A - B. C. D - Answer & Explanation

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 68

1 .

ICT stands for :


A
Inter connected Terminals
.
B.Intera Common Terminology
C.International Communication Technology
D
Information and Communication Technology
.
Answer & Explanation

Answer: D

Explanation:

Information and Communication Technology


View Answer Workspace Report

2 . Which of the following is the appropriate definition of Information Technology?


A
Information Technology refers to the use of hardware and software for processing information
.
Information Technology refers to the use of hardware and software for distribution of useful
B.
information
Information Technology refers to the use of principles of Physical sciences and Social sciences
C.
for processing of information of many kinds.
D Information Technology refers to the use of hardware and software for storage, retrieval,
. processing and distributing information of many kinds.
Answer & Explanation

Answer: D

Explanation:

Information Technology refers to the use of hardware and software for storage, retrieval,
processing and distributing information of many kinds.
View Answer Workspace Report

3 . Which of the following statements is NOT correct ?


A
Computer is capable of processing only digital signal
.
B.Appropriate software is required for processing the data
C.Computer is capable of processing digital as well as analog signals
D
Computer is capable of analysing both quantitative and qualitative data
.
Answer & Explanation

Answer: A
Explanation:

Computer is capable of processing only digital signal


View Answer Workspace Report

4 . Which of the following is correct statement?


A
A set of instructions is called a programme
.
B.Computers can be used for diagnosing the difficulty of a student in learning a subject
C.Psychological testing can be done with the help of computer provided software is available
D
All of the above
.
Answer & Explanation

Answer: D

Explanation:

All of the above


View Answer Workspace Report

5 . Which of the following statements is correct?


A
Virus is a part of software
.
B.Virus is an operating system
C.Internet does not allow the virus to spread
D
Virus improves the speed of processing information through computer
.
Answer & Explanation

Answer: A

Explanation:

Virus is a part of software


View Answer Workspace Report

1. The definitions in an XML document are said to be __________ when the tagging system
and definitions in the DTD are all in compliance.

Related Stories
 UGC NET Commerce Previous Year Paper with Answer: UGC NET July 2018 Paper-II
Commerce Previous Year Paper with Answers
 UGC NET Political Science Previous Year Paper with Answer: UGC NET July 2018
Paper-II Political Science Previous Year Paper with Answers
 UGC NET History Previous Year Paper with Answer: UGC NET July 2018 Paper-II
History Previous Year Paper with Answers
 UGC NET July 2018 Paper-II English Previous Year Paper with Answers
 UGC NET Previous Year Papers PDF Download with Answer Keys: Practice Previous
Year Papers to score high in NTA UGC NET 2020 Exam
 UGC NET December 2019: Important Communication Questions with Answers

(1) well-formed

(2) reasonable

(3) valid

(4) logical

2. Consider the JavaScript Code:

If M is the number of alert dialog boxes generated by this JavaScript code and D1, D2, …., DM
represents the content displayed in each of the M dialog boxes, then:

(1) M=3; D1 displays ”12”; D2 displays ”6”; D3 displays ”12”.

(2) M=3; D1 displays ”6”; D2 displays ”12”; D3 displays ”6”.

(3) M=2; D1 displays ”6”; D2 displays ”12”.


(4) M=2; D1 displays ”12”; D2 displays ”6”.

3. What is the output of the following JAVA program?

(1) 12: 15

(2) 15: 12

(3) 12: 12

(4) 15: 15
4. What is the output of the following ‘C’ program? (Assuming little – endian
representation of multi-byte data in which Least Significant Byte (LSB) is stored at the
lowest memory address.)

(1) 5, 2, 1282

(2) 5, 2, 52

(3) 5, 2, 25

(4) 5, 2, 517

5. Given below are three implementations of the swap ( ) function in C++:


Which of these would actually swap the contents of the two integer variables p and q?

(1) (a) only

(2) (b) only

(3) (c) only

(4) (b) and (c) only

6. In Java, which of the following statements is/are True?

S1: The ‘final’ keyword applied to a class definition prevents the class from being extended
through derivation.

S2: A class can only inherit one class but can implement multiple interfaces.

S3: Java permits a class to replace the implementation of a method that it has inherited. It is
called method overloading.

Code:

(1) S1 and S2 only

(2) S1 and S3 only

(3) S2 and S3 only


(4) All of S1, S2 and S3

7. Which of the following statements is/are True?

P: C programming language has a weak type system with static types.

Q: Java programming language has a strong type system with static types.

Code:

(1) P only

(2) Q only

(3) Both P and Q

(4) Neither P nor Q

8. A graphic display system has a frame buffer that is 640 pixels wide, 480 pixels high and 1
bit of color depth. If the access time for each pixel on the average is 200 nanoseconds, then
the refresh rate of this frame buffer is approximately:

(1) 16 frames per second

(2) 19 frames per second

(3) 21 frames per second

(4) 23 frames per second

9. Which of the following statements is/are True regarding the solution to the visibility
problem in 3D graphics?

S1: The Painter’s algorithm sorts polygons by depth and then paints (scan – converts) each
Polygon on to the screen starting with the most nearest polygon.

S2: Backface Culling refers to eliminating geometry with backfacing normals.

Code:

(1) S1 only

(2) S2 only

(3) Both S1 and S2


(4) Neither S1 nor S2

(1) M represents first, a scaling of vector (2, 1) followed by translation of vector (1, 1)

(2) M represents first, a translation of vector (1, 1) followed by scaling of vector (2, 1)

(3) M represents first, a scaling of vector (3, 1) followed by shearing of parameters (−1, 1)

(4) M represents first, a shearing of parameters (−1, 1) followed by scaling of vector (3, 1)

11. Assume the following regarding the development of a software system P:

– Estimated lines of code of P: 33, 480 LOC

– Average productivity for P: 620 LOC per person-month

– Number of software developers: 6

– Average salary of a software developer: Rs 50,000 per month

If E, D and C are the estimated development effort (in person-months), estimated


development time (in months), and estimated development cost (in Rs Lac) respectively,
then (E, D, C) = _________.

(1) (48, 8, 24)

(2) (54, 9, 27)

(3) (60, 10, 30)

(4) (42, 7, 21)

12. Match the following in Software Engineering:

List - I List - II
(a) Product Complexity (i) Software Requirements Definition
(b) Structured System Analysis (ii) Software Design

(c) Coupling and Cohesion (iii) Validation Technique

(d) Symbolic Execution (iv) Software Cost Estimation

Code :

     (a)  (b)  (c) (d)

(1) (ii) (iii) (iv) (i)

(2) (iii) (i) (iv) (ii)

(3) (iv) (i) (ii) (iii)

(4) (iii) (iv) (i) (ii)

13. Which one of the following is not typically provided by Source Code Management
Software?

(1) Synchronisation

(2) Versioning and Revision history

(3) Syntax highlighting

(4) Project forking

14. A software system crashed 20 times in the year 2017 and for each crash, it took 2
minutes to restart. Approximately, what was the software availability in that year?

(1) 96.9924%

(2) 97.9924%

(3) 98.9924%

(4) 99.9924%

15. Match the 5 CMM Maturity levels/CMMI staged representations in List- I with their
characterizations in List-II:

List - I List - II
(a) Initial (i) Processes are improved quantitatively and
continually.

(b) Repeatable (ii) The plan for a project comes from a


template for plans.
(c) Defined
(iii) The plan uses processes that can be
(d) Managed measured quantitatively.

(e) Optimizing (iv) There may not exist a plan or it may be


abandoned.

(v) There’s a plan and people stick to it.

Code :

      (a) (b) (c) (d) (e)

(1) (iv) (v) (i) (iii) (ii)

(2) (i) (ii) (iv) (v) (iii)

(3) (v) (iv) (ii) (iii) (i)

(4) (iv) (v) (ii) (iii) (i)

16. Coupling is a measure of the strength of the interconnections between software


modules. Which of the following are correct statements with respect to module coupling?

P: Common coupling occurs when one module controls the flow of another module by passing it
information on what to do.

Q: In data coupling, the complete data structure is passed from one module to another through
parameters.

R: Stamp coupling occurs when modules share a composite data structure and use only parts of
it.

Code:

(1) P and Q only

(2) P and R only

(3) Q and R only

(4) All of P, Q and R


17. A software design pattern often used to restrict access to an object is:

(1) adapter

(2) decorator

(3) delegation

(4) proxy

18. Reasons to re-engineer a software include:

P: Allow legacy software to quickly adapt to the changing requirements

Q: Upgrade to newer technologies/platforms/paradigm (for example, object-oriented)

R: Improve software maintainability

S: Allow change in the functionality and architecture of the software

Code:

(1) P, R and S only

(2) P and R only

(3) P, Q and S only

(4) P, Q and R only

19. Which of the following is not a key strategy followed by the clean room approach to
software development?

(1) Formal specification

(2) Dynamic verification

(3) Incremental development

(4) Statistical testing of the system

20. Which of the following statements is/are True?

P: Refactoring is the process of changing a software system in such a way that it does not alter
the external behavior of the code yet improves the internal architecture.
Q: An example of refactoring is adding new features to satisfy a customer requirement
discovered after a project is shipped.

Code:

(1) P only

(2) Q only

(3) Both P and Q

(4) Neither P nor Q

Click here to know the latest Exam Pattern and Syllabus of NTA UGC NET December
2019 Exam

21. The solution of the recurrence relation

T(m) = T( 3m 4) + 1 is:

(1) θ (lg m)

(2) θ (m)

(3) θ (mlg m)

(4) θ (lglg m)

22. Consider the array A=<4, 1, 3, 2, 16, 9, 10, 14, 8, 7>. After building heap from the array
A, the depth of the heap and the right child of max-heap are _________ and _________
respectively. (Root is at level 0).

