Computer Basics

Description: Computer Fundamentals Computer BasicsB. Tech.
Number of Questions: 15
Created by:
Tags: Computer Fundamentals Computer Basics B. Tech.
Attempted 0/15 Correct 0 Score 0

According to the computing ability and processing speed, computers are classified into several categories. Which of the following does not belong to that category?

  1. Minicomputer

  2. Microcomputer

  3. Metacomputer

  4. Mainframe computer

  5. Supercomputer


Correct Option: C
Explanation:

This is the correct answer because it does not belong to the category of computers.

Which of the following performs arithmetical or logical operations?

  1. CU

  2. ALU

  3. Motherboard

  4. Monitor

  5. RAM


Correct Option: B
Explanation:

ALU performs arithmetical or logical operations on the data received from the CU.

Which of the following is not a basic component of motherboard?

  1. Bus

  2. System clock

  3. RAM

  4. ROM

  5. Microprocessor


Correct Option: C
Explanation:

RAM is not a basic component of motherboard. It is plugged in the motherboard through the memory extension bus.

Represent (-9)10 in Binary number system.

  1. (1001)2

  2. (0110)2

  3. (10001)2

  4. (01110)2

  5. (0111)2


Correct Option: E
Explanation:

This is the correct binary representation of (-9)10.

The interrupts caused due to overflow, division by zero and execution of an illegal op-code are called__________.

  1. maskable interrupts

  2. non-maskable interrupts

  3. software interrupts

  4. trap interrupts

  5. programmed I/O interrupts


Correct Option: D
Explanation:

These types of interrupts are caused due to overflow, division by zero and execution of an illegal op-code.

What is the correct formula for hit ratio?

  1. Hit ratio = number of hits/number of misses

  2. Hit ratio = number of misses/number of hits

  3. Hit ratio = (1-number of hits)/number of misses

  4. Hit ratio = (1 - number of hits)/(number of misses + number of hits)

  5. Hit ratio = number of hits/(number of misses + number of hits)


Correct Option: E
Explanation:

This is the correct answer because the numerator should be ''number of hits'', and denominator should be ''number of misses + number of hits''.

Which of the following technologies was used in fourth generation computers?

  1. LSI and VLSI

  2. Transistor

  3. Vacuum tube

  4. IC

  5. Ultra Large Scale Integration


Correct Option: A
Explanation:

This technology was used in fourth generation computers.

What is the advantage of virtual memory?

  1. It increases the the speed of processing.

  2. The instructions and data cannot be edited by a user.

  3. It helps to run the program that is smaller in size than physical memory.

  4. It helps to store the data having larger size.

  5. It helps to run the program, which is larger than physical memory.


Correct Option: E
Explanation:

This is the correct answer because virtual memory helps to run the program, which is larger than physical memory.

Which of the following registers holds the address of the next instruction to be executed?

  1. Stack Pointer

  2. Instruction Register

  3. Program Counter

  4. Base Register

  5. Memory Address Register


Correct Option: C
Explanation:

It holds the address of the next instruction to be executed.

What is the function of Stack Pointer Register?

  1. It holds the address of the data item to be retrieved from the main memory.

  2. It holds the starting address of the memory stack.

  3. It holds the address of the next instruction to be executed.

  4. It holds the instruction code currently being executed.

  5. It holds the address of the top element of the memory stack.


Correct Option: E
Explanation:

It is done by Stack Pointer.

Which of the following statements is true about UNIX?

  1. In this system, user is identified by the user ID.

  2. UNIX requires 8-10 GB memory.

  3. UNIX is multitasking and just a single-user operating system.

  4. It was developed for a small computer.

  5. It does not permit user to share CPU.


Correct Option: A
Explanation:

This is true because whenever a user wants to access the computer, he will have to provide his user ID.

Which of the following statements is correct about ASCII?

  1. The older version of ASCII had 8 bits.

  2. ASCII stands for American Standard Code for Integer Interchange.

  3. ASCII is only used in computers.

  4. The new version of ASCII has 16 bits.

  5. In ASCII, each character is represented by a unique integer value.


Correct Option: E
Explanation:

In ASCII, each character is represented by a unique integer value. The values 0-31 is used for non-printing control codes, and the range from 32-127 is used to represent the alphabets and common punctuation symbols.

Which of the following commands is used to delete files in UNIX?

  1. $ mv chap1 chap2

  2. $ rm chap1 chap2

  3. $ cp chap1 chap2

  4. $ cat dept.1st

  5. None of these


Correct Option: B
Explanation:

rm command deletes one or more files.

Which of the following holds the condition code flags and other information that describe the status of the executing program?

  1. SR

  2. PSW

  3. MAR

  4. Only (1) and (2)

  5. All of these


Correct Option: D
Explanation:

This is the correct answer because both SR and PSW hold the condition code flags and other information that describe the status of the executing program.

Which of the following is not a feature of Windows 98?

  1. Protection

  2. Improved device support

  3. Support NTFS

  4. Internet Explorer

  5. Customizable taskbar


Correct Option: C
Explanation:

It does not support NTFS but provides capability to convert a drive to FAT#@ without the risk of losing any information.

- Hide questions