given ) _________ shows the input and output of information into or out from a prosses .
(a) Use Case (b) Data Flow (c) entity relationship (d) Class Diagram (e) none of these

17. Although used in all types of bussiness modeling the _____ has been adopted as a standard notation for object modeling.
(a) UML (b) CASE Tool (c) USE CASE Diagram (d) EMR (not sure) (e) none of these

18. For each input and output, a systems analyst tipicaly develops _______ which is a sample of the input or output and contains actual data.
(a) adoption (b) prototype (c) Mockup (d) feasibility Scheme (e) none of these

19. _________ is a working modle of propesed system .
(a0 Adoption (b) feasibilty Scheme (c) Mockup (d) Prototype (e) none of these

20. A unit test ________
(a) verifies that each individule program works by itself
(b) verifies that all programs in an application work togather properly
(c) verifies that an application works with other applications
(d) is performed by end-users and verifies that the new system works with actual data
(e) none of these