(1) 3, 14

(2) 3, 10

(3) 4, 14

(4) 4, 10

23. A hash function h defined h(key)=key mod 7, with linear probing, is used to insert the
keys 44, 45, 79, 55, 91, 18, 63 into a table indexed from 0 to 6. What will be the location of
key 18?

(1) 3
(2) 4

(3) 5

(4) 6

24. Which of the following algorithms solves the single-source shortest paths?

(1) Prim’s algorithm

(2) Floyd – Warshall algorithm

(3) Johnson’s algorithm

(4) Dijkstra’s algorithm

25. A text is made up of the characters A, B, C, D, E each occurring with the probability
0.08, 0.40, 0.25, 0.15 and 0.12 respectively. The optimal coding technique will have the
average length of:

(1) 2.4

(2) 1.87

(3) 3.0

(4) 2.15

26. A binary search tree in which every non-leaf node has non-empty left and right subtrees
is called a strictly binary tree. Such a tree with 19 leaves:

(1) cannot have more than 37 nodes

(2) has exactly 37 nodes

(3) has exactly 35 nodes

(4) cannot have more than 35 nodes

27. Match the following with respect to algorithm paradigms:

 List – I List – II
(a) The 8-Queen’s problem (i) Dynamic programming

(b) Single-Source shortest paths (ii) Divide and conquer


(c) STRASSEN’s Matrix multiplication (iii) Greedy approach

(d) Optimal binary search trees (iv) Backtracking

Code :

      (a) (b) (c) (d)

(1) (iv) (i) (iii) (ii)

(2) (iv) (iii) (i) (ii)

(3) (iii) (iv) (ii) (i)

(4) (iv) (iii) (ii) (i)

28. The maximum number of comparisons needed to sort 9 items using radix sort is
(assume each item is 5 digit octal number):

(1) 45

(2) 72

(3) 360

(4) 450

29. A 5-ary tree is tree in which every internal node has exactly 5 children. The number of
left nodes in such a tree with 8 internal nodes will be:

(1) 30

(2) 33

(3) 45

(4) 125

30. Consider a Boolean function of ‘n’ variables. The order of an algorithm that determines
whether the Boolean function produces a output 1 is:

(1) Logarithmic

(2) Linear
(3) Quadratic

(4) Exponential

31. Two finite state machines are said to be equivalent if they:

(1) Have the same number of edges

(2) Have the same number of states

(3) Recognize the same set of tokens

(4) Have the same number of states and edges

32. The finite state machine given in figure below recognizes:

(1) any string of odd number of a’s

(2) any string of odd number of b’s

(3) any string of even number of a’s and odd number of b’s

(4) any string of odd number of a’s and odd number of b’s

33. A pushdown automata behaves like a Turing machine when the number of auxiliary
memory is:

(1) 0

(2) 1
(3) 1 or more

(4) 2 or more

34. Pushdown automata can recognize language generated by_________.

(1) Only context free grammar

(2) Only regular grammar

(3) Context free grammar or regular grammar

(4) Only context sensitive grammar

35. To obtain a string of n Terminals from a given Chomsky normal form grammar, the
number of productions to be used is:

(1) 2n−1

(2) 2n

(3) n+1

(4) n2

36. Consider the following two Grammars:

 G1 : S -> SbS|a

G2 : S -> aB|ab, A->GAB|a, B->ABb|b

Which of the following option is correct?

(1) Only G1 is ambiguous

(2) Only G2 is ambiguous

(3) Both G1 and G2 are ambiguous

(4) Both G1 and G2 are not ambiguous

37. Context sensitive language can be recognized by a:

(1) Finite state machine

(2) Deterministic finite automata


(3) Non-deterministic finite automata

(4) Linear bounded automata

38. The set A={ 0n 1n 2n | n = 1, 2, 3, ……… } is an example of a grammar that is:

(1) Context sensitive

(2) Context free

(3) Regular

(4) None of the above

39. A bottom-up parser generates:

(1) Left-most derivation in reverse

(2) Right-most derivation in reverse

(3) Left-most derivation

(4) Right-most derivation

40. Consider the following statements ( ):

S1: There exists no algorithm for deciding if any two Turing machines M1 and M2 accept the
same language.

S2: The problem of determining whether a Turing machine halts on any input is undecidable.

Which of the following options is correct?

(1) Both S1 and S2 are correct

(2) Both S1 and S2 are not correct

(3) Only S1 is correct

(4) Only S2 is correct

Click here to Download the Previous Papers of UGC NET Exam for free

41. A slotted ALOHA network transmits 200-bit frames using a shared channel with a 200
Kbps bandwidth. Find the throughput of the system, if the system (all stations put
together) produces 250 frames per second:
(1) 49

(2) 368

(3) 149

(4) 151

42. The period of a signal is 100 ms. Its frequency is _________.

(1) 1003 Hertz

(2) 10−2 KHz

(3) 10−3 KHz

(4) 105 Hertz

43. The dotted-decimal notation of the following IPV4 address in binary notation is
_________.

10000001 00001011 00001011 11101111

(1) 111.56.45.239

(2) 129.11.10.238

(3) 129.11.11.239

(4) 111.56.11.239

44. Which of the following statements are true?

(a) Advanced Mobile Phone System (AMPS) is a second generation cellular phone system.

(b) IS – 95 is a second generation cellular phone system based on CDMA and DSSS.

(c) The Third generation cellular phone system will provide universal personnel communication.

Code:

(1) (a) and (b) only

(2) (b) and (c) only

(3) (a), (b) and (c)


(4) (a) and (c) only

45. Match the following symmetric block ciphers with corresponding block and key sizes:

List - I List - II
(a) DES (i) block size 64 and key size ranges between 32
and 448
(b) IDEA
(ii) block size 64 and key size 64
(c) BLOW FISH
(iii) block size 128 and key sizes 128, 192, 256
(d) AES
(iv) block size 64 and key size 128

Code :

      (a) (b) (c) (d)

(1) (iv) (ii) (i) (iii)

(2) (ii) (iv) (i) (iii)

(3) (ii) (iv) (iii) (i)

(4) (iv) (ii) (iii) (i)

46. Which of the following statements are true?

(a) Three broad categories of Networks are

     (i) Circuit Switched Networks

    (ii) Packet Switched Networks

    (iii) Message Switched Networks

(b) Circuit Switched Network resources need not be reserved during the set up phase.

(c) In packet switching there is no resource allocation for packets.

Code:

(1) (a) and (b) only

(2) (b) and (c) only


(3) (a) and (c) only

(4) (a), (b) and (c)

47. In Challenge-Response authentication the claimant ________.

(1) Proves that she knows the secret without revealing it

(2) Proves that she doesn’t know the secret

(3) Reveals the secret

(4) Gives a challenge

48. Decrypt the message “WTAAD” using the Caesar Cipher with key=15.

(1) LIPPS

(2) HELLO

(3) OLLEH

(4) DAATW

49. To guarantee correction of upto t errors, the minimum Hamming distance dmin in a
block code must be ________.

(1) t+1

(2) t−2

(3) 2t−1

(4) 2t+1

50. Encrypt the Message “HELLO MY DEARZ” using Transposition Cipher with

(1) HLLEO YM AEDRZ

(2) EHOLL ZYM RAED


(3) ELHL MDOY AZER

(4) ELHL DOMY ZAER

51. At a particular time of computation, the value of a counting semaphore is 10. Then 12 P
operations and “x” V operations were performed on this semaphore. If the final value of
semaphore is 7, x will be:

(1) 8

(2) 9

(3) 10

(4) 11

52. In a paged memory, the page hit ratio is 0.40. The time required to access a page in
secondary memory is equal to 120 ns. The time required to access a page in primary
memory is 15 ns. The average time required to access a page is ________.

(1) 105

(2) 68

(3) 75

(4) 78

53. In a multi-user operating system, 30 requests are made to use a particular resource per
hour, on an average. The probability that no requests are made in 40 minutes, when arrival
pattern is a poisson distribution, is _________.

(1) e−15

(2) 1−e−15

(3) 1−e−20

(4) e−20

54. Normally user programs are prevented from handling I/O directly by I/O instructions
in them. For CPUs having explicit I/O instructions, such I/O protection is ensured by
having the I/O instructions privileged. In a CPU with memory mapped I/O, there is no
explicit I/O instruction. Which one of the following is true for a CPU with memory mapped
I/O?
(1) I/O protection is ensured by operating system routines.

(2) I/O protection is ensured by a hardware trap.

(3) I/O protection is ensured during system configuration.

(4) I/O protection is not possible.

55. Which UNIX/Linux command is used to make all files and sub-directories in the
directory “progs” executable by all users?

(1) chmod − R a + x progs

(2) chmod − R 222 progs

(3) chmod − X a + x progs

(4) chmod − X 222 progs

56. Which of the following statements are true?

(a) External Fragmentation exists when there is enough total memory space to satisfy a request
but the available space is contiguous.

(b) Memory Fragmentation can be internal as well as external.

(c) One solution to external Fragmentation is compaction.

Code:

(1) (a) and (b) only

(2) (a) and (c) only

(3) (b) and (c) only

(4) (a), (b) and (c)

57. Page information in memory is also called as Page Table. The essential contents in each
entry of a page table is/are _________.

(1) Page Access information

(2) Virtual Page number

(3) Page Frame number


(4) Both virtual page number and Page Frame Number

58. Consider a virtual page reference string 1, 2, 3, 2, 4, 2, 5, 2, 3, 4. Suppose LRU page


replacement algorithm is implemented with 3 page frames in main memory. Then the
number of page faults are_________.

(1) 5

(2) 7

(3) 9

(4) 10

59. Consider the following three processes with the arrival time and CPU burst time given
in milliseconds:

Process Arrival Time Burst


P1 0 7

P2 1 4

P3 2 8

The Gantt Chart for preemptive SJF scheduling algorithm is _________.

