Sunteți pe pagina 1din 4

IIMT COLLEGE OF MANAGEMENT

PUT Exam (2019-20)


COURSE NAME: B.COM III YEAR
SUB- IT & IB NAME……………..……
PAPER CODE: - C-304 ROLL NO………………..
Time: 2:00 Hour M.M: 100
This paper contains 100 Questions of one mark each.
1. …… elements in ISA evaluate the reliability of a particular system:
A) Exposers B) Causes C) Controls D) All (a), (b) and (c)
2. If A = (1011)2 , B= (1001)2 , then calculate C= A x B = ?
A) (110011)2 B) (100011)2 C) (100001)2 D) 111100)2
3. Calculate: (110110111)2 = (?)8
A) (567)8 B) (677)8 C) (667)8 D) (766)8
4. Convert: (110111111001)2 = (?)16
A) (9DF)16 B) (9FD)16 C) (FD9)16 D) (DF9)16
5. Which is an incorrect option?
A) 1 byte = 8 bites B) 1 kb = 1024 bytes C) 1mb = (1000) kilo bytes D) 1 nibble = 4 bites
6. …… Ensure that EDI transactions are sent securely are reliably.
A) VAN B) FTPS C) VPN D) FEDI
7. Free E-mail services hot mail started in India by:
A) Saber bhatiya B) Rajeev Gandhi C) WIRO D) Infosys
8. The ……… performs simple mathematics for the CPU.
A) BUS B) DIMM C) CPU D) ALU
9. Any component of the computer you can see and touch:
A) Software B) Peripheral C) Storage D) Hardware
10. The full form of ftp:
A) File transfer process B) File transfer protocol C) File transfer program D) File transfer pole
11. In hexadecimal number system the value of B is:
A) 02 B) 01 C) 11 D) 09
12. Thich of these is known as point and draw device.
A) Mouse B) Scanner C) Printer D) CD-ROM
13. The binary equivalent of (15)10 is:
A) 1110 B) 1101 C) 1111 D) 1011
14. The ‘md’ is the command of
A) Unix B) DOS C) Windows-95 D) FTP
15. 1 MB is equal to:
A) 1024 KB B) 1024 x 1024 bytes C) 1024 x 1024 x 1024 bytes D) (a) and (b) both
16. Programs stored in ROM are called:
A) Hardware B) Firmware C) Software D) None of the above
17. The OSI contains:
A) 5 layers B) 6 layers C) 7 layers D) 8 layers
18. A program for viewing web pages Is called:
A) Word processor B) Spreadsheet C) Protocol D) A browser
19. Among, which is not a web browser:
A) Internet explorer B) Mozilla C) Net scape navigator D) Foxpro
20. A device needed to communicate with computers using telephones lines is a:
A) Disk B) CUP C) VDU D) Modem
21. In ….. Topology if a computer network cable is broken whole network goes down:
A) Bus B) Star C) Ring D) Mesh
22. In communication the meaning of www. Is:
A) With wide web B) Wide world web C) Web wide world D) World wide web
23. Ethernet uses:
A) Bus topology B) Ring topology C) Mesh topology D) All of the above
24. In GUI, G stands for:
A) Giga B) Grand C) Global D) Graphical
25. The full form of FAT is:
A) Fixed allocation table B) Free allocation table C) File allocation table D) File allow table
26. Hexadecimal equivalent of (121)10 is:
A) 81 B) 79 C) 97 D) 72
27. The POS stands for:
A) Place of sale B) Point of scale C) Priority of sale D) None of these
28. New technology includes:
A) Smart phones B) E-Mails C) Tablets D) All of these
29. Which of these is a limitation of WAP?
A) High speed B) High cost C) Large amount of data transfer D) None of the above
30. A term related to sending data to a satellite is ……….
A) Uplink B) Downlink C) Demodulate D) Modulate
31. Computers are essentially….. Tools:
A) Living B) Thinking C) Problem solving D) Reasoning
32. CAM stands for:
A) Computer advanced mobile B) Computer aided manufacturing C) Computer aided mobile D) All
33. Original name of internet was:
A) Apple B) Micro light C) ARPANET C) None of these
34. ….. Is a volatile memory:
A) Cache B) RAM C) ROM D) Auxiliary memory
35. FDDI uses………. As transmission media:
A) Optical fiber B) Coaxial cable C) Open wires D) Twisted pair cables
36. (111100011001)2 =(?)16
A) (F91)16 B) (F19)16 C) (A19)16 D) (A91)16
37. The ASCII value of character ‘f’ is:
A) 102 B) 50 C) 70 D) 072
38. …….. Allows you to connect and login to a remote computer:
A) Telnet B) FTP C) HTTP D) None of these
39. HTTP is a …….. Protocol:
A) Application layer B) Transport layer C) Network layer D) None of these
40. Which of the following is a data link protocol?
A) Ethernet B) Point to point protocol C) HDLC D) All of these
41. All of the following are top level domains except:
A) .com B) .mil C) army D) .org
42. The full form of UDP is:
A) User database protocol B) User disk protocol C) User domain protocol D) User datagram protocol
43. Calculate (1101)2 + (1000)2 = ?
A) (101010)2 B) (2111)2 C) (10001)2 D) (11110)2
44. Which of following language is used for A.I.:
A) FORTRAN B) PROLOG C) COBAL D) C
45. The central device in star topology is:
A) STP server B) Hub/switch C) PDC D) Router
46. What is the commonly used paper size:
A) A4 B) A3 C) A5 D) A6
47. USB devices are:
A) Portable B) Light weight C) Re-writable D) All of above
48. Full form of ASCII ………………………………………………………………………………………………….
A) Full form of BCD …………………………………………………………………………………………………...
49. DPI stands for:
A) Decimal per inch B) Dots per inch C) Delay per inch D) None of these
50. Hard disk is also known as:
A) Winchester disk B) Wind disk C) Air disk D) None of these
51. MS Office does not contain:
A) Word B) Excel C) Power point D) Adobe reader
52. EDI has the advantages of:
A) No time delays B) No uncertainty C) No errors D) All of these
53. Which of the following is not an EDI standard?
A) TCP/IP B) X.12 C) EDIFACT D) X.400
54. The entire string of an EDI message is called:
A) Transaction B) Data segment C) Data document D) Data transaction
55. The physical layer is responsible for:
A) Line coding B) Channel coding C) Modulation D) All of these
56. The network layer concerns with:
A) Bits B) Frames C) Packets D) None of these
57. Which one of the following is not a function of network layer?
A) Routing B) inter networking C) Congesting control D) None of these
58. A 4 byte IP address consist of:
A) Network address B) Host address C) Both (a) and (b) D) None of these
59. Which one of the following tasks is not done by data link layer?
A) Framing B) Error control C) Flow control D) Channel coding
60. Full form of DNS ………………………………………………………………………………………
61. Which one of the following is not used to generic dynamic web page?
A) PHP B) ASP.NET C) JSP D) None of these
62. Information system audit provide the audit service of:
A) IT governance B) Information systems C) Integrated audits D) All of the above
63. ……. Act upon causes in order to reduce exposures:
A) Controls B) Inspection C) Integrated audits D) None of these
64. ……. Audit looks at the information follow:
A) Internal B) IS C) Traditional D) None of these
65. IT audit can be applied in the implementation of:
A) Financial audits B) Performance audits C) Both of (a) and (B) D) None of these
66. Is audit is performed in federal agencies in:
A) Spain B) France C) Germany D) England
67. GIGO stands for:
A) Garbage in garbage out B) Garbage internal garbage out C) Garbage in garbage outsourcing D) None of the above
68. In which language the source program is written:
A) English B) High level C) Symbolic D) Spanish
69. The …….. Is the physical path over which a message travels:
A) P path B) Medium C) Protocol D) Route
70. A set of rules that governs data communication:
A) Protocols B) Standards C) Rfcs D) None of these
71. A computer on internet is identified by:
A) E mail address B) Street address C) I.P. Address D) None of these
72. Internet explorer fail under:
A) Operating system B) Compiler C) Browser D) IP address
73. Moving from one website to another is called:
A) Downloading B) Browsing C) Uploading D) Attachments
74. Calculate : (11111)2 – (1101)2 = ?
A) (11101)2 B) (10001)2 C) (10010)2 D) (10111)2
75. If A = TRUE ,B = FALSE then calculate C = (A)’ and (B)
A) True B) False C) True and false D) None of the above
76. In power point presentation the key for slide show is used:
A) F4 B) F2 C) F8 D) F5
77. Which key is used to check spelling?
A) F3 B) F7 C) F5 D) F9
78. Measurement unit of sound frequency is:
A) Megabyte B) Kilobyte C) Hertz D) Gigabyte
79. Who developed UNIX operating system
A) AT & T B) Intel C) Bell laboratory D) Coral
80. Which one is false from the following:
A) (ABC)16 B) (2109)8 C) (1101)10 D) (1101)2
81. Real time textual talk is popularly known as:
A) Surfing B) Chatting C) Down loading D) (a) and (B)
82. When you open internet, the first page is known as:
A) Master page B) First page C) Main page D) Home page
83. Which one of the following is not a search engine?
A) Bing B) Google C) Yahoo D) Window
84. Firewall in computer is used for
A) Security B) Data Transmission C) Authentication D) Monitoring
85. MAC OS is developed by which company
A) IBM B) Apple C) Microsoft D) Samsung
86. .gif is an Extension of
A) Image file B) Video file C) Audio file D) Word file
87. Computer Hard Disk was First Introduced in 1956 by
A) Dell B) IBM C) Apple D) Microsoft
88. In Computer World, Trojan refer to
A) Virus B) Malware C) Worm D) Spyware
89. What is the extension type of the Excel 2007 files?
A) .xls B) .xlsx C) .xsl D) None of Above
90. Total number of Function keys on Computer Keyboard
A) 10 B) 12 C) 14 D) 8
91. Oracle is a
92. Operating System B) RDBMS C) Interpreter D) Compiler
93. UPS Stands for
A) Universal Power Supply C) Universal Power Source
B) Uninterruptible Power Standby D) Uninterruptible Power Supply
94. System Software is an interface between ___________________________________
A) Hardware & Application Software C) Application Software & User
B) RAM & ROM D) CPU & UPS
95. Which of the following is not a component in multimedia?
A) Audio B) Video C) Data D) Pen drive
96. The __________________ protect system from Hackers
A) Antivirus B) Backup C) Firewall D) Hard disk
97. ‘IoT’ refers to
A) Internet of Things C) Intranet of Teleservices
B) International Organization of Teleservices D) International Organization of Telecommunication
98. Mark Zuckerberg is the owner of
A) Facebook B) Google C) Linux D) LinkedIn
99. Which is an Input Device
A) Monitor B) Printer C) Mouse D) None of these
100. Network Interface Card (NIC) is generally used for
A) Connectivity B) Programming C) Printing D) None of these

S-ar putea să vă placă și