Future of world with technology grow, thrive, empower yourself, one step at a time. Sucess unlocked.
The journey of self-motivation and personal growth is a lifelong path, filled with twists and turns, triumphs and setbacks. By embracing this journey, we can develop the skills, confidence, and resilience needed to achieve our goals and live a fulfilling life. I hope that my insights and experiences will inspire and motivate you to embark on your own journey of self-discovery and growth. Join me as I share insights, experiences, and practical tips on living a fulfilling life.
Saturday, July 5, 2014
Wednesday, July 2, 2014
Multiple choice questions on Computer
Multiple choice questions on Computer
1) Infrared signals can be used for short range communication in a closed area using _______propagation.
A) ground
B) sky
C) line of sight
D) space
2)A bridge has access to address in the same network.
A) Physical
B) Network
C) Data Link
D) Application
3) The minimum frame length for 10 Mbps Ethernet is _______ bytes and maximum is ______bytes
A) 64 & 128
B) 128 & 1518
C) 1518 & 3036
D) 64 & 1518
4) The bit rate of a signal is 3000 bps .If each signal unit carries 6 bits ,the baud rate of the signal is_____.
A) 500 baud/sec
B) 1000 baud/sec
C) 3000 baud/sec
D) 18000 baud/sec
5) KPA in CMM stands for
A) Key Process Area
B) Key Product Area
C) Key Principal Area
D) Key Performance Area
6) In function point analysis the number of complexity adjustment factors is
A) 10
B) 12
C) 14
D) 20
7) A shift reduce parser suffers from
A) shift reduce conflict only
B) reduce reduce conflict only
C) both shift reduce conflict and reduce reduce conflict
D) shift handle and reduce handle conflicts
8) How many different truth tables of the compound propositions are there that involve the propositions p & q?
A) 2
B) 4
C) 8
D) 16
9) While (87) printf("computer");
A) print "computer" 87 times
B) print "computer" 0 times
C) print "computer" 1 times
D) print "computer" infinite times
10) Manager salary details are hidden from the employee . This is called
A) Conceptual level data hiding
B) Physical level data hiding
C) External level data hiding
D) Local level data hiding
11)Which of the following is the correct value returned to the operating system upon the successful completion of a program?
A) 0
B) 1
C) -1
D) Program do not return value
12)A clustering index is created when ______.
A) primary key is declared and ordered
B) no key ordered
C) foreign key ordered
D) there is no key and no order
13)A friend function can be used to
A) avoid arguments between classes
B) allow access to classes whose source code is unavailable
C) allow one class to access an unrelated class
D) None of the above
Click here for more questions
A) ground
B) sky
C) line of sight
D) space
2)A bridge has access to address in the same network.
A) Physical
B) Network
C) Data Link
D) Application
3) The minimum frame length for 10 Mbps Ethernet is _______ bytes and maximum is ______bytes
A) 64 & 128
B) 128 & 1518
C) 1518 & 3036
D) 64 & 1518
4) The bit rate of a signal is 3000 bps .If each signal unit carries 6 bits ,the baud rate of the signal is_____.
A) 500 baud/sec
B) 1000 baud/sec
C) 3000 baud/sec
D) 18000 baud/sec
5) KPA in CMM stands for
A) Key Process Area
B) Key Product Area
C) Key Principal Area
D) Key Performance Area
6) In function point analysis the number of complexity adjustment factors is
A) 10
B) 12
C) 14
D) 20
7) A shift reduce parser suffers from
A) shift reduce conflict only
B) reduce reduce conflict only
C) both shift reduce conflict and reduce reduce conflict
D) shift handle and reduce handle conflicts
8) How many different truth tables of the compound propositions are there that involve the propositions p & q?
A) 2
B) 4
C) 8
D) 16
9) While (87) printf("computer");
A) print "computer" 87 times
B) print "computer" 0 times
C) print "computer" 1 times
D) print "computer" infinite times
10) Manager salary details are hidden from the employee . This is called
A) Conceptual level data hiding
B) Physical level data hiding
C) External level data hiding
D) Local level data hiding
11)Which of the following is the correct value returned to the operating system upon the successful completion of a program?
A) 0
B) 1
C) -1
D) Program do not return value
12)A clustering index is created when ______.
A) primary key is declared and ordered
B) no key ordered
C) foreign key ordered
D) there is no key and no order
13)A friend function can be used to
A) avoid arguments between classes
B) allow access to classes whose source code is unavailable
C) allow one class to access an unrelated class
D) None of the above
Click here for more questions
Subscribe to:
Comments (Atom)
Featured posts
Ethiopian culture calendar language
Ethiopian culture, calendar, language The Ethiopian language, specifically Amharic , uses a script called Ge'ez script . It consists of...
Popular posts
-
Solved practical slips of 12th Computer Science journal Program 1:- Write a function in C++ that exchanges data (passing by refer...

