Common Computer Based Questions Asked In Competition Exams 2018

By | February 8, 2018

Computer Based Questions Asked In Competition Exams

General Computer Questions Asked In Government Exams, General Computer Questions And Answers, Computer Based Questions Asked In Competition Exams, Computer Questions For Competition Exams, Questions Asked In Competition Exams

Common Questions Asked In Competition Exams: Hello guys as you all know that nowadays every question paper contains Computer Based Questions. So I guess many of you want’s to know that which are the common questions asked in every Govt Or Private Exam. Here are so many exams like SSC, UPSC, IBPS and other exams which contain Computer Based Questions. You will get all the Computer Questions Asked In Competition Exams, like Computer Questions Asked In Bank Exams, Computer Questions Asked In ISRO Exam and Questions Asked In RSCIT. So if you want to get Previous Papers then you can follow our below sections.

Computer Based Questions Asked In Competition Exams, Computer Based Questions Asked In RSCIT Exam, Common Questions Asked In Competition Exams, Computer Based Questions, Computer-Based Questions Asked In ISRO Exam, Computer-Based Questions Asked In NET Exam, Computer-Based Question Asked In GATE Exam, Computer Questions Asked In Competition Exams, Computer Questions Asked In Bank Exams, Computer Questions Asked In ISRO Exam, Questions Asked In RSCIT,

Computer Based Questions Asked In RSCIT Exam

1. Keeping email addresses in mind, the correct option is:
A. they must always contain @ symbol
B. they can never contain blank spaces
C. both a and b
D. none of the above

Ans: C

2. When saving a document, a difference between “Save” and “Save As” is:
A. No difference
B. ‘Save’ will save a file that has already been assigned a name and saved location
C. ‘Save As…’ allows one to change the name and saved location for the file
D. Both b & c

Ans: D 

3. Which of the following is not the font-style in MS Word:
A. Subscript
B. Bold
C. Regular
D. Italics

Ans: A

4. Which is/are the function/s of Operating System:
A. Memory Management.
B. Process Management.
C. File Management.
D. All of the above.

Ans: D

5. While drawing a table, the shape of the mouse pointer (in MS Word ) appears to be like_________.
A. Pencil
B. Remains the same
C. Straight Line
D. Square shape

Ans: A

6. Which of the following file format cannot be added to a PowerPoint presentation:
A. .jpeg
B. .htm
C. .gif
D. .wav

Ans: B

7. Which keys combination is used to insert a new slide in a PowerPoint presentation:
A. Ctrl + X.
B. Ctrl + N.
C. Ctrl + M.
D. Ctrl + Z.

Ans: C

8. The expanded form of the abbreviation ‘ASCII’ is:
A. American Social Code for Information Interchange.
B. American Standard Code for Information Interchange.
C. Australian Social Code for Information Interchange.
D. Apple Standard Code for Information Interchange.

Ans: B

9. In a modern keyboard the number of function keys are:
A. 8.
B. 10.
C. 11.
D. 12.

Ans: D

10. ‘HDMI’ port stands for
A. High Definition Multimedia Interface.
B. High Definition Memory Interface.
C. High Definition Memory Interchange.
D. High Definition Markup Interface.

Related:  {rrchubli.in} SWR 02 Cultural Quota Group C Recruitment 2018

Ans: A 

11. What is the valid example of IP address 
A. [email protected]
B. 127.0.0.1
C. 7E:2D:11:34
D. www.google.com

Ans: B

12. What is the full form of USB
A. Universal  Sequence Bus
B. Union Sequence Bus
C. Universal Serial Bus
D. Universal Serial Book

Ans: C

Computer-Based Questions Asked In ISRO Exam 2016

1. ……… is the most popular internet activity
A. Art
B. Shopping
C. Searching
D. Communicator

Ans. B

2. Which of the following is not an example of an operating system
A. Windows 10.
B. BSD Unix.
C. Microsoft Office XP.
D. Ret Hat Linux.

Ans. C

3. A ——– is a document that provides a preformatted layout for text and graphics as well as some content 
A. Wizard.
B. Template.
C. Letter.
D. Thumbnail.

