Computer And Emerging Technology MCQs For Job Test Preparation

1 - ______ generation of computer started with using vacuum tubes as the basic components.





1st

2 - _________ are about storytelling and story meaning.





narratives

3 - ___________ is a step in which design is translated into machine-readable form.





Coding

4 - ______________ leads to concurrency.





Parallelism

5 - ______computers are lower to mainframe computers in terms of speed and storage capacity.





Mini

6 - A _______ can be recorded using a normal light source.





Photograph

7 - A ____________(invented by Paul Roget in 1828) is a simple mechanical toy which creates the illusion of movement.





Thaumatrope

8 - A hardware based system that has autonomy, social ability and reactivity.





Autonomous Agent

9 - A planned program if work that requires a definitive amount of time, effort and planning to complete.





Project

10 - A programming technique in which the focus is on doing things.





procedural

11 - A testing conducted at the developers site under validation testing.





alpha

12 - A type of analysis that attends to the repetition and frequency of features, their proportions within the text, and consequent assumptions about significance.





Content

13 - A type of VR environment in which subjects are visually isolated from the real environment.





Immersive

14 - An attack in which the site is not capable of answering valid request.





Denial of service

15 - An electronic document that establishes your credentials when you are performing transactions.





Digital certificate

16 - An encryption technique with 2 keys is ______________





Public key cryptography

17 - Face recognition system is based on _____________





applied AI

18 - In this generation Time sharing, Real time, Networks, Distributed Operating System was used.





4th

19 - Locating or identifying the bugs is known as ___________





Testing

20 - RMI uses stub and skeleton for communication with the ________ object.





remote

21 - Saas stands for?





Software as a service

22 - Several instructions execution simultaneously in ________________





parallel processing

23 - Several instructions execution simultaneously in?





parallel processing

24 - Technologies that allow the user to see the real world, with virtual objects composited in the real world.





AR

25 - The idea of _________is central to understanding the production of meaning through texts.





Represntation

26 - The information that gets transformed in encryption is ____________





Plain text

27 - These cloud services are of the form of utility computing i.e. the _________ uses these services pay-as-you-go model.





Cloud users

28 - This concept allows routines to use data again at different times.





Polymorphism

29 - Which of the following is not involved in working of IoT?





Server

30 - Which of these is a part of network identification?





UserID

31 - WTLS stands for?





Wireless Transport Security Layer

32 - _________ are the web-based interactive applications to express and share your ideas and thoughts with interested people.





Blog

33 - __________ analysis regards texts as collections of signs or paradigms and possible meanings, operating within the bounds of various codes.





Semiotic

34 - __________ describes the effect of involving the reader with the story, of constructing it as truth.





Identification

35 - __________ represents a particular instance of a class.





object

36 - ___________ animation is used to animate things that are smaller than life size.





Stop motion

37 - ___________ is an emerging branch in computer science, which interprets means and method of making computers think like human beings.





AI

38 - ___________ is done in the development phase by the debuggers.





Debugging

39 - _____________ enables the migration of the virtual image from one physical machine to another.





virtualization

40 - ______________ are used for solving complex application such as Global Weather Forecasting.





Super Computers

41 - ______________ keep track of position.





Motion Trackers

42 - ________________ is a paradigm of distributed computing to provide the customers on-demand, utility based computing service.





Cloud Computing

43 - ____________is basically a form of pictorial presentation.





Animations

44 - A ________ is tested to ensure that information properly flows into and out of the system.





module interface

45 - A ______________ represents the need of information in the program without the presenting the details.





abstraction

46 - A ______________________ is a display device, worn on head as a part of helmet that has a small display optic.





HMD

47 - A basic unit of object-oriented programming.





object

48 - A computer that operates on digital data.





digital

49 - A concept that combines data and functions into a single unit called class.





encapsulation

50 - A concern of authentication that deals with user rights.





Functional authorization

51 - A dedicated website for providing specialized information in a particular field.





Web directories

52 - A device produces an illusion of movement from a rapid succession of static pictures.





Zoetrope

53 - A field of technology that deals with a combination of real world and the data generated from computer.





AR

54 - A gateway for the server side object.





skeleton

55 - A layer which is the binary data protocol layer.





transport protocol

56 - A methodology used to develop behavior-based autonomous agents.





Behavior engineering

57 - A middleware layer between the stub skeleton and transport.





remote reference layer

58 - A model that is the demo implementation of the system.





prototype

59 - A network of physical objects or things embedded with electronics or softwares.





