Explore topic-wise InterviewSolutions in .

This section includes InterviewSolutions, each offering curated multiple-choice questions to sharpen your knowledge and support exam preparation. Choose a topic below to get started.

1.

What is the process of transferring data or files from online sources to a local computer?1. Bookmark2. Cast3. Dropbox4. Download

Answer» Correct Answer - Option 4 : Download

The correct answer is Download.

  • The process of transferring files from a computer on the Internet to your computer is called downloading. Hence option 4 is correct.
  • Uploadingis the process of putting web pages, images, and files onto a web server.
  • Downloadingis the process of getting web pages, images, and files from a web server.

  • Cast
    • Computer-aided software testing (CAST) refers to the computing-based processes, techniques, and tools for testing software applications or programs.
  • Bookmark
    • A bookmark or electronic bookmark is a method of saving a web page's address. While using most browsers, pressing Ctrl+D bookmarks the page you are viewing.
  • Dropbox
    • It is a file hosting service operated by the American company Dropbox, Inc., headquartered in San Francisco, California, that offers cloud storage, file synchronization, personal cloud, and client software.

2.

Any digital computer takes ______ as input, ______ the data in its memory and uses it as per instructions, when required.1. data, stores2. data, processes3. program, stores4. program, generates

Answer» Correct Answer - Option 1 : data, stores

The correct answer isdata, stores.

  • Any digital computer takes data as input, stores the data in its memory and uses it as per instructions when required.
  • Input devices accept data in a form that the computer can use; they then send the data to the processing unit.
  • The processor, more formally known as the central processing unit (CPU), has the electronic circuitry that manipulates input data into the information.

  • Data is a collection of facts, such as numbers, words, measurements, observations, or just descriptions of things.
  • Information is organized or classified data, which has some meaningful values for the receiver.
    • Information is the processed data on which decisions and actions are based.
  • Memory refers to the processes that are used to acquire, store, retain, and later retrieve information.
    • There are three major processes involved in memory: encoding, storage, and retrieval.
3.

If we can generate a maximum of 4 Boolean functions using n Boolean variables, what will be minimum value of n?1. 655362. 163. 14. 4

Answer» Correct Answer - Option 3 : 1

The correct answer is 1

  • First, we need to understand thatwhen there are novariables,there aretwo expressions :
    • False=0 and True=1
  • For one variable p, four functions can be constructed. Afunction maps each input value of a variable to one andonly one output value.
    • TheFalse(p)function maps each value of p to0(False).
    • The identity(p)function maps each value of p to the identicalvalue.
    • The flip(p)function mapsFalsetoTrueandTruetoFalse.
    • TheTrue(p)function maps each value of p to1(True).
  • For one variable:
    • 4= \(2^{2^1}\),functions can be constructed.This information can be collected into a table:
    • InputFunction
      pFalsep-pTrue
      00011
      10101
  • For n Variables:
    • Number of VariablesNumber of Boolean Functions
      0\(2^{2^0}\)= 20= 2
      1\(2^{2^1}\)= 22= 4
      2\(2^{2^2}\)= 24= 16
      3\(2^{2^3}\)= 28= 256
      4\(2^{2^4}\)= 216= 65536
      n\(2^{2^n}\)
  • Therefore, according to the above table, a maximum of 4 Boolean functions can be generated with 1 variable.
4.

The information is embedded in the ROM, in the form of bits, by a process known as ________ the ROM.1. Retrieving2. Copying3. Reading4. Programming

Answer» Correct Answer - Option 4 : Programming

Read-only memory

  • Read-only memory, or ROM, is a form of data storage in computers and other electronic devices that cannot be easily altered or reprogrammed.
  • ROM is non-volatileand the contents are retained even after the power is switched off.
  • The information is embedded in the ROM, in the form of bits, by a process known as programming the ROM.


Types of ROM

  1. Programmable read-only memory (PROM), or one-time programmable ROM (OTP), can be written to or programmed via a special device called a PROM programmer. Typically, this device uses high voltages to permanently destroy or create internal links (fuses or anti-fuses) within the chip. Consequently, a PROM can only be programmed once.
  2. Erasable programmable read-only memory (EPROM)can be erased by exposure to strong ultraviolet light (typically for 10 minutes or longer), then rewritten with a process that again needs higher than the usual voltage applied. Repeated exposure to UV light will eventually wear out an EPROM, but the endurance of most EPROM chips exceeds 1000 cycles of erasing and reprogramming. EPROM chip packages can often be identified by the prominent quartz "window" which allows UV light to enter. After programming, the window is typically covered with a label to prevent accidental erasure. Some EPROM chips are factory-erased before they are packaged, and include no window; these are effectively PROM.
  3. Electrically erasable programmable read-only memory (EEPROM)is based on a similar semiconductor structure to EPROM, but allows its entire contents (or selected banks) to be electrically erased, then rewritten electrically, so that they need not be removed from the computer (whether general-purpose or an embedded computer in a camera, MP3 player, etc.). Writing or flashing an EEPROM is much slower (milliseconds per bit) than reading from a ROM or writing to a RAM (nanoseconds in both cases).
  4. Electrically alterable read-only memory (EAROM)is a type of EEPROM that can be modified one bit at a time. Writing is a very slow process and again needs higher voltage (usually around 12 V) than is used for read access. EAROMs are intended for applications that require infrequent and only partial rewriting. EAROM may be used as non-volatile storage for critical system setup information; in many applications, EAROM has been supplanted by CMOS RAM supplied by mains power and backed up with a lithium battery.
  5. Flash memory(or simply flash) is a modern type of EEPROM invented in 1984. Flash memory can be erased and rewritten faster than ordinary EEPROM, and newer designs feature very high endurance (exceeding 1,000,000 cycles). Modern NAND flash makes efficient use of silicon chip area, resulting in individual ICs with a capacity as high as 32 GB as of 2007; this feature, along with its endurance and physical durability, has allowed NAND flash to replace magnetic in some applications (such as USB flash drives). Flash memory is sometimes called flash ROM or flash EEPROM when used as a replacement for older ROM types, but not in applications that take advantage of its ability to be modified quickly and frequently.
5.