Ans. B

4. Which among the following is not an internet browser 
A. Netscape Navigator
B. Chrome.
C. Opera.
D. Drupal.

Ans. D

5. ———– are used to identify a user who returns to a website.
A. Cookies
B. Plugins.
C. Scripts.
D. ASP’s.

Ans. A

6. Which among the following shortcut keys is used to check spelling while using a word document
A. F2
B. F1.
C. F10.
D. F7.

And. D

7. Microsoft Internet Explorer & Netscape navigator are example of 
A. Internet Browser program
B. Internet Service Providers
C. Publishing software
D. Operating Systems

Ans: A

 

Computer-Based Questions Asked In NET Exam 2014

1. Infrared signals can be used for short-range communication in a closed area using _______ propagation.
(A) ground
(B) sky
(C) line of sight
(D) space

Ans: C

 

2. A bridge has access to _______ address in the same network.
(A) Physical
(B) Network
(C) Datalink
(D) Application

Ans: A

3. The minimum frame length for 10 Mbps Ethernet is _______ bytes and maximum is _______ bytes.
(A) 64 & 128
(B) 128 & 1518
(C) 1518 & 3036
(D) 64 & 1518

Ans: D

4. The regular grammar for the language L = {w|na (w) and nb (w) are both even, w ∈ {a, b}*} is given by : (Assume, p, q, r and s are states)
(A) p → aq | br | λ, q → bs | ap
r → as | bp, s → ar | bq, p and s
are initial and final states.
(B) p → aq | br, q → bs | ap
r → as | bp, s → ar | bq, p and s
are initial and final states.
(C) p → aq | br | λ, q → bs | ap
r → as | bp, s → ar | bq
p is both initial and final states.
(D) p → aq | br, q → bs | ap
r → as | bp, s → ar | bq
p is both initial and final states.

Ans: C

5. KPA in CMM stands for
(A) Key Process Area
(B) Key Product Area
(C) Key Principal Area
(D) Key Performance Area

Ans: A

6. _______ of a system is the structure or structures of the system which comprise software elements, the externally visible properties of these elements and the relationship amongst them.
(A) Software construction
(B) Software evolution
(C) Software architecture
(D) Software reuse

Related:  List Of Current Cabinet Ministers Of India | Current Ministers Of India

Ans: C

7. Regression testing is primarily related to
(A) Functional testing
(B) Development testing
(C) Data flow testing
(D) Maintenance testing

Ans: D

8. Which of the following suffices to convert an arbitrary CFG to an LL(1) grammar?
(A) Removing left recursion alone
(B) Removing the grammar alone
(C) Removing left recursion and factoring the grammar
(D) None of the above

Ans: D

9. A shift reduce parser suffers from
(A) shift reduce conflict only
(B) reduce reduce conflict only
(C) both shift-reduce conflict and reduce reduce conflict
(D) shift handle and reduce handle conflicts

Ans: C

10. In function point analysis, the number of complexity adjustment factors is
(A) 10
(B) 12
(C) 14
(D) 20

Ans: C

Computer-Based Question Asked In GATE Exam 2015

1. A software requirements specification (SRS) document should avoid discussing which one of the following?
(A) User interface issues
(B) Non-functional requirements
(C) Design specification
(D) Interfaces with third party software

Ans: C

2. In the context of abstract-syntax-tree (AST) and control-flow-graph (CFG), which one of the following is TRUE?
(A) In both AST and CFG, let node N2 be the successor of node N1. In the input program, the code corresponding to N2 is present after the code corresponding to N1
(B) For any input program, neither AST nor CFG will contain a cycle
(C) The maximum number of successors of a node in an AST and a CFG depends on the input program
(D) Each node in AST and CFG corresponds to at most one statement in the input program

Ans: C

3. A system has 6 identical resources and N processes competing for them. Each process can request atmost 2 resources. Which one of the following values of N could lead to a deadlock?
(A) 1
(B) 2
(C) 3
(D) 4