60. In which of the following scheduling criteria, context switching will never take place?
(1) ROUND ROBIN

(2) Preemptive SJF

(3) Non-preemptive SJF

(4) Preemptive priority

Click here to know the preparation strategy to crack NTA UGC NET 2018 Exam

61. In RDBMS, which type of Join returns all rows that satisfy the join condition?

(1) Inner Join

(2) Outer Join

(3) Semi Join

(4) Anti Join

62. Consider a relation book (title, price) which contains the titles and prices of different
books. Assuming that no two books have the same price, what does the following SQL
query list?

(1) Titles of the six most expensive books.

(2) Title of the sixth most expensive books.

(3) Titles of the seven most expensive books.

(4) Title of the seventh most expensive books.

63. In a Hierachical database, a hashing function is used to locate the ________.

(1) Collision
(2) Root

(3) Foreign Key

(4) Records

64. Relations produced from E – R Model will always be in ________.

(1) 1 NF

(2) 2 NF

(3) 3 NF

(4) 4 NF

65. Consider the following schedules involving two transactions.

 S1 : r1(X) ; r1(Y) ; r2(X) ; r2(Y) ; w2(Y) ; w1(X)

S2 : r1(X) ; r2(X) ; r2(Y) ; w2(Y) ; r1(Y) ; w1(X)

Which one of the following statements is correct with respect to above?

(1) Both S1 and S2 are conflict serializable.

(2) Both S1 and S2 are not conflict serializable.

(3) S1 is conflict serializable and S2 is not conflict serializable.

(4) S1 is not conflict serializable and S2 is conflict serializable.

66. For a database relation R(a, b, c, d) where the domains of a, b, c and d include only
atomic values, and only the following functional dependencies and those that can be
inferred from them hold:

a -> c

b -> d

The relation is in _________.

(1) First normal form but not in second normal form

(2) Second normal form but not in third normal form


(3) Third normal form

(4) BCNF

67. A many-to-one relationship exists between entity sets r1 and r2. How will it be
represented using functional depedencies if Pk(r) denotes the primary key attribute of
relation r?

(1) Pk(r1) → Pk(r2)

(2) Pk(r2) → Pk(r1)

(3) Pk(r2) → Pk(r1) and Pk(r1) → Pk(r2)

(4) Pk(r2) → Pk(r1) or Pk(r1) → Pk(r2)

68. Database systems that store each relation in a separate operating system file may use
the operating system’s authorization scheme, instead of defining a special scheme
themselves.

In this case, which of the following is false?

(1) The administrator enjoys more control on the grant option.

(2) It is difficult to differentiate among the update, delete and insert authorizations.

(3) Cannot store more than one relation in a file.

(4) Operations on the database are speeded up as the authorization procedure is carried out at the
operating system level.

69. Let R1(a, b, c) and R2(x, y, z) be two relations in which a is the foreign key of R1 that
refers to the primary key of R2. Consider following four options.

(a) Insert into R1

(b) Insert into R2

(c) Delete from R1

(d) Delete from R2

Which of the following is correct about the referential integrity constraint with respect to
above?

(1) Operations (a) and (b) will cause violation.


(2) Operations (b) and (c) will cause violation.

(3) Operations (c) and (d) will cause violation.

(4) Operations (d) and (a) will cause violation.

70. Consider a hash table of size seven, with starting index zero, and a hash function (7x+3)
mod 4. Assuming the hash table is initially empty, which of the following is the contents of
the table when the sequence 1, 3, 8, 10 is inserted into the table using closed hashing? Here
“__” denotes an empty location in the table.

(1) 3, 10, 1, 8, __ , __ , __

(2) 1, 3, 8, 10, __ , __ , __

(3) 1, __ , 3, __ , 8, __ , 10

(4) 3, 10, __ , __ , 8, __ , __

Click here to know 7 Last Minute Tips to crack NTA UGC NET Dec 2018 Online Exam

71. In Artificial Intelligence (AI), an environment is uncertain if it is ________.

(1) Not fully observable and not deterministic

(2) Not fully observable or not deterministic

(3) Fully observable but not deterministic

(4) Not fully observable but deterministic

72. In Artificial Intelligence (AI), a simple reflex agent selects actions on the basis
of_________.

(1) current percept, completely ignoring rest of the percept history.

(2) rest of the percept history, completely ignoring current percept.

(3) both current percept and complete percept history.

(4) both current percept and just previous percept.

73. In heuristic search algorithms in Artificial Intelligence (AI), if a collection of admissible


heuristics h1…….hm is available for a problem and none of them dominates any of the
others, which should we choose?
(1) h(n)=max{h1(n),….,hm(n)}

(2) h(n)=min{h1(n),….,hm(n)}

(3) h(n)=avg{h1(n),….,hm(n)}

(4) h(n)=sum{h1(n),….,hm(n)}

74. Consider following sentences regarding A*, an informed search strategy in Artificial
Intelligence (AI).

 (a) A* expands all nodes with f(n) < C*.

(b) A* expands no nodes with f(n) >C*.

(c) Pruning is integral to A*.

Here, C* is the cost of the optimal solution path.

Which of the following is correct with respect to the above statements?

(1) Both statement (a) and statement (b) are true.

(2) Both statement (a) and statement (c) are true.

(3) Both statement (b) and statement (c) are true.

(4) All the statements (a), (b) and (c) are true.

75. Consider a vocabulary with only four propositions A, B, C and D. How many models
are there for the following sentence?

B∨C

(1) 10

(2) 12

(3) 15

(4) 16

76. Consider the following statements:

(a) False |= True


(b) If α |= (β ∧ γ) then α |= β and α |= γ.

Which of the following is correct with respect to the above statements?

(1) Both statement (a) and statement (b) are false.

(2) Statement (a) is true but statement (b) is false.

(3) Statement (a) is false but statement (b) is true.

(4) Both statement (a) and statement (b) are true.

77. Consider the following English sentence:

“Agra and Gwalior are both in India”.

A student has written a logical sentence for the above English sentence in First-Order
Logic using predicate In(x, y), which means x is in y, as follows:

In(Agra, India) ∨ In(Gwalior, India)

Which one of the following is correct with respect to the above logical sentence?

(1) It is syntactically valid but does not express the meaning of the English sentence.

(2) It is syntactically valid and expresses the meaning of the English sentence also.

(3) It is syntactically invalid but expresses the meaning of the English sentence.

(4) It is syntactically invalid and does not express the meaning of the English sentence.

78. Consider the following two sentences:

(a) The planning graph data structure can be used to give a better heuristic for a planning
problem.

(b) Dropping negative effects from every action schema in a planning problem results in a
relaxed problem.

Which of the following is correct with respect to the above sentences?

(1) Both sentence (a) and sentence (b) are false.

(2) Both sentence (a) and sentence (b) are true.

(3) Sentence (a) is true but sentence (b) is false.


(4) Sentence (a) is false but sentence (b) is true.

79. A knowledge base contains just one sentence, ∃x AsHighAs (x, Everest). Consider the
following two sentences obtained after applying existential instantiation.

(a) AsHighAs (Everest, Everest)

(b) AsHighAs (Kilimanjaro, Everest)

Which of the following is correct with respect to the above sentences?

(1) Both sentence (a) and sentence (b) are sound conclusions.

(2) Both sentence (a) and sentence (b) are unsound conclusions.

(3) Sentence (a) is sound but sentence (b) is unsound.

(4) Sentence (a) is unsound but sentence (b) is sound.

80. Consider the set of all possible five-card poker hands dealt fairly from a standard deck
of fifty-two cards. How many atomic events are there in the joint probability distribution?

(1) 2, 598, 960

(2) 3, 468, 960

(3) 3, 958, 590

(4) 2, 645, 590

Click here to know the UGC NET Exam Previous Year Cut-Off Marks

81. E is the number of edges in the graph and f is maximum flow in the graph. When the
capacities are integers, the runtime of Ford-Fulberson algorithm is bounded by:

(1) O (E∗f)

(2) O (E2∗f)

(3) O (E∗f2)

(4) O (E2∗f2)

82. Which of the following statements is false about convex minimization problem?

(1) If a local minimum exists, then it is a global minimum


(2) The set of all global minima is convex set

(3) The set of all global minima is concave set

(4) For each strictly convex function, if the function has a minimum, then the minimum is unique

83. The following LPP

Maximize z = 100x1 + 2x2 + 5x3

Subject to

14x1 + x2 − 6x3 + 3x4 = 7

32x1 + x2 − 12x3 ≤ 10

3x1 − x2 − x3 ≤ 0

x1, x2, x3, x4 > 0

has

(1) Solution: x1 = 100, x2 = 0, x3 = 0

(2) Unbounded solution

(3) No solution

(4) Solution: x1 = 50, x2 = 70, x3 = 60

84. Digital data received from a sensor can fill up 0 to 32 buffers. Let the sample space be
S={0, 1, 2, ………., 32} where the sample j denote that j of the buffers are full p(i) = 1/561
(33 - i) and  Let A denote the event that the even number of buffers are full. Then p(A) is:

(1) 0.515

(2) 0.785

(3) 0.758

(4) 0.485

85. The equivalence of

¬ ∃ x Q (x) is:
(1) ∃ x ¬ Q (x)

(2) ∀ x ¬ Q (x)

(3) ¬ ∃ x ¬ Q (x)

(4) ∀ x Q (x)

86. If Ai = {−i, … −2,−1, 0, 1, 2, . . . . . i}

(1) Z

(2) Q

(3) R

(4) C

87. Match the following in List – I and List – II, for a function f:

Code :

     (a) (b) (c)

(1) (i) (ii) (iii)

(2) (iii) (ii) (i)

(3) (ii) (i) (iii)

(4) (ii) (iii) (i)