IOT

60 - A parallelism based on increasing processor word size.





Bit level

61 - A particular system that contains intelligent agents.





Agency

62 - A person who enjoys learning details about computers and how to enhance their capabilities.





Hacker

63 - A procedural programming follows ___________ approach.





top-down

64 - A process of making the encrypted text readable again.





Decryption

65 - A program created by Farmer and Venema for auditing capability.





SATAN

66 - A program that copies itself.





Worm

67 - A remote object is an object whose method can be invoked from another virtual environment.





TRUE

68 - A set of activities that ensure that software correctly implements a specific function.





verification

69 - A small program that changes the way a computer operates.





Virus

70 - A stage in which individual components are integrated and ensured that they are error-free to meet customer requirements.





Testing

71 - A step in waterfall model that involves a meeting with the customer to understand the requirements.





Requirement Gathering

72 - A system of interlinked documents, websites, portals etc. accessed through the Internet.





WWW

73 - A technique that enables light field which is generally the product of a light source scattered off objects.





Holography

74 - A term for Illusion of immersion by projecting stereo images on the walls and floor of a room.





CAVE

75 - A term for simultaneous access to a resource, physical or logical.





Concurrency

76 - A term in computer terminology is a change in technology a computer is/was being used.





generation

77 - A term to describe the extent to which a user can modify form and content of a mediated environment.





Interactivity

78 - A term used in the context of web design to suggest the path that user takes while browsing a website.





navigation

79 - A testing strategy that test the application as a whole.





System testing

80 - A testing strategy that tests the application in the context of an entire system.





System

81 - A tracking based on geo-location information.





Location based

82 - A type of cipher that uses multiple alphabetic strings.





Polyalphabetic substitution based

83 - A type of non-monotonic reasoning.





Default

84 - A type of parallelism that uses micro architectural techniques.





instructional

85 - A typical _________ program creates some remote objects, makes references to these objects accessible, and waits for clients to invoke methods on these objects.





Server

86 - A typical __________ program obtains a remote reference to one or more remote objects on a server and then invokes methods on them.





Client

87 - Abstraction combines the data and functions into a single unit called a class.





FALSE

88 - An algorithm in encryption is called _____________





Cipher

89 - An algorithm used in encryption is referred to as cipher.





TRUE

90 - An individual who plans and directs the work.





Project manager

91 - An international research effort to promote autonomous robots.





RoboCup

92 - An object acting as a gateway for the client side.





stub

93 - AR is interactive in real-time.





TRUE

94 - Batch processing was mainly used in this generation.





1st

95 - BOOM stands for?





Binocular Omni-Orientation Monitor

96 - CHAP stands for?





Challenge Handshake authentication protocol

97 - Cloud providers provide cloud services to the cloud users.





TRUE

98 - Collect->Communicate->__________->Act





Acknowledge

99 - DES stands for?





Data Encryption Standard

100 - Diagnostics service for Cars.





AutoBot

101 - Each one is called a bit.





remote

102 - Encryption is the study of creating and using decryption techniques.





FALSE

103 - Encryption standard that is selected by the US government to replace DES.





AES

104 - Execution of several activities at the same time.





parallel processing

105 - HLL stands for?





High Level Language

106 - HMD stands for?





Head Mounted Display

107 - Humorous Phases of Funny Faces was the first animation film.





Name of the first animation film.

108 - ICT stands for?





Information, Communication and Technology

109 - In image analysis, this part refers to objects represented within the image, which may signify to us because of, for example, their symbolic power or because of their composition in relation to each other.





Content

110 - In image analysis, this part refers to objects represented within the image, which may signify to us because of, for example, their symbolic power or because of their composition in relation to each other.





Content

111 - In public key cryptography, a key that decrypts the message.





private key

112 - In terms of image analysis, it is important to attend to primary level signs in visual codes, most obviously for examples of still photography.





TRUE

113 - In terms of image analysis, it is important to attend to primary level signs in visual codes, most obviously for examples of still photography.





TRUE

114 - In this type of cloud, an organization rents cloud services from cloud providers on-demand basis.





Public

115 - In this type of cloud, the cloud is composed of multiple internal or external cloud.





Hybrid

116 - In this type of VR environment, the subjects can perform both in the real and virtual environment.





Semi immersive

117 - In this type of VR environment, the three-dimensional scene is considered as a part of the physical environment.





