Chapter1-Computer System
MCQ Questions
1.Tabulating machine is invented by
(a)Blaize Pascal
(b) Herman Hollerith
(c)Charles Babbage
(d) Joseph Mary Jacquard
2._____is known to be the first programmer.
(a)Lady Ada Lovelace
(b) Charles Babbage
(c)Bill Gates
(d) Gottfried Leibniz
3.printers are being used ni manufacturing industries to create prototypes of products.
(a) Inkjet
(b) Laserjet
(c) Dot matrix
(d) 3D-printer
4.While processing, the CPU stores the data as well as instructions ni its local memory called
(a) Information (b) ICS
(c) Registers (d) None of these
5.Who introduced the concept of stored program computer which was capable of storing data as wel
as program ni the memory
(a)John Von Neumann
(b)Charles Babbage
(c)Herman Hollerith
(d) John WMauchly
6.____is a silicon chip which contains entire electronic circuit on a very small area.
(a)CPU
(b) Integrated Circuit
(c)RAM
(d) ROM
7.Data entered through input device is temporarily stored in the memory
(a) cache
(b) secondary
(c) main
(d) None of these
8.___ is the first binary programmable computer based on Von Neumann architecture.
(a) Analytical Engine
(b) Difference Engine
(c) ENIAC
(d) Pascaline
9.____ introduced its first personal computer (PC) for the home user ni 1981
(a) Microsoft
(b) HP
(c) Apple
(d) IBM
10.1001 is an example for
(a)Bit
(b) Byte
(c) Nibble
(d) None
11.1 Zettabyte =
(a)1024 YB
(b) 1024 EB
(c) 1024 PB
(d) 1024 TB
12.SLSI means
(a) Super Large-Scale Integration
(b) Super Large System Integration
(c) System Large Scale Integration
(d) Super Long Scale Integration
13.The startup program (boot loader) that loads the operating system into primary memory, is stored
in—————
(a)RAM
(b) ROM
(c)Cache memory
(d) Secondary memory
14.Example for FOSS is
(a) Mozilla Firefox. (b) Skype
(c) Adobe Reader (d) Tally
15.Examples of operating systems with gesture-based interface include
(a) Ubuntu
(b)iOS
(c) Macintosh
(d) Unix
16.Information about the processes being executed on a computer can be activated using
(a) CtrI+Alt+Delete
(b)Windows key
(c) F10
(d)CtrI+Shift+Delete
17.Input device used to enter audio-based command is
(a) OCR
(b)Speaker
(c) MICR
(d)None of these
18.Compiler is
(a) Programming tool. (b) System software
(c) Application software. (d) None of these
19.To speed up the operations of the CPU, a very high-speed memory is placed between the CPU
and the primary memory known as
(a) cache
(b)registers
(c)ROM
(d)main memory
20.The secondary memory is
(a) volatile
(b) non-volatile
(c) Both (a) and (b)
(d)None of these
21._____s bidirectional.
(a) Data bus
(b)Address bus
(c) Control Bus
(d)All of these
22.______is the maximum number of bits that a microprocessor can process at a time.
(a)Memory Size
(b)Clock Speed
(c) Word size
(d) Cores
23.CPU with four cores is called as
(a) dual-core processor
(b) quad-core processor
(c) octa-core processor
(d) None of these
24._____is embedded in smart home appliances.
(a) Microprocessor
(b)Microcontroller
(c) Both (a) and (b)
(d)None
25.An image is a collection of pixels
(a) Red, Gray, Blue
(b)Red, Green, Black
(c) Red, Green, Blue
(d)Red, Green, White
26.Online railway ticket bookings shows
(a) Structured data
(b)Unstructured data
(c) Semi-structured data
(d)Al of theses
27.Example for semi structured data are
(a) HTML page
(b)csv file
(c) email document
(d)Al of these
28.Fetching data from the storage devices, for its processing as per the user requirement is called
(a) Data entry
(b) Data Capturing
(c) Data Storage
(d) Data Retrieval
29.Examples of system software include
(a) Operating systems
(b) System utilities
(c) Device drivers
(d) All of these
30.Fedora is an example of
(a)System Utility
(b) Operating System
(c)Programming Language
(d) Application software
31.Example for system utilities
(a) anti-virus software
(b) defragmentation tool
(c) formatting utility
(d) All of these
32.IDLE in Python is an example for
(a) Code editor
(b) Compiler
(c) Interpreter
(d) Translator
33.____are machine dependent languages
(a)Assembly languages
(b) High level languages
(c)Middle level languages
(d) None
34.The program code written in assembly or high-level language is called
(a) Object code
(b) Program code
(c) Machine code
(d) None
35.C++, Java, Python is an example of
(a)Assembly languages
(b) High level languages
(c) Middle level languages
(d) Machine level languages
36.___translates one line at a time instead of the whole program at one go.