88. Which of the relations on {0, 1, 2, 3} is an equivalence relation?

(1) { (0, 0) (0, 2) (2, 0) (2, 2) (2, 3) (3, 2) (3, 3) }

(2) { (0, 0) (1, 1) (2, 2) (3, 3) }

(3) { (0, 0) (0, 1) (0, 2) (1, 0) (1, 1) (1, 2) (2, 0) }

(4) { (0, 0) (0, 2) (2, 3) (1, 1) (2, 2) }

89. Which of the following is an equivalence relation on the set of all functions from Z to Z?

(1) { (f, g) | f (x) − g (x) = 1 ∀ x ϵ Z }

(2) { (f, g) | f (0) = g (0) or f (1) = g (1) }

(3) { (f, g) | f (0) = g (1) and f (1) = g (0) }

(4) { (f, g) | f (x) − g (x) = k for some k ϵ Z }

90. Which of the following statements is true?

(1) (Z, ≤ ) is not totally ordered

(2) The set inclusion relation ⊆ is a partial ordering on the power set of a set S

(3) (Z, ≠ ) is a poset

Click here to know the answers of Frequently Asked Questions for NTA UGC NET
December 2019 Exam

91. CMOS is a Computer Chip on the motherboard, which is:

(1) RAM

(2) ROM

(3) EPROM

(4) Auxillary storage


92. In RS flip-flop, the output of the flip-flop at time (t + 1) is same as the output at time t,
after the occurance of a clock pulse if:

(1) S = R = 1

(2) S = 0, R = 1

(3) S = 1, R = 0

(4) S = R = 0

93. Match the terms in List – I with the options given in List – II:

List – I List - II
n
(a) Decoder (iv) 2 lines to

(b) Multiplexer (i) 1 line to 2n lines

(c) De multiplexer (ii) n lines to 2n lines

(iii) 2n lines to 1 line 2n−1 lines

Code :

      (a) (b) (c)

(1) (ii) (i) (iii)

(2) (ii) (iii) (i)

(3) (ii) (i) (iv)

(4) (iv) (ii) (i)

 94. What does the following logic diagram represent?


(1) Synchronous Counter

(2) Ripple Counter

(3) Combinational Circuit

(4) Mod 2 Counter

95. The hexadecimal equivalent of the binary integer number 110101101 is:

(1) D 2 4

(2) 1 B D

(3) 1 A E

(4) 1 A D

96. Perform the following operation for the binary equivalent of the decimal numbers
(−14)10 + (−15)10

The solution in 8 bit representation is:

(1) 11100011

(2) 00011101

(3) 10011101

(4) 11110011

97. Match the items in List – I and List – II:

List – I List - II
(a) Interrupts which can be delayed when a (i) Normal
much highest priority interrupt has occurred
(ii) Synchronous
(b) Unplanned interrupts which occur while
executing a program (iii) Maskable

(c) Source of interrupt is in phase with the (iv) Exception


system clock

Code :

      (a) (b) (c)


(1) (ii) (i) (iv)

(2) (ii) (iv) (iii)

(3) (iii) (i) (ii)

(4) (iii) (iv) (ii)

98. Which of the following mapping is not used for mapping process in cache memory?

(1) Associative mapping

(2) Direct mapping

(3) Set-Associative mapping

(4) Segmented – page mapping

99. Simplify the following using K-map:

F (A, B, C, D) = Σ (0, 1, 2, 8, 9, 12, 13)

d (A, B, C, D) = Σ (10, 11, 14, 15)

d stands for don’t care condition.

100. In 8085 microprocessor, what is the output of following program?

 LDA 8000H

MVI B, 30H

ADD B

STA 8001H

(1) Read a number from input port and store it in memory

(2) Read a number from input device with address 8000H and store it in memory at location
8001H
(3) Read a number from memory at location 8000H and store it in memory location 8001H

(4) Load A with data from input device with address 8000H and display it on the output device
with address 8001H

Click here to know the Eligibility Criteria for NTA UGC NET December 2019 Exam

Answer Key: -

Q. No. Answer Q. No. Answer


1 3 51 2
2 4 52 4
3 4 53 4
4 4 54 1
5 2 55 1
6 1 56 3
7 3 57 3
8 1 58 2
9 2 59 2
10 2 60 3
11 2 61 1
12 3 62 3
13 3 63 2
14 4 64 3
15 4 65 4
16 3 66 1
17 4 67 1
18 4 68 1
19 2 69 4
20 1 70 1
21 1 71 2
22 2 72 1
23 3 73 1
24 4 74 2
25 4 75 2
26 2 76 4
27 4 77 1
28 3 78 2
29 All 79 4
30 4 80 1
31 3 81 All
32 4 82 3
33 4 83 2
34 3 84 1
35 1 85 2
36 3 86 1
37 4 87 4
38 1 88 2
39 2 89 4
40 1 90 2
41 1 91 1
42 2 92 4
43 3 93 2
44 2 94 2
45 2 95 4
46 3 96 1
47 1 97 4
48 2 98 4
49 4 99 2
50 3 100 4

Practice makes the man perfect! The more you will practice, the more accuracy you will gain
which will eventually lead you to a high score in the exam. Practice will help you in avoiding
silly mistakes and making unnecessary guess works while attempting NTA UGC NET December
2019 Exam. Therefore, practicing previous year papers will help you in achieving accuracy and
high score in NTA UGC NET December 2019 Exam.

Promoted Content

UGC NET Information & Communication Technology (ICT) Questions with Answers

1. NMEICT stands for:

(1) National Mission on Education through ICT

Related Stories
 UGC Recruitment 2021 Notification Out @ugc.ac.in for Consultant Posts, Apply by 14
January
 UPPSC Various Post Direct Recruitment 2020 Notification Out for Registrar, Lecturer &
Other Posts, Apply Online @uppsc.up.nic.in
 BARC Recruitment 2020-21: 105 Vacancies Notified for JRF Posts, Online Application
Started @barc.gov.in, Check Eligibility & Other Details Here
 DRDO JRF Recruitment 2020-21: Applications invited for Junior Research Fellow Posts,
Walk -In from 4 to 11 Dec
 ESIC Recruitment 2020-21: 185 Vacancies for Faculty, GDMO, Junior Resident and
Other Posts, Walk-In from 21 Dec
 NIRD&PR Recruitment 2021 for 510 Coordinator, Fellow, Resource Person and Other
Posts, Apply @nirdpr.org.in

(2) National Mission on E-governance through ICT

(3) National Mission on E-commerce through ICT

(4) National Mission on E-learning through ICT

Answer: 1

2. Which of the following is an instant messaging application?

(a) WhatsApp

(b) Google Talk

(c) Viber

Select the correct answer from the codes given below:

(1) (a) and (b) only

(2) (b) and (c) only

(3) (a) only

(4) (a), (b) and (c)

Answer: 4

Click here to get Important People & Environment Questions for UGC NET December
2019 Exam

3. In a Computer a byte generally consists of:

(1) 4 bits

(2) 8 bits

(3) 16 bits
(4) 10 bits

Answer: 2

Click here to know the latest Exam Pattern and Syllabus of NTA UGC NET December
2019 Exam

4. Which of the following is not an input device?

(1) Microphone

(2) Keyboard

(3) Joystick

(4) Monitor

Answer: 4

5. Which of the following is an open source software?

(1) MS Word

(2) Windows

(3) Mozilla Firefox

(4) Acrobat Reader

Answer: 3

6. Which of the following enables us to send the same letter to different persons in MS
Word?

(1) Mail join

(2) Mail copy

(3) Mail insert

(4) Mail merge

Answer: 4

Click here to know the 7 Last Minute Tips to crack UGC NET December 2019 Exam
7. The statement “the study, design, development, implementation, support or management
of computer-based information systems, particularly software applications and computer
Hardware” refers to

(1) Information Technology (IT)

(2) Information and Collaborative Technology (ICT)

(3) Information and Data Technology (IDT)

(4) Artificial Intelligence (AI)

Answer: 1

8. If the binary equivalent of the decimal number 48 is 110000, then the binary equivalent
of the decimal number 51 is given by

(1) 110011

(2) 110010

(3) 110001

(4) 110100

Answer: 1

9. The process of copying files to a CD-ROM is known as

(1) Burning

(2) Zipping

(3) Digitizing

(4) Ripping

Answer: 1

NTA UGC NET June 2019 Cut-off

10. An unsolicited e-mail message sent to many recipients at once is a

(1) Worm

(2) Virus
(3) Threat

(4) Spam

Answer: 4

11. _________ is a type of memory circuitry that holds the computer’s start-up routine.

(1) RIM (Read Initial Memory)

(2) RAM (Random Access Memory)

(3) ROM (Read Only Memory)

(4) Cache Memory

Answer: 3

12. An ASCII is a character-encoding scheme that is employed by personal computers in


order to represent various characters, numbers and control keys that the computer user
selects on the keyboard. ASCII is an acronym for

(1) American Standard Code for Information Interchange

(2) American Standard Code for Intelligent Information

(3) American Standard Code for Information Integrity

(4) American Standard Code for Isolated Information

Answer: 1

Click here to get Important Teaching Aptitude Questions for UGC NET December 2019
Exam

13. Read the following two statements:

I: Information and Communication Technology (ICT) is considered a subset of Information


Technology (IT).

II: The ‘right to use’ a piece of software is termed as copyright.

Which of the above statement(s) is/are CORRECT?

(1) Both I and II


(2) Neither I nor II

(3) II only

(4) I only

Answer: 2

Click here to get Important Higher Education System Questions for UGC NET December
2019 Exam

14. Which of the following correctly lists computer memory types from highest to lowest
speed?

(1) Secondary Storage; Main Memory (RAM); Cache Memory; CPU Registers

(2) CPU Registers; Cache Memory; Secondary Storage; Main Memory (RAM)

(3) CPU Registers; Cache Memory; Main Memory (RAM); Secondary Storage

(4) Cache Memory; CPU Registers; Main Memory (RAM); Secondary Storage

Answer: 3

15. Which of the following is a characteristic of Web2.0 applications?

(1) Multiple users schedule their time to use Web2.0 applications one by one.