Non immersive

118 - It is a mediated environment which creates the sensation in a user of being present in a (physical) surrounding.





VR

119 - It refers to simulated motion pictures showing movement of drawn objects.





Animation

120 - Maintenance is the final phase in waterfall model.





TRUE

121 - Making the smaller and smaller things have the ability to connect and interact.





Nano tech

122 - Methodology in which project management processes were step-by step.





Waterfall

123 - MIPS stands for?





Millions of Instructions/sec

124 - Most of the cloud architectures are built on this type of architecture.





grid

125 - Multiplane camera was introduced by Walt Disney.





TRUE

126 - Network Security provides authentication and access control for resources.





TRUE

127 - Parallel processing has single execution flow.





FALSE

128 - PDA stands for?





private digital applications

129 - PDAs are also called?





Handheld

130 - Remote computers work on continuous range of values.





FALSE

131 - RFID is a part of IoT.





TRUE

132 - RFID stands for?





Radio frequency identification

133 - RMI stands for?





Remote Method Invocation

134 - Security features that control that can access resources in the OS.





Access control

135 - SLAM stands for?





Simultaneous localization and mapping

136 - Technologies that completely involve a user inside a synthetic environment.





VR

137 - The media texts may throw up discourses and are called ____________





Binary oppositions

138 - The ___________ layer, which provides the interface that client and server application objects use to interact with each other.





Stub/skeleton

139 - The ____________ is a piece of equipment designed to make cartoons more realistic and enjoyable. It uses stacked panes of glass each with different elements of the animation.





Multiplane camera

140 - The ability for programmers to use the same written and debugged existing class.





Reusability

141 - The customer requirements are broken down into logical modules for ease of _______________





implementation

142 - The father of animation?





J. Stuart Blackton

143 - The father of ioT.





Kevin Ashton

144 - The field that covers a variety of computer networks, both public and private, that are used in everyday jobs.





Network Security

145 - The first neural network computer.





SNARC

146 - The fourth generation was based on integrated circuits.





FALSE

147 - The generation based on VLSI microprocessor.





4th

148 - The goal of AI is to build systems that exhibit intelligent behavior.





TRUE

149 - The invention of _______________ gave birth to the much cheaper micro computers.





Microprocessors

150 - The measure of the â€Å“effort” needed to maintain efficiency while adding processors.





Scalabilty

151 - The notion of __________ is one which is especially associated with semiotics and with genres.





codes

152 - The notion of norms also links to the idea that representations are given force through a process of:





naturalization

153 - The only language which the computer understands is ______________





Binary Language

154 - The performance of an agent can be improved based on this.





Learn

155 - The process of forming a new class from an existing class.





Inheritance

156 - The process of transforming plain text into unreadable text.





Encryption

157 - The process of verifying the identity of a user.





Authentication

158 - The protocol designed to make the security of wireless LAN as good as that of wired LAN.





WEP

159 - The rate at which the problem size need to be increased to maintain efficiency.





Isoeffciency

160 - The smallest unit of data in computer is ________________





Bit

161 - The technology that has the ability to interact with the world.





AI

162 - These ciphers replace a character or characters with a different character or characters, based on some key.





Mono alphabetic substitution based

163 - They can operate on batteries and hence are very popular with travelers.





Laptops

164 - This part of image analysis refers to those primary signs, often part of the technique of photography, which are about how the image is made.





Treatment

165 - Triple-DES has ______ keys.





2

166 - ULSI stands for?





Ultra Large Scale Integration

167 - Under DES, the data encryption standard took a 64-bit block of data and subjected it to ______ levels of encryption.





16

168 - Validation is computer based.





TRUE

169 - Wearable computing device in the form of computerized eyeglasses.





Smart Glasses

170 - What do you call a technical person who is capable of understanding the basic requirements?





analyst

171 - What do you call testing individual components?





unit testing

172 - Which defines the role of software?





System engineering

173 - Which is not an objective of network security?





Lock

174 - Which of the following is not a cloud stakeholder?





Clients

175 - Which of the following is not a type of cloud?





Protected

176 - Which of the following is not a type of computer on the basis of operation?





Remote

177 - Which unit is responsible for converting the data received from the user into a computer understandable format?





Input Unit

178 - Wi-Fi stands for?





Wireless fidelity

Pages

No comments:

Post a Comment

Your Valued Comments Help us to improve our site. Thanks