Ans: 6

4. 3 Identify the correct order in which a server process must invoke the function calls accept, bind, listen, and recv according to UNIX socket API.
(A) listen, accept, bind, recv
(B) bind, listen, accept, recv
(C) bind, accept, listen, recv
(D) accept, listen, bind, recv

Ans: B

5. Assume that the bandwidth for a TCP connection is 1048560 bits /sec. Let α be the value of RTT in milliseconds (rounded off to the nearest integer) after which the TCP window scale option is needed. Let β be the maximum possible window size with window scale option. Then the values of α and β are
(A) 63 milliseconds, 65535 x 214
(B) 63 milliseconds, 65535 x 216
(C) 500 milliseconds, 65535 x 214
(D) 500 milliseconds, 65535 x 216

Ans: C

6. Consider six memory partitions of sizes 200 KB, 400 KB, 600 KB, 500 KB, 300 KB and 250 KB, where KB refers to a kilobyte. These partitions need to be allotted to four processes of sizes 357 KB, 210 KB, 468 KB and 491 KB in that order. If the best-fit algorithm is used, which partitions are NOT allotted to any process?
(A) 200 KB and 300 KB
(B) 200 KB and 250 KB
(C) 250 KB and 300 KB
(D) 300 KB and 400 KB

Related:  TSTRANSCO Admit Card 2018 | 1100 JLM Post Admit Card | tstransco.cgg.gov.in

Ans: A 

7. Consider the following transaction involving two bank accounts x and y.
read(x); x := x – 50; write(x); read(y); y:= y + 50; write(y)
The constraint that the sum of the accounts x and y should remain constant is that of
(A) Atomicity
(B) Consistency
(C) Isolation
(D) Durability

Ans: B 

8. Consider six memory partitions of sizes 200 KB, 400 KB, 600 KB, 500 KB, 300 KB and 250 KB, where KB refers to kilobyte. These partitions need to be allotted to four processes of sizes 357 KB, 210 KB, 468 KB and 491 KB in that order. If the best-fit algorithm is used, which partitions are NOT allotted to any process?
(A) 200 KB and 300 KB
(B) 200 KB and 250 KB
(C) 250 KB and 300 KB
(D) 300 KB and 400 KB

Ans: A

9. Consider the intermediate code given below.
  (1) i = 1
  (2) j = 1
  (3) t1 = 5 ∗ i
  (4) t2 = t1 + j
  (5) t3 = 4 ∗ t2
  (6) t4 = t3
  (7) a[t4] = -1
  (8) j = j + 1
  (9) if j<=5 goto (3)
  (10) i=i+1
  (11) if i <5 goto (2)
The number of nodes and edges in the control-flow-graph constructed for the above code, respectively, are
(A) 5 and 7
(B) 6 and 7
(C) 5 and 5
(D) 7 and 8

Ans: B

10. Which one of the following hash functions on integers will distribute keys most uniformly over 10 buckets numbered 0 to 9 for 𝑖𝑖 ranging from 0 to 2020?
(A) ℎ(𝑖𝑖) = 𝑖𝑖 2 mod 10
(B) ℎ(𝑖𝑖) = 𝑖𝑖 3 mod 10
(C) ℎ(𝑖𝑖) = (11 ∗ 𝑖𝑖 2) mod 10
(D) ℎ(𝑖𝑖) = (12 ∗ 𝑖𝑖) mod 10

Ans: B 

General Computer Questions And Answers | Free Mock Test Of Computer Questions

So guys if you have got the idea of which questions can be asked in competitive exams then now you are prepared for computer exams. And If you want to know other questions asked in competition exams then you can click on the links given below. you will get knowledge of latest current affairs and General knowledge and also about the Indian and World Politics. So if you want all this then the links are given below. Just follow these links for more.

Click Here For Rajasthan GK

Click Here For List Of All Indian Prime Ministers

Click To Know First and Current CM Of All States Of India

Click To Know First and Current CM Of All States Of India

Click Here For Latest Current Affairs

Click Here For All Current Cabinet Ministers List

Leave a Reply

Your email address will not be published. Required fields are marked *