(2) Web2.0 applications are focused on the ability for people to collaborate and share
information online.

(3) Web2.0 applications provide users with content rather than facilitating users to create it.

(4) Web2.0 applications use only static pages.

Answer: 2

Click here to get Important Research Aptitude Questions for UGC NET December 2019
Exam

16. With regard to a word processing software, the process of combining static information
in a publication together with variable information in a data source to create one merged
publication is called

(1) Electronic mail


(2) Data sourcing

(3) Mail merge

(4) Spam mail

Answer: 3

17. DVD technology uses an optical media to store the digital data. DVD is an acronym for

(1) Digital Vector Disc

(2) Digital Volume Disc

(3) Digital Versatile Disc

(4) Digital Visualization Disc

Answer: 3

Click here to get Important Logical Reasoning Questions for UGC NET December 2019
Exam

18. What is the name for a webpage address?

(1) Domain

(2) Directory

(3) Protocol

(4) URL

Answer: 4

Click here to get Important Communication Questions for UGC NET December 2019
Exam

19. The data storage hierarchy consists of:

(1) Bytes, bits, fields, records, files and databases

(2) Bits, bytes, fields, records, files and databases

(3) Bits, bytes, records, fields, files and databases


(4) Bits, bytes, fields, files, records and databases

Answer: 2

20. Which of the following domains is used for - profit businesses?

(1) .org

(2) .net

(3) .edu

(4) .com

Answer: 4

21. What is the full form of USB as used in computer related activities?

(1) Ultra Security Block

(2) Universal Security Block

(3) Universal Serial Bus

(4) United Serial Bus

Answer: 3

Click here to get Important Data Interpretation Questions for UGC NET December 2019
Exam

22. Which of the following represents billion characters?

(1) Terabytes

(2) Megabytes

(3) Kilobytes

(4) Gigabytes

Answer: 4

23. Which of the following statements, regarding the term ICT is/are TRUE?

P: ICT is an acronym that stands for Indian Classical Technology.


Q: Converging technologies that exemplify ICT include the merging of audio-visual, telephone
and computer networks through a common cabling system.

(1) P only

(2) Q only

(3) P and Q

(4) Neither P nor Q

Answer: 2

Click here to get Important Reading Comprehension Questions for UGC NET December
2019 Exam

24. A new Laptop has been produced that weighs less, is smaller and uses less power than
previous Laptop models.

Which of the following technologies has been used to accomplish this?

(1) Universal Serial Bus Mouse

(2) Faster Random Access Memory

(3) Blu Ray Drive

(4) Solid State Hard Drive

Answer: 4

Click here to know the answers of Frequently Asked Questions for NTA UGC NET
December 2019 Exam

25. Given the following email fields, which of the email addresses will ‘swami’ be able to see
when he receives the message?

To… [email protected]

Cc… [email protected]; [email protected]

Bcc [email protected];
[email protected]

(1) [email protected]
(2) [email protected]; [email protected]; [email protected]

(3) [email protected]; [email protected]

(4) [email protected]; [email protected]; [email protected]; [email protected]

Answer: 2

26. Put the following units of storage into the correct order, starting with the smallest unit
first and going down to the largest unit:

(a) Kilobyte

(b) Byte

(c) Megabyte

(d) Terabyte

(e) Gigabyte

(f) Bit

Give your answer from the following code:

(1) (f), (b), (a), (c), (d), (e)

(2) (f), (b), (a), (d), (e), (c)

(3) (f), (b), (a), (c), (e), (d)

(4) (f), (b), (a), (d), (c), (e)

Answer: 3

27. With regard to computer memory, which of the following statement(s) is/are TRUE?

P: Read Only Memory (ROM) is ‘volatile’ memory.

Q: Random Access Memory (RAM) is ‘volatile’ memory.

R: Secondary Memory is ‘volatile’ memory.

(1) P only

(2) Q only
(3) P and Q only

(4) P and R only

Answer: 2

Click here to know the preparation strategy to crack NTA UGC NET December 2019
Exam

Computer Science Quiz Questions and Answers

1. The term ‘Computer’ is derived from……….? Latin


2. Who is the inventor of “Difference Engine”? Charles Babbage
3. Who is the father of Computer? Charles Babbage
4. Who is the father of Computer science? Allen Turing
5. Who is the father of personal computer? Edward Robert
6. A CPU contains? a control unit and an arithmetic logic unit
7. Which of the following controls the process of interaction between the user and the
operating system? User interface
8. The first computers were programmed using? machine language
9. ……….is a combination of hardware and software that facilitates the sharing of
information between computing devices? network
10. Coded entries which are used to gain access to a computer system are called? Passwords
11. You organize files by storing them in? folders
12. What type of resource is most likely to be a shared common resource in a computer
network?                 Printers
13. Which device is required for the Internet connection? Modem
14. What is a light pen? Optical input device
15. UNIVAC is? Universal Automatic Computer
16. CD-ROM stands for? Compactable Read Only Memory
17. ALU is? Arithmetic Logic Unit
18. VGA is? Video Graphics Array
19. IBM 1401 is Second Generation Computer
20. MSI stands for? Medium Scale Integrated Circuits
21. The capacity of 3.5 inch floppy disk is? 1.44 MB ( Computer Science Quiz )
22. WAN stands for? Wide Area Network
23. MICR stands for Magnetic Ink Character Reader
24. EBCDIC stands for? Extended Binary Coded Decimal Interchange Code
25. CAD stands for ?Computer aided design
26. Junk e-mail is also called? spam
27. Hackers does? break into other people’s computers
28. What type of computers are client computers (most of the time) in a client-server system?
Microcomputer
29. A computer cannot ‘boot’ if it does not have the? Operating System
30. The amount of vertical space between lines of text in a document is called line spacing
31. Example of non-numeric data is Employee address
32. What is embedded system? The computer and software system that control the machine 
33. First page of Website is termed as? Homepage
34. ………………… Is the appearance of typed characters? Format
35. When a file is saved for the first time it must be given a name to identify it
36. Office LANS, which are scattered geographically on large scale, can be connected by the
use of corporate WAN
37. Where are data and programme stored when the processor uses them? Main memory
38. …………… represents raw facts, where-as…………….. is data made meaningful. Data,
information
39. What characteristic of read-only memory (ROM) makes it useful? Data in ROM is non-
volatile, that is, it remains there even without electrical power.

Current Affairs + Quiz Files

1 User( For a Lonewolf)


₹699
₹ 399 Yearly

 Last 1 Year IT Current Affairs in Capsule format, Click here for Sample
 5 eBooks on IT Quiz in PDF Format
 1000 IT facts eBook in PDF
 300 IT Questions Excel Sheet with images
 250 Questions as CONNECT and Trivia by GreyCaps Interns
 Google Drive with ~ 1 GB of ppt,pdf,word IT Quiz Files
 1000+ Basic Fundamental interactive IT Questions
 Bonus slides on topics like Cloud Computing, Blogging, Information Security

