1. The topology with highest reliability is _______.
a) Bus topology
b) Star topology
c) Ring topology
d) Mesh topology
e) None of these
2. Who is the creator of the PASCAL language?
a) Niklaus Wirth
b) Dijkstra
c) Donald Knuth
d) Basic Pascal
e) None of these
3. EPROM can be used for _________.
a) erasing the contents of ROM
b) reconstructing the contents of ROM
c) erasing and reconstructing the contents of ROM
d) duplicating the ROM
e) None of the above
4. Numbers and formulae entered in cell are called _________.
a) Labels
b) Numeric entries
c) Intersection
d) Text
e) Fillers
5. The physical arrangement of elements on a page is referred to as a document’s ________.
a) features
b) format
c) pagination
d) grid
e) None of these
6. A VLAN equals to _______.
a) Router
b) Subnet
c) Firewall
d) Host/Client ID
e) WAN
7. A _______is a major database object used to display information in a printable page format.
a) form
b) query
c) report
d) table
e) None of these
8. Which of the following code detects and corrects error in data?
a) Windows
b) Hamming Codes
c) Encryption
d) All of these
e) None of these
9. What is the best definition of a compiler?
a) A compiler is a utility that copies a program from disk into memory and begins its execution.
b) A compiler is a program that converts all the source code into object code.
c) A compiler is used to detect logical errors in a program by allowing the programmer to trace the code line by line.
d) A compiler is a utility that links a programmer's source code to operating system utilities prior to execution.
e) None of these
10. Password in computer environment means _________.
a) Words needed to be transferred between two computers
b) Secret words the computer communicates with other
c) Secret words known to authorized
d) All of the above
e) None of these
Answers:
1. d) Mesh topology2. a) Niklaus Wirth3. c) erasing and reconstructing the contents of ROM4. b) Numeric entries5. b) format6. b) Subnet7. c) report8. b) Hamming Codes9. b) A compiler is a program that converts all the source code into object code.10. c) Secret words known to authorized
Thanks.