(a) Compiler
(b) Assembler
(c) Interpreter
(d) None of these
37.Example for DIE
(a) Netbeans
(b) Eclipse
(c) Atom
(d) All of these
38._____is a not a generalized software but tailor-made software.
(a) Accounting software
(b)iTunes
(C) GIMP
(d) Adobe Photoshop
39.Fedora is an example of
(a)System Utility
(b) Operating System
(c) Programming Language
(d) Application software
40.In Android OS (reference to voice based interface) we have
(a) Siri
(b) OK Google
(c) Cortana
(d) None
41.Function of Operating System is
(a) Memory Management
(b) Device Management
(c) File Management
(d) All of these
42.Operating System with touch-based interface is
(a) Android
(b) iOS
(c) Both (a) and (b)
(d) None of these
43.____lets users run programs or give instructions to the computer in the form of icons, menus and
other visual options.
(a) Graphical User Interface
(b) Command Based Interface
(c) Touch Based Interface
(d) Voice Based Interface
44.Which of these computer languages do we use in artificial intelligence?
(a) PROLOG
(b) FORTRAN
(c) COBOL
(d) C
45.Example of operating systems with command-based interface is
Windows 8
(b) Linux
(c) Dos
(d) Ubuntu
46.Which of the following are application software?
(a) Adobe Photoshop
(b)Websites
(c)School Management Software
(d)All of these
47.A Computer system can work without
(a) Application software
(b) System software
(C) Both (a) and (b)
(d) None of these
48.Writing code in______language is more difficult than writing code in Python.
(a) Machine
(b) High level
(c) Low level
(d) None of these
49. Threats with digital data is
(a) tI can be deleted by accidently.
(b)Storage devices can malfunction or crash down resulting ni the deletion of data stored.
(c) Hacker or malware can steal the digital data intentionally.
(d) All of these
50. Which of the following devices are used to capture data in digital format?
(a) Barcode reader (b) OCR
(c) QR code scanner (d) All of these
51.Suppose there is a computer with RAM but no secondary storage. Can we install a software on
that computer?
(a Yes
(b) No
(c) Depends upon the processor
(d) Depends upon the RAM
52. Arrange Petabyte(PB), Yottabyte(YB) and Zettabyte(ZB) in increasing order.
(a) PB, YB, ZB
(b) ZB, YB, PB
(c) PB, ZB, YB
(d) YB, ZB, PB
53._____is the computer program that would convert an assembly language to the machine
language.
(a) Interpreter
(b) Compiler
(c) Assembler
(d) None of these
54.A _____ is useful for a visually challenged person to understand the textual output generated by
computers.
(a)Braille display monitor
(b)LED monitor
(c) 3-D model
(d)Braile keyboards
55.The first generation of computers used for switching circuits and magnetic drums for memory.
(a) Transistors
(b)Vacuum tubes
(c) ICS
(d)Microprocessors
56. Uses of Super Computers include:
(a) Weather forecasting
(b)Animated graphics like in Hollywood movies
(c) Space science
(d)All of these
57.MOUSE stands for
(a) Mechanically operated user single engine
(b)Machine operated user single engine
(c) Manually operated user single engine
(d)None of these
58. 2^100 bytes = 1024 Bronto bytes =
(a)1Geop byte
(b)1 Yotta byte
(c)1Peta byte
(d)1Zeta byte
59. ENIAC stands for
(a)Electronic Numerical Integrator and computer
(b)Electrical Numerical Integrator and Computer
(c) Electrical Numerical Integrator and calculator
(d)Electrical Numerical Integrator and Calculator
60.Charles Babbage, British mathematician and engineer, designed an automatic calculating machine
called Difference Engine in the year
(a) 1722
(b) 1822
(c) 1900
(d) 1902