Buy Now
Paytm/ UPI Accepted
56 SOLD

1. What do you call the programs that are used to find out possible faults and their causes?
diagnostic software
2. Which programming languages are classified as low level languages? Assembly
languages
3. Which of the following is not anti- viruses’ software? Oracle
4. Which device is required for the Internet connection? Modem
5. What does DMA stand for? Direct Memory Access
6. Which of the following is a storage device? All of the above
7. When did John Napier develop logarithm? 1614
8. A normal CD- ROM usually can store up to _________ _data? 680 MB
9. MIS is designed to provide information needed for effective decision making by?
Managers
10. What is a light pen? Optical input device
11. BCD is? Binary Coded Decimal
12. ASCII stands for? American Standard Code for Information Interchange
13. Which of the following is first generation of computer? EDSAC
14. Chief component of first generation computer was Vacuum Tubes and Valves
15. FORTRAN is? Formula Translation 
16. EEPROM stands for? Electronic Erasable Programmable? Read Only Memory
17. Second Generation computers were developed during ?1956 to 1965
18. The computer size was very large in ?First Generation
19. Microprocessors as switching devices are for which generation computers Fourth
Generation
20. Which of the following devices can be sued to directly image printed text? OCR
21. The output quality of a printer is measured by? Dot per sq. inch
22. Who designed the first electronics computer – ENIAC? J. Presper Eckert and John W
Mauchly
23. Who invented the high level language “C”? Dennis M. Ritchie
24. Personnel who design, program, operate and maintain computer equipment refers to ?
Peopleware
25. When did arch rivals IBM and Apple Computers Indecide to join hands? 1991 
( Computer Science Quiz )
26. Human beings are referred to as Homosapinens, which device is called Sillico Sapiens?
Computer
27. An error in software or hardware is called a bug. What is the alternative computer jargon
for it?                 Glitch
28. What is the name of the display feature that highlights are of the screen which requires
operator attention? Reverse video
29. Personal computers use a number of chips mounted on a main circuit board.What is the
common name for such boards? Motherboard
30. In most IBM PCs, the CPU, the device drives, memory expansion slots and active
components are mounted on a single board.What is the name of this board? Motherboard
31. What is meant by a dedicated computer? Which is assigned one and only one task
32. A computer program that converts an entire program into machine language is called a/an
? Compiler
33. A computer program that translates one program instructions at a time into machine
language is called a/an? Interpreter
34. A small or intelligent device is so called because ? it contains within it a ? Sensor 
35. A fault in a computer program which prevents it from working correctly is known as ?
Bug
36. A self replicating program, similar to a virus which was taken from a 1970s science
fiction novel by John Bruner entitled the Shockwave Rider is Worm
37. A state. is a bi-stable electronic circuit that has? Flip-flop
38. Unwanted repetitious messages, such as unsolicited bulk e-mail is known as ? Spam
39. DOS stands for? Disk Operating System
40.   Computer Science Quiz
41. Which of the following is also known as brain of computer? Central Processing unit
42. IBM stands for? International Business Machines
43. translates and executes program at run time line by line Interpreter
44. ……………… is an OOP principle? Inheritance
45. COBOL is widely used in applications involving? Commercial
46. RAM stands for? Random access memory
47. 1 Byte =? 8 bits
48. SMPS stands for? Switched mode Power Supply
49. The device used to carry digital data on analogue lines is called as Modem
50. VDU is also called? Both 1 & 2
51. BIOS stands for?                 Basic Input Output system
52. Father of C programming language? Dennis Ritchie
53. The instructions that tell a computer how to carry out the processing tasks are referred to
as computer? programs
54. An area of a computer that temporarily holds data waiting to be processed is? Memory
55. _________ is the key to close a selected drop -down list and cancel a command and close
a dialog box.? ESC
56. Data becomes ……………. when it is presented in a format that people can understand
and use? information
57. …………. Is the functional key to display save-as box? F12
58. The term …………. designates equipment that might be added to a computer system to
enhance its functionality? peripheral device
59. A ………… is a microprocessor -based computing device ?personal computer
60. RAM can be treated as the ……… for the computer’s processor? waiting room
61. To move a copy of file from one computer to another over a communication channel is?
File transfer
62. The primary function of the ………… is to set up the hardware and load and start an
operating system?                 BIOS
63. What kind of memory is both static and non -volatile? ROM
64. ___________is computer software designed to operate the computer hardware and to
provide platform for running application software? System software
65. The ……… is the amount of data that a storage device can move from the storage
medium to the Computer per second data? transfer rate 
66. A device, which is not connected to CPU, is called as ……. ?Off-line device
67. What is the other name for programmed chip? LSIC
68. On-line real time systems become popular in ……….. generation? Third Generation
69. You use a(n) ….., such as a keyboard or mouse, to input information? input device
70. …………. is the ability of a device to “jump” directly to the requested data? Random
access
71. …………. provides process and memory management services that allow two or more
tasks, jobs, or programs to run simultaneously? Multitasking
72. The task of performing operations like arithmetic and logical operations is called ?
Processing
73. ALU and Control Unit jointly known as ?CPU
74. RAM is an example of? Primary memory
75. Magnetic disk is an example of? Secondary memory
76. Which one of the following is NOT a computer language? MS-Excel
77. RAM is also called as Read / Write? Memory
78. ………… Store data or information temporarily and pass it on as directed by the control
unit      ?           Register
Hardware

- The physical parts of a computer -

CPU

Central processing unit; the brain of the computer; controls the other elements of the computer

Disk Drive

A peripheral device that reads and/or writes information on a disk

Hard Drive

A device (usually within the computer case) that reads and writes information, including the
operating system, program files, and data files

Keyboard

A peripheral used to input data by pressing keys

Modem

A peripheral device used to connect one computer to another over a phone line

Monitor

A device used to display information visually

Mouse

A peripheral device used to point to items on a monitor

NIC

Network interface card; a board inserted in a computer that provides a physical connection to a
network
Printer

A peripheral device that converts output from a computer into a printed image

Software

- Instructions executed by a computer -

Applications

Complete, self-contained programs that perform a specific function (ie. spreadsheets,


databases)

Bit

A computer's most basic unit of information

Boot

The process of loading or initializing an operating system on a computer; usually occurs as soon
as a computer is turned on

Browser

A program used to view World Wide Web pages, such as Netscape Navigator or Internet
Explorer

Bug

A part of a program that usually causes the computer to malfunction; often remedied in patches
or updates to the program

Byte

Small unit of data storage; 8 bits; usually holds one character

Click

Occurs when a user presses a button on a mouse which in turn, generates a command to the
computer
Database

A large structured set of data; a file that contains numerous records that contain numerous
fields

Diskette

A small flexible disk used for storing computer data

Double Click

Occurs when a user presses a button on the mouse twice in quick succession; this generates a
command to the computer

Download

Transferring data from another computer to your computer

Drag

Occurs when a user points the mouse at an icon or folder, presses the button and without
releasing the button, moves the icon or folder to another place on the computer where the
button is released

Driver

Software program that controls a piece of hardware or a peripheral

FAQ

Frequently asked question; documents that answer questions common to a particular website or
program

File

Namable unit of data storage; an element of data storage; a single sequence of bytes

Folder

A graphical representation used to organize a collection of computer files; as in the concept of a


filing cabinet (computer's hard drive) with files (folders)

Freeware
Software provided at no cost to the user

Gigabyte

1,073,741,824 bytes or 1,024 megabytes; generally abbreviated GB

GUI

Graphical user interface; uses pictures and words to represent ideas, choices, functions, etc.

Icon

A small picture used to represent a file or program in a GUI interface

Internet

A network of computer networks encompassing the World Wide Web, FTP, telnet, and many
other protocols

IP number

Internet protocol; a computer's unique address or number on the Internet

Kilobyte

1,024 bytes; usually abbreviated KB

Megabyte

1,048,576 bytes or 1,024 kilobytes; enough storage to approximately equal a 600 page
paperback book; generally abbreviated Mb

Memory

Any device that holds computer data

Menu

A list of operations available to the user of a program

Network

A collection of computers that are connected


Peripheral

Any of a number of hardware devices connected to a CPU

RAM

Random access memory; the type of storage that changes; when the computer is turned off, the
RAM memory is erased

ROM

Read-only memory; the type of storage that is not changed even when the computer is turned
off

Scroll Bar

Allows the user to control which portion of the document is visible in the window; available
either horizontally or vertically or both

Shareware

Software provided at a minimal cost to users who are on their honor to send in payment to the
programmer

Spreadsheet

A program arranged in rows and columns that manipulates numbers

Tool Bar

A graphical representation of program activities; a row of icons used to perform tasks in a


program

URL

Uniform resource locator; the address of a site on the World Wide Web; a standard way of
locating objects on the Internet

Virus

A deliberately harmful computer program designed to create annoying glitches or destroy data

Window
A screen in a software program that permits the user to view several programs at one time

Word Processor

A program that allows the user to create primarily text documents

 ADDRESS: Identification, represented in the form of a name, label, or number, for


recognizing a particular location in storage area.
 ALPHANUMERIC: It is a character set which contains letters, digits, and usually other
special characters such as comma, dollar sign, plus sign, etc.
 ALU: Arithmetic / Logic Unit is the component of the CPU that performs both the
arithmetic and the logical operations for the computer.
 ANALOG COMPUTER: A Computer that operates on data which is in the form
continuous variable physical quantities such as electrical current length, mass,
temperature or pressure.
 APPLICATION: A program that performs a function directly for a user.
 APPLICATION PROGRAM: Software designed for a specific purpose such as pay
calculation, processing of examination results, stores accounting and inventory control,
etc.
 ARTIFICIAL INTELLIGENCE (AI): A branch of computer that deals with computers
that possess reasoning, learning and thinking capabilities that resemble those of human
beings.
 ASSEMBLY LANGUAGE: It is a low-level programming language in which
mnemonics are used to code operations and alphanumeric symbols are used for
addresses.
 AVI: Audio Video Interleave is the standard audio / video format for Microsoft
Windows. AVI files, which end with an avi extension, require a special player.

Computer Terms / Terminologies Starting with “B” with


Definitions.
Computer Terms with their meaning / definition starting with B.

 BAR CODE: A coding structure in which characters are represented by means of a series
of parallel bars.
 BINARY: A number system using two unique digits. Because of a computer’s electrical
nature, all operations are performed using a representation of an open or closed circuit (0
for off, and 1 for on). Therefore, computers use the binary system when calculating
operations.
 BIOS: Basic Input / Output System. The program stored in a ROM chip in the computer
that provides the computer with basic code to control the computer’s hardware and
perform diagnostics on it. The BIOS prepares the computer to load the operating system.
 BOOLEAN: A form of algebra where all values are reduces to “true” or “false”. Boolean
logic is used with computers due to its similarities with the binary numbering system.
 BOOT: Short Term of BootStrap. The term boot is generally used to describe the initial
loading of an operating system or of some other program into a computer.
 BRIDGE: A device that supports LAN-to-LAN communications. Bridges may be
equipped to provide frame relay support to the LAN devices they serve. They also handle
traffic between two similar OR different LANs.
 BROADBAND SYSTEM: A network system in which several analog signals share the
same physical network channel.
 BUFFER: A strong area or a device where data are temporarily stored.
 BUG: An error in a computer program.
 BUS TOPOLOGY: A network geometric arrangement in which a single connecting line
is shared by a number of nodes.
 BYTE: A byte is a unit of measure used to describe an amount of data. One byte consists
of eight bits of data. Also se Megabyte, Gigabyte, Bit and File.

Computer Terms / Terminologies Starting with “C” with


Definitions.
Computer Terms with their meaning / definition starting with C.

 CABLE: The media that connects electrical components. Cable consists of a group of


mutually insulated conductors usually bound or sheathed together and carrying an
electrical or other type of signal.
 CACHE: The storage of instructions or data for future use.
 CD-ROM: Compact Disk Read Only Memory is a type of optical disk capable of storing
up to one gigabyte of data. Also see Byte, Megabyte, and Gigabyte.
 CHIP: A thin wafer of silicon on which integrated electronic components are deposited.
 CLIENT / SERVER: The relationship between computers on a network where the
“client” computer uses the resource on a “server” computer.
 COLD BOOT: Powering a computer up from the off position.
 COMPILER: It is a system software package which converts a high level language
program into a machine language.
 COMPUTER NETWORK: A distributed data processing system in which multiple
computers are linked together for the purpose of data communication and resource
sharing.
 CONTROL UNIT: The component of the CPU that instructs the rest of the computer
system on how to follow a program’s instructions. It directs the movement of data to and
from processor memory, holds data and instructions in the ALU, and directs control
signals between the CPU and external devices.
 CPU (CENTRAL PROCESSING UNIT): The control unit and the arithmetic logic unit
of a computer system are jointly known as the CPU. All calculations and comparisons are
made inside the CPU and the CPU is also responsible for activating and controlling the
operation of th other units of a computer system.
 CRT (CATHODE RAY TUBE): An electronic tube with a TV like screen upon which
information may be displayed.

You May Like: Computer Related Solved MCQs / True False Question Papers.

Computer Terms / Terminologies Starting with “D” with


Definitions.
Computer Terms with their meaning / definition starting with D.

 DATA: A collection of facts in raw form that become information after prop organisation
or processing.
 DECIMAL: A number system based on the number “10”. This number system is use on
an everyday basis.
 DEFAULT: A value or setting that is automatically applied by a device or program.
 DESKTOP: The metaphor used to portray file systems. A desktop consists pictures,
called icons, which show files, folders and any resource available to a user in a GUI
operating system.
 DESKTOP PUBLISHING PACKAGE (DTP): It is software which combines
computer and graphics manipulating capabilities to allow users to format charts and
picture with text and headlines.
 DIAGNOSTIC: Serving to identify the cause of a problem, as in diagnostic software that
will find out what problem a computer may be having.
 DIGITAL: A system that is based on events or data that is not continuous, such as a
binary system.
 DIGITIZE: To convert data to digital form.
 DIRECTORY: A type of file that organizes other files in a hierarchical structure.
 DNS: Domain Name System is an Internet Service that converts names to addresses.
 DOMAIN: A logical group of computers and electronic devices with a common set rules
and procedures administered as a unit.
 DOS: Disk Operating System is a 16-bit command-line interface operating system that
does not support multiple users or multi-tasking.
 DOT MATRIX: A type of printer that produces characters and illustrations by striking
pins against an ink ribbon and print media to print closely spaced dots in certain
configuration, much like a typewriter.
 DRAM: Dynamic Random Access Memory is a type of RAM that only holds its data if it
is continuously accessed by special logic called a refresh circuit.
 DVD-ROM: Digital Versatile Disk Read Only Memory is an optical storage media
capable of holding from 4.7 GBs to 17 GBs with faster access and transfer rates than CD-
ROMs.

Computer Terms / Terminologies Starting with “E” with


Definitions.
Computer Terms with their meaning / definition starting with E.

 EEPROM: ELectrically Erasable Programmable Read Only Memory is a special type of


PROM that can be erased by exposure to an electrical charge.
 EPROM: Erasable Programmable Read Only Memory is a special type of memory that
can be erased by exposure to ultraviolet light.
 ETHERNET: A LAN protocol developed in 1976 by Xerox Corporation in cooperation
with DEC and Intel. Ethernet uses a bus or star topology and supports data tranfer rates of
10 Mbps.

Computer Terms / Terminologies Starting with “F” with


Definitions.
Computer Terms with their meaning / definition starting with F.

 FAT: File Allocation Table is used by the operating system to store information about
where files are stored on a disk. The File Allocation Table is much like the table, of
contents in a book.
 FILE TRANSFER PROTOCOL (FTP): The protocol used by the Internet community
to send files.
 FILE: A collection of related record.
 FLIP-FLOP: A sequential electronic circuit which can be placed in one out of two stable
states. Each state may be used to represent a binary digit 1, or 0.
 FLOPPY DISK: A portable, removable magnetic disk used to store data using a floppy
disk drive. Also see Floppy Disk Drive.
 FLOW CHART: A pictorial representation that uses pre-defined symbols to describe
either the logic of a computer program (program flowchart) or the data flow and
processing steps of a system (i.e. system flow chart).
 FOLDER: An object is a graphical user interface capable of storing multiple files and
and other folders.
 FONT: The combination of typeface and other qualities such as size, pitch and spacing,
that comprise a set of characters.

Computer Terms / Terminologies Starting with “G” with


Definitions.
Computer Terms with their meaning / definition starting with G.

 GIGABYTE (GB): One thousand Megabytes.


 GIGAHERTZ (GHZ): One billion (1,000,000,000) cycles per second. This is a
common measurement of the speed of a processing chip.
 GUI: Graphical User Interface is software that uses a computer’s graphics ability to
organize and display resources and objects making it easier to use and eliminating the
need for a command-line interface.

Computer Terms / Terminologies Starting with “H” with


Definitions.
Computer Terms with their meaning / definition starting with H.

 HARD COPY: Printed output from a computer device in a human readable form.
 HARD DISK DRIVE (HDD): The device that stores and retrieves data from hard disks.
 HARDWARE: The physical electronic components that make up a computer system.
 HEADER: In Word processing and printing one or more identifying lines printed at the
top of page.
 HEXADECIMAL: The base-16 number system. This system can represent a byte as two
consecutive hexadecimal digits.
 HUB: A network device where the information flow is accumulated and then distributed
to various groups and users. It can be used between users on the same LAN and users on
different LANs.
 HYPERLINK: An item in an electronic document that links to another object such as a
position in a document or a different document.
 HYPERTEXT TRANSFER PROTOCOL (HTTP): The protocol of the World Wide
Web. This protocol provides standards by which messages are formatted and sent.

Computer Terms / Terminologies Starting with “I” with


Definitions.
Computer Terms with their meaning / definition starting with I.

 I/O: Input / Output describes any operation, program, or device that transfers data to or
from a computer. Typically I/O devices are printers, hard disks, keyboard and mice.
 IDE: Integrated Drive Electronics.
 INTERNET: The decentralized global network that connects millions of computers
worldwide.
 INTERPRETER: A language processor that translates a statement of a high-level
language and immediately executes it before translating the next source language
statement. It is the most common language processor for BASIC.
 IP ADDRESS: A numerical identifier for an electronic device on a network utilizing the
TCP/IP protocol in the form of a 32-bit numeric address written as four numbers
separated by periods.
 ISDN: Integrated Service Digital Network is a standard for sending data, voice and video
over telephone lines supporting a data transfer rate of 64 Kbps. ISDN service normally
provides two lines called. B channels, where one line is used for data and one for voice. It
is possible to use both lines for data, achieving transfer rates up to 128 Kbps.
 ISO: International Organisation for Standardization is an international organisation that s
responsible for a wide range of standards, including those relevant to networking. ISO
developed the OSI reference model, a popular networking reference model.
 ISP: Internet Service Provider is a company that provides users with a connection to the
Internet. Also see Internet.
 IT: Information Technology encompasses the subject concerned with all aspects of
managing and processing information.

Computer Terms / Terminologies Starting with “J” with


Definitions.
Computer Terms with their meaning / definition starting with J.

 Jitter: distortion caused in a digital signal by a shift in timing pulses, can also cause data
interpretation errors.
 Joint Photographic Experts Group (JPEG)): refers to a lossy compression technique
to reduce the overall image size of the images.

Computer Terms / Terminologies Starting with “K” with


Definitions.
Computer Terms with their meaning / definition starting with K.

 KILOBIT (KB): Approximately 1000 bits (precisely 1024 bits).


 KILOBITS PER SECOND (KBPS): This is a standard measurement of the amount of
data transferred over a network connection. Kbps is a data transfer rate of approximately
1,000 bits per second.

You May Like: A to Z Computer Abbreviations / Full Forms PDF Download.

Computer Terms / Terminologies Starting with “L” with


Definitions.
Computer Terms with their meaning / definition starting with L.

 LAN: Local Area Network is a network that is confined to a limited geographical area.
This can be a room, a floor, a building or even an entire campus.
 LAPTOP COMPUTER: A self-contained portable computer small enough to use on a
person’s lap.
 LASER PRINTER: It is a very high speed printer which uses a combination of laser-
beam and electro-photographic techniques to create printed outputs at speed in excess of
13,000 lines per minute.
 LED: Light Emitting Diode is a semiconductor device that emits visible light when an
electric current passes through it.
 LIGHT PEN: It is a pen shaped device, which is used as an input device to computers by
writing or sketching on the screen of a cathode ray tube.
 LINE PRINTER: A printer which prints one line at a time.
 LOW-LEVEL LANGUAGE: Programming languages that normally translate from one
source instruction to one object instruction. These languages are machine dependent.

Computer Terms / Terminologies Starting with “M” with


Definitions.
Computer Terms with their meaning / definition starting with M.

 MACHINE LANGUAGE: A low-level language which is directly understandable by


the computer system. Each model of the computer system has a unique machine
language.
 MACINTOSH: A computer manufactured by Apple Computer Company featuring a
GUI, Windows, icons and the use of the mouse to navigate.
 MAGNETIC TAPE: It is a secondary storage device which uses a long plastic strip
coated with a magnetic material as a recording medium.
 MAGNETIC-INK CHARACTER RECOGNITION (MICR): It is an input device
which can read cards and paper documents printed with a special magnetic ink.
 MAINFRAME: A large and expensive computer capable of supporting hundreds, or
even thousands, of users simultaneously.
 MAN: Metropolitan-Area Network is a network between the LAN and the WAN in size.
This is a network that covers roughly the area of a large city or metropolitan area.
 MEDIA: The various physical environments through which transmission signals pass.
 MEGABIT (MB): Approximately 1 million (actually 1,048,576) bits.
 MEGABYTE (MB): Approximately 1 million (actually 1,048,576) bytes.
 MEMORY: A device or medium that can accept data, hold them, and deliver them on
demand at a later time.
 MICRO COMPUTER: The smallest category of computer fabricated using a
microprocessor and other integrated circuits, namely a ROM, RAM and I/O interface
chips.
 MICROPROCESSOR: A chip that contains a CPU.
 MINICOMPUTER: A multiprocessing system capable of providing resources to
between four and 200 users simultaneously.
 MODEM: A contraction of “modulator-demodulator”, it is a device that converts digital
and analog signals. At the source, a modem converts digital signals to a form suitable for
transmission over analog communication facilities. At the destination, the analog signals
are returned to their digital form. Modems allow data to be transmitted over voice-grade
telephone lines.
 MOTHERBOARD: The main circuit board in a computer. This board connects all of the
hardware in the computer together. Also see circuit board, hardware.
 MULTIPROCESSING: A term used to describe interconnected computer configuration
or computers with two or more independent CPUs that have the, ability to simultaneously
execute several programs.
 MULTIPROGRAMMING: The name given to the interleaved execution of two or
more different and independent programs by the same computer.
 MULTI-USER: Two or more users running programs and sharing peripheral devices,
such as a printer, at the same time.

Computer Terms / Terminologies Starting with “N” with


Definitions.
Computer Terms with their meaning / definition starting with N.

 NANOSECOND: One billionth (10-9) of a second.


 NETWORK: Two or more computer systems connected together in order to share
resources.
 NETWORK INTERFACE CARD: A chip – based circuit board used to connect the PC
to a network or server. The card is activated by loading software on the PC.
 NON-IMPACT PRINTER: A non-impact printer is a printer that prints without banging
a ribbon on to paper such as a thermal, inkjet and laser printer.
 NON-VOLATILE STORAGE: A storage medium that retains its contents even in the
absence of power.
 NTFS: New Technology File System is a type of file system that provides improved fault
tolerance over traditional file system, and also provides file-level security.
 NUMBER SYSTEMS: Sets of values used to represent quantity.

Computer Terms / Terminologies Starting with “O” with


Definitions.
Computer Terms with their meaning / definition starting with O.

 OPERATING SYSTEM: The program that performs all of the system tasks and
provides an environment in which other programs can be run.
 OPTICAL CHARACTER READER (OCR): An input device which can read
characters directly from an ordinary piece of paper by using a scanning mechanism.
These characters are written in a special type font.
 OSI: Open System Interconnection model is an ISO standard that defines a networking
structure for implementing protocols in seven layers to transfer data.
Computer Terms / Terminologies Starting with “P” with
Definitions.
Computer Terms with their meaning / definition starting with P.

 PACKET: One piece of data along with a destination address used in a packet switching
network.
 PASSWORD: A code by which a user gains access to a computer system.
 PDA: Personal Digital Assistant describes a handheld ,multifunction electronics device
capable of combining cellular phone service, fax and personal organizer abilities
together. Most PDAs use a stylus to enter data, necessitating the use of handwriting
recognition technology.
 PEER TO PEER: In peer to peer communication, both computers perform processing of
data at both ends, not just input and output.
 PERIPHERAL: Any device in a computer system that is not essential to the operation of
the computer.
 PICOSECOND: One trillionth of a second.
 PIXEL: Picture element is the smallest part of a graphic image. Many pixels close
together make up the image on the computer monitor.
 POP: Post Office Protocol is a protocol used by e-mail clients on a network to retrieve e-
mail from the mail servers. Also see Protocol, E-Mail, Client, Server and Network.
 PORT: An interface on the computer where a device is connected.
 PRIMARY MEMORY: A section of the CPU which holds program instructions, input
data, intermediate results and output information produces during processing. It is also
known as primary storage , internal storage and main memory.
 PRINTER MEMORY: A specialized type of memory that can be installed in a printer
that will increase its capabilities.
 PRINTER: An output device used to produce hard copy of computer output which is
readable by human beings.
 PROGRAM: It is a set of instructions used to direct and control the operations of the
computer in order to solve a problem or to perform a particular task. It is also known as
routine.
 PROM: Programmable ROM is a type of ROM that can be programmed using special
equipment and can be written to only once.
 PROMPT: One or more symbols used by the computer to indicate if its ready for data
input from a user.
 PROTOCOL: A set of rules by which computers communicate. A protocol is much like
the syntax of a language rather than the language itself.
 PVC: Polyvinyl Chloride is the material out of which the jacket on non-plenum grade
cable is made.

Computer Terms / Terminologies Starting with “Q” with


Definitions.
Computer Terms with their meaning / definition starting with Q.

 QBE: “Query By Example” is a feature included with various database applications


which provides a user friendly method of running database queries.
 QUAD-CORE: The processor with four processing cores.
 QUICKTIME: Multimedia Technology developed by Apple Computers.
 QWERTY: A standard (Latin alphabet-based) keyboard. The first 6 keys in this
keyboard is Q, W, E, R, T and Y and hence called as QWERTY Keyboard.

Computer Terms / Terminologies Starting with “R” with


Definitions.
Computer Terms with their meaning / definition starting with R.

 RAM: Random Access Memory is computer memory that can be accessed randomly,
that is, any byte of memory can be accessed without touching the preceding byte.
 RING NETWORK: A computer network in which there is no host computer for
controlling other computer and in which all stations are equal.
 ROM: Read Only Memory is a type of memory prerecorded on a chip that can only be
read. This type of memory retains its contents without electricity.
 ROOT DIRECTORY: The uppermost directory in a file system.

Computer Terms / Terminologies Starting with “S” with


Definitions.
Computer Terms with their meaning / definition starting with S.

 SDRAM: Synchronous Dynamic Random Access Memory is a memory type that


synchronizes itself with the CPU’s bus to provide faster transfer rates than standard
DRAM.
 SEARCH ENGINE: A type of program that seeks out and indexes documents from the
World Wide Web and USENET groups based on specific criteria or “Key Words”. An
example is Google.
 SECURITY: The issues of protecting data from unauthorized use, tampering, or
destruction are collectively referred to as security issues.
 SEGMENT: The fragments of a physical record that are arranged in a hierarchical
fashion.
 SERVER: A computer or device on a network that manages network resources.
 SIMPLEX: Transmission of data in one direction.
 SOFTCOPY: Computer output which is displayed on the screen.
 SOFTWARE: Any type of data or instructions that can be stored electronically.
 SPOOLING: It is a technique used to reduce the speed mismatch between slow speed
I/O devices and fast CPU.
 SPREADSHEET: Software for arranging values with a defined relationship with each
other.
 SQL: Abbreviations of structured query language. It is relational data access language
created by IBM.
 SRAM: Static RAM is a type of RAM that holds its data without being refreshed, for as
long as power is supplied to the circuit.
 STANDARD: An accepted format approved by recognized organisation to define certain
aspects of an industry.
 STAR NETWORK: A network having a central host computer system that is attached to
local computers through multiple communication lines.
 SYSTEM SOFTWARE: A set of one or more programs designed to control the
operation of a computer system.

Computer Terms / Terminologies Starting with “T” with


Definitions.
Computer Terms with their meaning / definition starting with T.

 TCP/IP: Transmission Control Protocol / Internet Protocol is the suite of communication


protocols used to connect hosts on the Internet.
 TELECOMMUNICATION: Transmission of data between computer system and / or
terminals at different locations through telephone facilities.
 TOPOLOGY: The shape of a communication system such as LAN.
 TWISTED-PAIR: A type of cabling used for data and voice communication that
consists of pairs of copper wires twisted inside an outer jacket.

Computer Terms / Terminologies Starting with “U” with


Definitions.
Computer Terms with their meaning / definition starting with U.

 UNIVAC: It is Abbreviation of Universal Automatic computer. It is the first


commercially available computer.
 UNIX: UNIpleXed Information and Computing System is a multi-user, multitasking
operating system designed to be used exclusively by programmers.
 URL: Uniform Resource Locator is the global addressing system for the World Wide
Web. The first part of the address indicates what protocol to use, and the second part
specify the IP address where the resource is located.
 USB: Universal Serial Bus is an external bus standard that can connect up to 127 USB
devices at transfer rates of up to 180 Mbps.
 USENET: A worldwide bulletin board system that can be accessed through the Internet.
Computer Terms / Terminologies Starting with “V” with
Definitions.
Computer Terms with their meaning / definition starting with V.

 VDU (Video Display Unit): An I/O device which consists of a television tube for
presenting output and a keyboard for entering inputs.
 VGA: Video Graphics Array is a standard graphics display system for computers that
uses an analog signal instead of a digital signal.
 VIRTUAL MEMORY: A method of using disk space so as to make programs believe
that the system contains more RAM than is actually available. This is done by using pure
segmentation or pure paging or both.
 VIRUS: A program that is loaded onto a computer without the knowledge of the user and
runs unknowingly and typically maliciously.

Computer Terms / Terminologies Starting with “W” with


Definitions.
Computer Terms with their meaning / definition starting with W.

 WAN: Wide Area Network is a network made up of interconnected LANs that span wide
geographic area by using WAN links, such as telephone lines or satellite technology, to
connect computers in different cities, countries or even different continents.
 WARM BOOT: Restarting a computer that is already turned on without first turning it
off. Also see Boot, Cold Boot.
 WEB BROWSER: Software that is used to display web pages and present audio and
video to the user.
 WEB PAGE: A document written in a language of the World Wide Web.
 WEB SERVER: A computer that delivers Web pages to computer users on Internet.
 WEB SITE: A location on the World Wide Web that contains a home page, which is the
first document users see when they enter the site. The site might also contain additional
documents and files.
 WIRELESS: The ability of an electronic device to communicate with another device
using the atmosphere as its media. Also see Media.
 WORD PROCESSOR: Software used to perform word processing functions such as
writing and editing documents.
 WORLD WIDE WEB (WWW): a collection of Internet servers that support documents
created in a specific format, such as HTML, to be displayed with a Web Browser.

You might also like