The digital system usually operated

Assignment Help Basic Computer Science
Reference no: EM13899493

1) The digital system usually operated on .........system.

(a) binary (b) decimal (c)octal (d) hexadecimal

2)The First Microprocessor was__________

a) Intel 4004 b) 8080 c) 8085 d) 4008

3)Pentium-I, Pentium-II, Pentium-III and Pentium-IV are recently introduced

microprocessor by__________

a) Motorola b) Intel c) Stephen Mors d) None

4)Which of the Following holds the ROM, CPU, RAM and expansion cards

a) Hard disk b) Floppy disk c) Mother board d) None of the above

5)The communication line between the CPU, memory and peripherals is called a

a)Bus b) line c)media d) none of these

6) The language that the computer can understand and execute is called ______

a) Machine language b) Application software c) System program

d) None of the above

7) Operating system is

a) A collection of hardware components c) A collection of software routines

b) A collection of input-output devices d) none of the above

8) Typical data transfer rate in LAN are of the order of

(a) Bits per sec (b) Kilo bits per sec (c) Mega bits per sec

(d) None of the above

9) Modem stands for

a) A type of secondary memory b) Modulator demodulator

c) Mainframe operating device memory d) None of the above

10)Memories which can be read only are called.............. memories

a)RAM b)ROM c)PROM d)EPROM

 

11)Which of the following holds the ROM, CPU, RAM and expansion cards

a)Hard disk b)Cache memory c)Mother board d)None of the above

12)A computer cannot "boot" if it does not have the

a)Compiler b)Loader c)Operating system d)Assembler

13) The Central Processing Unit:

a) is operated from the control panel.

b) is controlled by the input data entering the system

c) controls the auxiliary storage unit

d) controls all input, output and

processing.

14) Which of the following is not hardware:

a) Magnetic tape b) Printer c) VDU terminal d) Assembler

15) Terminal is a:

a) device to give power supply to computer

b) point at which data enters or leaves the computer

c) the last instruction in a program

d) any input /output device.

16)Which of the following would cause quickest access

a) direct access from a magnetic tape

b) direct access from a hard disk

c) direct access from a floppy disk

d) direct access from a cassette tape

17) The process of retaining data for future use is called

a) reading b)writing c)storing d)coding

18)..........Are used for converting one type of number system in to other form.

a) Encoder b) logic gate c) half adder d) FA

19)......... Are used for converting one type of number system in to the other form

a) Decoder b) logic gate c) half adder d) Full adder

20)Multiplexer means ..............................

a) One in to many b) many in to one c) many in to many d) none of these

21) In logic algebra, variables can assume only two values: either..........or 1.

(a) 2 (b) 0 (c) 3 (d) 4

22) A logic gate is an electronic circuit which

(a) makes logic decisions (b) allows electron flow only in one direction

(c) works on binary algebra (d) alternates between 0&1 values

23) In positive logic, logic gate 1 corresponds to

(a) positive voltage (b) higher voltage level

(c) zero voltage level (d) lower voltage level

24) The output of a 2-input OR the gate is 0 only when it's

(a) both inputs are 0 (b) either input is 1

(c) both inputs are 1 (d) either input is 0

25) When an input electrical signal is applied to a NOT gate, it's output

Signal is

(a) 01011 (b) 10101 (c) 10100 (d)00101

26) A NOR gate is ON only when all it's inputs are

(a) ON (b) positive (c) high (d) OFF

27) A Register is a group of ---------

a) OR gates b)OR & AND gate c)Flip-flops d)None of these

28) Each Flip-flop stores ---------- bits

a) 1 bit B) 8 bit c) 16 bit d)2 bit

 

29)__________is used to create Large program on internet

a) C++ b) HTML c) C language d) Java script

30)The Device which converts instructions into the binary form that is understood by the

computer and supply to the computer is known as__________

a) Input b) Output c) Automatic d) Memory

31)Laptop PCs are also known as __________Computers

a) Mainframe b) Super c) Notebook d) personal

32)Windows 7 is __________

a) Graphics System b) Operating System c) Drawing system d) Processing

system

33)The number system that we use in our day to day life is called the Number

System__________

a) Octal b) Binary c) hexadecimal d) Decimal

 

34. Why registers are used?

35. Why memory is used?

36. What is MBR?

37. Define Access time of memory?

38. What are the basic 3 part of the computer?

39. What is memory cell?

40. What is the purpose of ALU unit in CPU ?

Reference no: EM13899493

Questions Cloud

Discuss the concept of optimal capital structure : Identify and discuss the concept of optimal capital structure
Aes uses the indirect-rijndael algorithm : AES uses the Indirect-Rijndael algorithm  2. packet filter protect networks by blocking packets based on the packets' content
The capabilities of today''s smartphones : 20 years ago, no one could have predicted the capabilities of today's smartphones. 10 years ago, when the smartphones of today were in their infancy, there were hints and clues about the future, but no one knew for sure exactly how it would all devel..
Differences between an industry average or a main competitor : What are the differences between an industry average or a main competitor
The digital system usually operated : 1) The digital system usually operated on .........system. (a) binary (b) decimal (c)octal (d) hexadecimal 2)The First Microprocessor was__________
Explain the difference between net income and cash flow : Explain the difference between net income and cash flow from operating activities for Techno in 2012. Analyze Techno Inc.'s cash flows for 2012 and 2011.
Estimate company''s weighted average cost of capital : Estimate company's weighted average cost of capital
Role of the internet in promoting the globalization trend : What are two reasons that companies of all sizes want to become global? What is the role of the Internet in promoting the globalization trend? What are the three recommendations for making a Web site more appealing to global audiences
What is the expected return for your company using capm? : what is the expected return for your company using CAPM?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are some business uses for inserting a canvas

Write a response that answers the following: What are some business uses for inserting a canvas in a Microsoft® Word document. From these uses, propose a strategy that may help users overcome formatting issues.

  What values if any are stored in x y z

Suppose you are given the following variable declarations: int x, y; double z; char ch; Assume you have the following input statement

  Identify three different types of analysis models

Identify three different types of analysis models (analytical, simulation-based, and surrogate models) that can be used to represent the weight-holding capacity of the table as a function of the geometrical variables.

  T & corporate transformation course assignment

T & Corporate transformation course assignment:

  Compute storage in bytes which is needed for frame buffer

If we want to store 6 bits per pixel in frame buffer, how much storage (in bytes) do we need for the frame buffer?

  Explaining slash dotted and flash crowd

What do terms slash dotted and flash crowd signify to?

  Explain the three general sources of security threats

Explain the three general sources of security threats

  What should you do return computer to an operational state

Because you can't see the display, you can't work with the system. What should you do return the computer to an operational state?

  Explain why there is a chance that the social security trust

1. Explain why there is a chance that the social security trust fund may be depleted by 2035. Does this mean that social security will be bankrupt and will not be able to make any payments to retirees after 2035?2. Consider the savings-investm..

  What is the difference between zero copy

What is the difference between zero copy forwarding and kernel bypassing?

  Discussion on meeting compliance requirements

Propose three factors that should be considered when designing policies for legal and regulatory compliance. Determine how each factor would minimize liability for the organization.

  Write a gui class game

Write a GUI class Game that implements a number guessing game.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd