Question Bank Final
Question Bank Final
Question Bank Final
BCAH 103
Essential of Information Technology
UNIT 1
Long Answer Question:
1. Describe the computer as a system and various hardware componenets of Computer.
2. What is a Computer? Explain it with the context of its characteristics.
3. Explain Various types of Computers.
4. Explain the Basic Computer Application. Also explain various fuctional units of computer.
5. Define Memory and its types. Also describe memory as a System operates in a computer.
6. What is a Primary memory, explain its functioning, its capacity and types of Primary
memory.
7. Why secondary storage are needed also explain types of secondary Storage devices.
8. Why Input devices are require, also explain its types.
9. Types and uses of Output devices
10. What is a software, how program is related to software?
11. Types of Software.
12. Programming languages differ on the basis of there generation, explain it?
13. What makes High level languages better then lower level. What are the advantages of HLL.
14. Explain and differentiate between Compiler and Interpreter.
15. Explain the History of computer.
16. Explain the generation of computer.
17. Explain the components of computer in details.
18. Why memory is essential for computer, also classify various types of it.
19. What is the function of software in a computer system. Descibe various types of it.
20. What makes Operating System, the core of the computer system.
21. Describes briefly the basic concept of information technology?
22. What is information? What are the characteristics? Which are to be aimed at a presentation of
information?
23. Distinguish b/w data, information, knowledge and belief?
24. Classify the different generation of computer on the basis of technology used, processing
power and storage capacity of computer system?
25. Discuss the feature of micro computer, mini computer and super computer also main frame
computer?
26. Discuss the various types of I/P and O/P devices and explain the working of each of them?
27. Write a short note on cache memory? Differentiate it with primary memory.
28. Difference between
(a) Primary and secondary memory
(b) Semiconductor , magnetic and optical memory
(c) RAM and ROM
(d) Cache and RAM
(e) Compiler and interpreter
(f) Hardware and software
29. Explain the organization of file system. What are the operations that can be performed on file system
and explain access permission of a file?
30. What is multiprogramming, Multi-processing and multi-tasking?
d.
e.
f.
g.
h.
BCR
MICR
OCR
OMR
DVD
Ans 8 bits
19) What is EEPROM?
Ans This is electrically erasable programmable read only memory. It can be both programmed
and erased
20) When we use the secondary memory?
Ans The secondary memory is employed as the auxiliary memory which is used to store
information at a lower cost per bit and is permanently memory.
21) When the first generation introdced?
Ans 1942-1955
22) At which time second generation developed.
Ans 1955-1964
23) In which year third generation introduces.
Ans 1964-1975
24) What is printer?
Ans A device that prints text or illustrations on paper.
25) Define analog computer.
Ans Analog computers recognize data as a continuous measurement of a physical property.
26) Give the definition of digital computer.
Ans The states of a digital computer typically involve binary digits which may take the form of
the presence or absence of magnetic markers in a storage medium, on-off switches or relays.
27) Define bit.
Ans A bit is the basic unit of information in computing and telecommunications; it is the amount
of information stored by a digital device or other physical system that exists in one of two
possible distinct states.
28) Which was the electronic component used in first generation computer?
Ans Vacuum tubes
29) Give the name of electronic component that was used in development of the second
generation of computer.
Ans Transistors
30) From which electronic component the third generation computers was developed?
Ans ICs
31) What is the meaning of PROM?
Ans This is programmable read only memory. User can program it according to their needs.
32) What is EEPROM?
Ans this is electrically erasable programmable read only memory. It can be both programmed
and erased.
33) What is EPROM?
Ans an EPROM is an erasable programmable read only memory. User can program its contents
more than once.
34. Define impact and non-impact printer?
Ans Impact- Refers to a class of printers that work by banging a head or needle against an ink
ribbon to make a mark on the paper. This includes dot-matrix printers, daisy-wheel printers, and
line printers.
Non-Impact:- A type of printer that does not operate by striking a head against a ribbon.
35. Define Algorithm?
Ans Algorithm- An algorithm is an effective method expressed as a finite list of well-defined
instructions for calculating a function. Algorithms are used for calculation, data processing, and
automated reasoning. In simple words an algorithm is a step-by-step procedure for calculations.
Terminator
Terminators show the start and stop points in a process.
(Terminal Point, When used as a Start symbol, terminators depict a
Oval)
Ans analog computers recognize data sa a continuous measurement of a physical property. For
example, a clock is an analog device in which the dials move continuously around the numbers.
In general, humans experience the world analogically. However, most analog events can be
simulated digitally.
47. Explain digital computer.
Ans Computers that are in use today are digital computers. They manipulate numbers. Actually
the word digital describes any system based on discontinuous data or events.
48. Explain hybrid computer.
Ans Computers which combines the features of both analog and digital computers are called
hybrid computers. These types of computers are used in missile guide system, space crafts and
other scientific applications
49. Explain micro computer.
Ans A micro computer is a low cost, small, digital computer
50. Explain mini computer.
Ans Mini computers are also known as midrange computers as their cost and computing powers
lie in the middle of micro computers and mainframe computers. Mini computers are used for
multi user and interactive applications in universities, research organizations, banks, government
organizations and industries etc.
51. Explain mainframe computer.
Ans :- Mainframe computers are more powerful and faster computers. They are general purpose
computers with a large area of applications. Such machines are typically operated by
professional programmers and technicians.
52. What is primary memory?
Ans The CPU works hand in hand with main memory to carry out processing. The
semiconductor memory is employed as the main memory.
53. What is secondary memory?
Ans The secondary memory is employed as the auxiliary memory which is used to store
information at a lower cost per bit and is permanently memory.
54. Describe RAM.
Ans This is random access memory and also known as internal or main memory. It is a read and
writes memory of a computer. It is accessible to users.
55. Describe ROM.
Ans This is non-volatile memory. Its contents are retained even if the power supply goes off.
ROM is read only memory. ROM is used for permanent storage of information.
56. Enlist functions of operating system.
Ans At the simplest level, an operating system does two things:
It manages the hardware and software resources of the system. In a desktop computer, these
resources include such things as the processor, memory, disk space, etc.
57. What is operating system?
Ans An operating system (OS) is a set of programs that manages computer hardware resources,
and provides common services for application software. The operating system is the most
important type of system software in a computer system. Without an operating system, a user
cannot run an application program on their computer.
58. Why there is need of operating system.
Ans Without an operating system, a user cannot run an application program on their computer,
unless the application program is self booting.
59) Write a short note on Keyboard.
Ans A keyboard is a device that converts letters, numbers, and other characters into electrical
signals that are machine readable by the computers processor.
Objective Type:1. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
2. ____________ is the science that attempts to produce machines that display the same type of
intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
3. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
Answer: D
B. Software
C. Storage
D. Information
4. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
5. Computers gather data, which means that they allow users to ____________ data.
A. Present
B. input
C. Output
D. store
Answer: B
6. After a picture has been taken with a digital camera and processed appropriately, the actual
print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
7. Computers use the ____________ language to process data.
A. Processing
B. kilobyte
C. Binary
D. representational
Answer: C
8. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
Answer: D
D. numbers.
9. In the binary language each letter of the alphabet, each number and each special character is
made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
10. The term bit is short for:
A. megabyte.
C. binary digit.
Answer: C
11. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
Answer: B
B. binary language.
D. binary number.
C. kilobyte.
D. gigabyte.
D. megabyte
D. terabyte
D. printer.
D. printer
D. CD drives.
18. The ____________, also called the brain of the computer, is responsible for processing data.
A. Motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
19. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
20. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
Answer: A
B. applications.
C. programs.
D. storage devices.
21. Smaller and less expensive PC-based servers are replacing ____________ in many
businesses.
A. Supercomputers
B. clients
C. Laptops
D. mainframes
Answer: D
22. ____________ are specially designed computers that perform complex calculations
extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
23. ____________ is the science revolving around the use of nanostructures to build devices on
an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
24. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
Answer: A
D. One million
D. 1
28. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
29. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
32. System software is the set of programs that enables your computers hardware devices and
____________ software to work together.
A. Management
B. processing
C. Utility
D. application
Answer: D
33. ____________ controls the way in which the computer system functions and provides a
means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
34. The operating system is the most common type of ____________ software.
A. Communication
B. application
C. System
D. word-processing software
Answer: C
35. The two broad categories of software are:
A. word processing and spreadsheet.
C. Windows and Mac OS.
Answer: D
16. You would use ____________ software to create spreadsheets, type documents, and edit
photos.
Answer: application
True and False
1. Data can be a number, a word, a picture, or a sound.
Answer: True
2. Strictly defined, a computer is a data processing device.
Answer: True
3. The discrepancy between the have and have-not with regard to computer technology is
commonly referred to as the digital society.
Answer: False (digital divide)
4. One of the benefits of becoming computer fluent is being a savvy computer user and consumer
and knowing how to avoid viruses, the programs that pose threats to computer security.
Answer: True
5. Employers do not have the right to monitor e-mail and network traffic on employee systems
used at work.
Answer: False
6. Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True
7. Output devices store instructions or data that the CPU processes.
Answer: False (memory)
8. The CPU and memory are located on a special circuit board in the system unit called the
motherboard.
Answer: True
9. The main difference between a supercomputer and a mainframe is that supercomputers are
designed to execute a few programs as quickly as possible, whereas mainframes are designed to
handle many programs running at the same time (but at a slower pace).
Answer: True
10. Being computer fluent means that you should be able to build a computer yourself.
Answer: False
11. The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)
UNIT 2 and 3
Long Answer Question:
1. What is an array & how is an array variable different from an ordinary variable?
2.
How problem definition phase plays an important role in terms of the problem-solving
aspect? Justify your answer.
3.
4.
36. Using insertion sort technique arrange the following list in ascending order
25, 15, 50, 9, 90, 23, 41
37. Using selection sort technique arrange the following list in ascending order
60,45,25,3,16,6,8,50,12,19
38. Discuss bubble sorting, also arrange the following list in ascending order
33, 57, 27, 85, 66, 23, 13, 51
36. Using Merge Sort technique arrange the following list in ascending order
60, 70, 10, 80, 90, 20, 30, 40, 50
b. foundation address
d. base address
2. The memory address of fifth element of an array can be calculated by the formula
a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per memory
cell for the array
b. LOC(Array[5])=Base(Array[5])+(5-lower bound), where w is the number of words per
memory cell for the array
c. LOC(Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of words per
memory cell for the array
d. None of above
Ans: a
3. Which of the following data structures are indexed structures?
a. linear arrays
b. linked lists
c. both of above
d. none of above
Ans: a
4. Which of the following is not the required condition for binary search algorithm?
a. The list must be sorted
b. there should be the direct access to the middle element in any sublist
c. There must be mechanism to delete and/or insert elements in list
d. none of above
Ans: c
d. None
9. Each data item in a record may be a group item composed of sub-items; those items which are
indecomposable are called
a. elementary items
b. atoms
c. Scalars
d. all of above
Ans: d
10. The difference between linear array and a record is
a. An array is suitable for homogeneous data but hte data items in a record may have different
data type
b. In a record, there may not be a natural ordering in opposed to linear array.
c. A record form a hierarchical structure but a lienear array does not
d. All of above
Ans: d
11. Which of the following statement is false?
a. Arrays are dense lists and static data structure
b. data elements in linked list need not be stored in adjecent space in memory
c. pointers store the next data element of a list
d. linked lists are collection of the nodes that contain information part and next pointer
Ans: c
12. When new data are to be inserted into a data structure, but there is no available space; this
situation is usually called
a. underflow
b. overflow
c. Housefull
d. saturated
Ans: b
d. saturated
c. Stacks
d. all of above
16. A data structure where elements can be added or removed at either end but not in the middle
a. Linked lists
b. Stacks
c. Queues
d. Deque
Ans: d
17. A queue is a ________data structure, whereas a stack is a ________data structure.
a. FIFO, LIFO
b. LIFO,FIFO
c. both of these
d. none of these
Ans: a
18. Which data structure allows deleting data elements from front and inserting at rear?
a. Stacks
b. Queues
c. Deques
d. Binary search tree
Ans: b
19. Which of the following is NOT a linear data structure?
a. Linked List
b. Stack
c. Queue
Ans: c
d. Tree
20. The next field in the last node in a singly-linked list is set to_______.
a. 0
b. 1
c. NULL
d. false
Ans: a
b. Adding one.
c. Subtracting One
d. Setting initial value.
Ans: b
10. What do we call an error that occurs while a program is being executed?
a. Syntax error
b. Logical error
c. Execution OR Run time error
d. Bug
Ans: c
11. Which of the following procedure can you use to check an algorithm?
a. Debugging by automated debugger?
b. Desk checking
c. Inspection
d. Consultation.
Ans: a
12. A source program written in High-level language is translate into ____________using a
special translator program?
a. Object program
b. Assembly program
c. IL program
d. Byte code.
Ans: a
13. Violation of the rules of particular programing language creates whats?
a. Syntax error
b. Logical error
c. Execution time error
d. Bug
Ans: a
14. Which of the following are not a translator program?
a. Compiler
b. Assembler
c. Generator
d. Interpreter
Ans: c
15. During testing what type or types of error are eliminated?
a. Syntax error
b. Logical error
c. Execution time error
d. Bug
Ans: a,b,c,d
16. A compiler is a____________
a. Software development environment
b. Code editor
c. Translation program
d. System program
Ans: c
17. Which of the following translation programs process the entire source program as a unit?
a. Compiler
b. Assembler
c. Generator
d. Interpreter
Ans: a
d. Modules
d. Machine code
Answer:A
12. Which of the following are related to structured programming
a. Top-down programming
b. Use of control structures-loop,selection,sequence.
c. Functionl programming
d. OOP
Answer:A,B
13. In modular programming, a pieces of program that performs a single limited function is
known as which of the following?
a. A class
b. A module
c. A loop
d. A sequence
Answer:B
14.The subroutine that is part of the program that uses is________
a. An internal subroutine
b. An external subroutine
c. None
d. Both a and b
Anwer:A
15.After a subroutine has finished its work what will happen?
a. The program end
b. Control is returned transferred to the caller of the subroutine
c. Control is transferred to the exit routine
d. None
Anwer:B
16.The instructions that transfers control to the subroutine and back a join are commonly known
as___________
a. Call instruction
b. Return instruction
c. Call and return instructions
d. Any of the three.
Anwer:C
17. The transfer of control to the subroutine and return control back is possible because
a. The location of the instruction to which control is to return is stored in program
b. The location of the instruction to which control is to return is stored in memory
c. The location of the instruction to which control is to return is stored in register
d. None
Anwer:A
18.a set of instructions for performing a particular task that can be used by any program as the
instructions reside in a library that is external to the using program is__________
a. Internal Subroution
b. External Subroution
c. Module
d. None.
Anwer:B
19. Pseducode is
a. Language dependent
b. Language independent
c. Flowcharting tool
d. .net compilation language.
Anwer:B
20. What values a Boolean filed (variable) can have
a. Any value
b. Only textual data
c. Either true or false
d. Only numeric value
Anwer:C
21. which of the following operation or operations can be used in Boolean algebra
a. NEITHER
b. AND
c. OR
d. NOT
Anwer:B,C,D
22. Say a=5 b=9
Now consider the Boolean expression NOT(a<b)
This expression evaluates to
a. True
b. False
Anwer:B
23 consider the Boolean expression a and b or not c
Which operation evaluated first
a. And
b. OR
c. Not
Anwer:C
UNIT 4
Long Answer Question:
1. Whats the role of documentation in Software Engineering. Describe the types of
documentation used in process development models?
2. What are the characteristics to be considered for the selection of a software development life
cycle model?
3. What is software testing?discuss the role of software testing during software life cycle and
why is it so difficult?
4. What is the purpose of integration testing?differentiate between integartion and sysytem
testing?
5. What are the techniques adopted to perform designing in SDLC. What documents are
generated in designing process.
6. Differentiate between detailed and system design. How designing is different from coding.
7. Explain software testing, its principles, objectives.
8. In which test plan and test cases are designed and in which phase they are implemented. How
verification and validations are done in testing
9. Why feasibility is essential for and SDLC to begin with. Why its required, also describe
different types of feasibility done in SDLC.
Ans: B
8. The testing technique that requires devising test cases to exercise the internal logic of a
software module is called
a. behavioral testing
b. black-box testing
c. grey-box testing
d. white-box testing
Ans: D
9. Black-box testing attempts to find errors in which of the following categories
a. incorrect or missing functions
b. interface errors
c. performance errors
d. all of the above
Ans: D
10. Which of the following is not a type of feasibility study
a. Economic b. Political c. Technical d. Cultural feasibility
Ans: D
11. Which of the following document is generated to support end user in software engineering
a. Logical design
b. manuals
c. Detailed design
d. Test report.
Ans: B
12. Which one is not a type of testing
a. Black box testing b. white box testing
Ans: D
d. Glass testing
b. Schedule
C. Quality.
D. Personal.
Ans: D
14. Which of these testings are conducted by coder and not by tester.
a. Black box testing
b. unit testing
d. Beta testing
Ans: B
15. Unit testing involves which type of testing
a. Black box testing
b. white box
c. Stress testing
d. Beta testing
Ans: A
16. Which is not the disadvatage of waterfall model.
a. Involves Client interaction.
b. Assumes that requirements can be specified and frozen early.
c. May fix hardware and other technologies too early or to remain fixed during development.
d. Very document oriented, requiring docs at the end of each phase.
Ans: A
TRUE OR FALSE
1. Design documents are generated before Analysis document.
Ans: False
2. Modification of a program means to change the structure of program.
Ans: True
3. Maintainance of a program means to change the structure of program
Ans: False
4. Project comprisess of multiple process.
Ans: True
5. Accepting Testing is generally done by end users / customer in Customer environment with real data.
Ans: True
6. Black Box covers testing the code of a program.
Ans: False
UNIT 5
LONG ANSWER QUESTION
1. What are database systems? List out its characteristics.
2. Explain briefly about E-R data model.
3. What is E-R diagram and what are their objectives?
4. Explain in detail about ER model.
5. Define the terms: i) DDL (ii) DML
6. Explain various DML commands with neat syntax.
7. What do you mean by SQL ?What are the characteristics of SQL ?
8. What is the role of Database Administrator ?
9. What do you mean by Database and Database Management System ?
10. Define the following terms
(a). Instances (b) schemas (c) logical schema (d) physical schema
11. Give the distinction between primary key, candidate key and super key.
12. Define Data model? What are the different types of data models?
13. Define the following terms :
a. Field
b. Record
14. What are the data models present in DBMS?
15. What are the different type integrity constraints?
16. What is meant by normalization?
17. What are the set operations in SQL? Give examples.
18. How are the nulls represented in database system?
Practical Exersice
1.Create the following tables:
Student(roll_no,name,d_o_b,course_id)
Course(course_id,name,fee,duration,status)
Query:
1. Select record of those student who have opted for courses whose fees is greater then 40,000
2. Select courses whose duration is less then or equal to 36 months.
2. Create the following tables:
Branch(branch_id,branch_name,branch_city)
Customer(customer_id,customer_name,customer_city,branch_id)
Query:
1. List of those customers who live in the same city as the branch in which they have account.
2. List of all those customers who have an account more than one branch.
3. Create the following tables:
Branch(branch_id,branch_name,branch_city)
Customer(customer_id,customer_name,customer_city,branch_id)
Query:
1. List of those branch who have more then 1 customer
2. List of all those customers who have an account more than one branch.
4. Create the following tables:
Student(roll_no,name,d_o_b,course_id)
Course(course_id,name,fee,duration)
Query:
1. List of those entire Student who are between 18-19 years of age and have opted for MCA
course.
2. List of all those courses in which numbers of students are less then 2.
5. Create the following tables:
Student(roll_no,name,category,district,state)
Student_Rank(roll_no,marks,rank)
Query:
1. List name of the students who are having same rank but they reside in different district.
2.
List students name they belongs to same category with same rank.
b.
c.
d.
e.
Database normalization is a data design and organization process applied to data structures based
on rules that help build relational databases. In relational database design, the process of
organizing data to minimize redundancy. Normalization usually involves dividing a database into
two or more tables and defining relationships between the tables. The objective is to isolate data
so that additions, deletions, and modifications of a field can be made in just one table and then
propagated through the rest of the database via the defined relationships.
c BOOLEAN
d RAW
d. Update.
c. Table
d.user permissions
d. Super user
10. Which of these constraint perform the operation of refrential constraint in SQL
a.primay key
b. foreign Key
c. Not null
d. check
Ans: B
TRUE OR FALSE
1. A database can have multiple view level
Ans: true
2. A table can have only one primary key
Ans: True
3. Foriegn key attribute may not be primary key attribute in the refered table
Ans: False
4. Three tier Architecture of DBMS involve Application server between Client and Database
server
Ans: True
5. Unique key attribute cannot have NULL values
Ans: False
6. Insert is a DDL statement
Ans: false
7. After Commit no rollback can be performed
Ans: True
8. Only DBA can create and Grant permission in DBMS
Ans: True
9. Attribute which is set primary key cannot have only unique records.
Ans: True