Subscribe this Blog

Enter your email address:

Delivered by FeedBurner

Followers

Friday, January 4, 2008

TRADE INSTRUCTOR GRADE – II (Information Technology) – Solved Question Paper

PSC Solved Paper.

1. _________ is a powder used in laser printers to form the images on a paper.

Toner

2. Worms and Trojan Horses are examples of:

Malware

3. ___________ Printers work by selectively heating regions of special heat-sensitive paper.

Thermal

4.The ISI mark is given by:

BIS

5. The laser printer was invented at:

Xerox

6. ________ Is a network of the national standards institutes of 157 countries.

------

7. A flaw in a system whereby the output is unexpectedly dependent on the sequence or timing of other events is called a:

Race condition

8. A 56k modem can transfer data at up to bits per second over the phone line.

56000

9. The original implementation of the C programming language was standardized by :

ANSI

10. ________Is a signaling method that handles a relatively wide range of frequencies.

Broadband

11. The port number used by SMTP is:

25

13. A packet filter is a type of

Firewall

14. The TTL field is inside the

------

15. Which among the following utilities can detect a bad sector?

CHKDSK and SCANDISK

16. In 100BASE-T, 'T' stands for:

Twisted pair

17. A head crash is said to occur when the read-write head of a hard disk drive:

Touches the magnetic media

18. Category 5 cable includes ---twisted pairs in a single cable jacket.

4

19. The port number used by the HTTP protocol is

80

20. In PowerPoint presentations, individual pages are called:

Slides

21. Power-on-self-test is built into the:

BIOS

22. PowerPoint can embed content from other applications through:

OLE

23. The latest release of Microsoft Windows is called:

Vista

24. GRUB is an:

Boot loader

25. __________Is a family of programmable interrupt controller chips.

8259

26.card allows television signals to be received by a computer.

TV tuner

27. ________Is an IEEE 1394 implementation.

Fire Wire

28 'Windows protection error' messages may result from:

Damage to the system registry

29 Sound Blaster line of audio cards were made by :

Creative Technology Ltd.

31 Indiscriminate sending of unsolicited bulk messages is known as :

Spamming

32 The 'blue screen of death' may occur due to:

All the above

33 FAT manages files in contiguous groups of sectors called:

Clusters

34 The utility which can be used to clean the windows registry is:

regedit

35. An ethernet address has a size of bits.

--

36. Ultra Wide SCSI had a throughput of: (A) 10 MB/s

40 MB/s

37. A dual-core processor has L1 cache.

2

38. A 32-bit wide FSB with a frequency of 100 MHz that performs 4 transfers/tick has a maximum bandwidth of :

--

39. Backside bus is typically used to' connect the CPU to :

, '

--

40. Port 110 is used by _______

POP3

41. A file extension .ogg indicates an ______format

Audio codec

42. Kerberos ts a__________protocol.

Network authentication

43. Athlon series of processors are made by:

AMD

44. Which among the following is a real-time operating system?

QNX

45. The internet top level domain .cn refers to :

China

46. Intel 9xx series of chipsets are meant to connect using:

--

47. _____________ Is a protocol used by networked computers (clients) to obtain IP addresses and other parameters from a server.

DHCP

48. is the brand name for 64-bit Intel microprocessors with IA-64 architecture.

Itanium

49. is an organization which develops internet standards through RFCs.

IETF

50. The ability to replace components of a computer, while it is operating, is called:

Hot swapping

Note : - Errors and omissions expected - qblp team

Total Pageviews

Disclaimer : Blog Policies

This blog publishes various general knowledge. errors and omissions expected. The Knowledge documents in this blog meant only to increase the general awareness of the readers. If any of the information available on this blog violates or infringes any of your copyright protection, leave a comment . This blog makes no representations as to accuracy, completeness, correctness or validity of any information on this site and will not be liable for any errors, or delays in this information. The information contained in this blog is subject to change without notice. You may use contents in this blog only for personal use. Reproduction and republishing of any contents from here to any other websites or blogs is strictly prohibited.