The process of taking out stored results out of physical memory of Computers is known as:1. input process2. programming3. output process4. processing

Answer» Correct Answer - Option 3 : output process

The correct answer is theoutput process.

  • The process of taking stored results out of the physical memory of Computers is known as the output process
  • It is how a computer presents the results of the process.
  • Outputs are returned to the user in many ways such as text on a screen, printed materials, or as sound from a speaker.
  • The common output devices are monitors, printers and speakers.
  • Output devices are indispensable but are not a part of the CPU.
  • They are also called peripheral devices.
6.

The first-generation computers had?1. Vacuum tubes and magnetic drum2. Magnetic tapes and transistors3. ICs4. All of these

Answer» Correct Answer - Option 1 : Vacuum tubes and magnetic drum

The first generation computers used vacuum tubes for circuitry and magnetic drums for memory and were often enormous, taking up entire rooms.

First Generation: Vacuum Tubes (1940-1956):

The first computers used vacuum tubes for circuitry and magnetic drums for memory, and were often enormous, taking up entire rooms. These computers were very expensive to operate and in addition to using a great deal of electricity, the first computers generated a lot of heat, which was often the cause of malfunctions.First generation computers relied on machine language, the lowest-level programming language understood by computers, to perform operations, and they could only solve one problem at a time. It would take operators days or even weeks to set-up a new problem. Input was based on punched cards and paper tape, and output was displayed on printouts.The UNIVAC and ENIAC computers are examples of first-generation computing devices. The UNIVAC was the first commercial computer delivered to a business client, the U.S. Census Bureau in 1951.

Second Generation: Transistors (1956-1963): The world would see transistors replace vacuum tubes in the second generation of computers. The transistor was invented at Bell Labs in 1947 but did not see widespread use in computers until the late 1950s.

Third Generation: Integrated Circuits (1964-1971):

The development of the integrated circuit was the hallmark of the third generation of computers. Transistors were miniaturized and placed on silicon chips, called semiconductors, which drastically increased the speed and efficiency of computers.Instead of punched cards and printouts, users interacted with third generation computers through keyboards and monitors and interfaced with an operating system, which allowed the device to run many different applications at one time with a central program that monitored the memory. Computers for the first time became accessible to a mass audience because they were smaller and cheaper than their predecessors.

Fourth Generation: Microprocessors (1971-Present):

The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip. What in the first generation filled an entire room could now fit in the palm of the hand. The Intel 4004 chip, developed in 1971, located all the components of the computer—from the unit and memory to input/output controls—on a single chip.In 1981 IBM introduced its first computer for the home user, and in 1984 Apple introduced the Macintosh. Microprocessors also moved out of the realm of desktop computers and into many areas of life as more and more everyday products began to use microprocessors.

Fifth Generation: Artificial Intelligence (Present and Beyond):

Fifth generation computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used today. The use of parallel processing and superconductors is helping to make artificial intelligence a reality. Quantum computation and molecular and nanotechnology will radically change the face of computers in years to come. The goal of fifth-generation computing is to develop devices that respond to natural language input and are capable of learning and self-organization.

7.

In an 8 bit representation of computer system the decimal number 26 has to be subtracted from 22 and the result in binary 2's complement is _________1. 000001002. 000011003. 000001014. 00010100

Answer» Correct Answer - Option 1 : 00000100

The correct answer is00000100

  • Two's complement representation, or, in other words, signed notation - the first bit tells about the sign. The convention is that a number with a leading1 is negative, while a leading 0 denotes a positive value. In an 8-bit representation, we can write any number from -128 to 127. The name comes from the fact that a negative number is a two's complement of a positive one.
  • 26 has to be subtracted from 22 hence result will be negative.So, to avoid negative results,2's complement is to be used. We have to find 2's complement of the Subtrahend (26) and add it to the minuend (22).To calculate 2's complement, first, we need to find the 1's complement by swapping all 1 to 0 and all 0 to 1 and then we need to add 1 to it:
    • for 22, Binary = 10110
    • for 26, Binary = 11010, 1's Complement = 00101,2's Complement = 00110
    • Addition = 10110+ 00110= 11100
    • now in the answer obtained, there is no carry generated. In this case,we will have to find 2's complement of the result in order to find the final result.
    • 11100 =1's Complement = 00011,2's Complement = 00100
    • In 8 bit representation, we will write 00000100
    • hence our answer is 00000100
8.

The elemental language of computers comprising a long sequence of binary zeros and ones (bits) is called _______1. Machine language2. Algorithm3. Flow chart4. High level Language5. None of these

Answer» Correct Answer - Option 1 : Machine language

The correct answer isMachine Language.

  • A machine language is a low-level programming language used to directly control a computer's Central Processing Unit.
  • It comprises of a long sequence of binary zeroes and ones (bits). It is the only language a computer is capable of understanding.
  • High-level languages such as Swift and C++ must be compiled into machine language before the code is run on a computer.
  • Machine language is normally displayed in the hexadecimal form so that it is a little bit easier to read.

TermMeaning
AlgorithmAn algorithm is a procedure or formula for solving a problem, based on conducting a sequence of specified actions.
Flow ChartA flow chart is simply a graphical representation of steps in sequential order and is widely used in presenting the flow of algorithms, workflow, or processes.
High-Level LanguageIt is a programming language with strong abstraction from the details of the computer.