A common boundary between two systems is called


Options: Interdiction,    Interface,    Surface,    None of the above

Ans:B,(Banswer






More Computer Fundamental Related questions:


The procedure for evaluating the relative performance of different computers, is done by the process called
Options: batch processing,    sequential processing,    bench marking,    All of the above

Ans:C ,C


Data item characteristics that are important in data management include
Options: punctuation,    language,    spelling,    width

Ans:D ,D


Which of the following is not true about documentation?
Options: Documentation, of a system, should be as clear and direct as possible,    Documentation increases the maintenance time and cost,    Documentation gives better understanding of the problem,    All of the above

Ans:B ,B


A development strategy whereby the executive control modules of a system are coded and tested first, is known as
Options: Bottom-up development,    Top-down development,    Left-Right development,    All of the above

Ans:B ,B


The saturation point is approximately the same as
Options: cutoff point,    lower end of the load line,    upper end of the load line,    infinity

Ans:C ,C


Common Gateway Interface (CGI) is which of the following?
Options: An interface that accepts and returns data that may be written in SQL.,    An interface that accepts and returns data that may be written in any language that produces an executable file.,    A small program that executes within another application and is stored on the server.,    A small program that executes within another application and is stored on the client.

Ans:B ,B


To save a workbook, you:
Options: a. Click the save button on the standard toolbar from the menu b. Press Ctrl+F5 c. Click Save on the Windows Start button d. Select Edit>Save

Ans:#8211; a,#8211; a


Software is:
Options: printer output,    a set of instructions,    tape input.,    a programming language

Ans:B ,B


. Which mode loadsminimal set of drivers when starting Windows?
Options: a. Safe Mode b. Normal Mode c. VGA Mode d. Network Support Mode

Ans: a, a


The technique designed to support the effective access of micro-filmed data is:
Options: Microfiche retrieval,    COM,    Micrographics,    All the above

Ans:C ,C


Each answer below shows example data from a table. Which answer is an example of the inconsistent values problem?
Options: Three columns have the values 534-2435, 534-7867, and 546-2356 in the same row.,    Three rows have the values Brown Small Chair, Small Chair Brown, and Small Brown Chair in the same column.,    Three rows have the values Brown, NULL, and Blue in the same column.,    One row has the value "He is interested in a Silver Porsche from the years 1978-1988" in a column.

Ans:B ,B


Convert the 080D4E machine language instructions into assembly language, assuming that they were not generated by pseudo-ops:
Options: ASRA,    LOADA h#OD4E, i,    STOREA h#014B, d,    ADDA h#01FE, i

Ans:B ,B


Which of the following commands is used to identify the type of file by context?
Options: ls,    cat,    file,    more

Ans:C ,C


What kind of capability is required if one plans to interface with a plotter or printer?
Options: A graphics cable,    RGB monitor,    A graphics board,    A co-processor

Ans:C ,C


. A name or number used to identify storage location devices?
Options: A) A byte B) A record C) An address D) All of above

Ans:3-C,3-C


Data manipulation language (DML)
Options: describes how data are structured in the data base,    specifies for the DBMS what is required; the techniques used to process data,    determine how data must be structured to produce the user's view,    All of the above

Ans:B ,B


.   Which of the following includes special effects that can be applied to drawing objects?
Options: a. Gradient fills b. Line color and style c. Rotating d. All of above

Ans:1 – D ,1 – D


. Which of the following is not a class based on size?
Options: A) Mainframe Computer B) Micro Computer C) Mini Computer D) Digital Computer

Ans:D,D


What will be the output of the program? #include<stdio.h> int main() { typedef float f; static f *fptr; float fval = 90; fptr = &fval; printf("%f\n", *fptr); return 0; }
Options: 9,    0,    90.000000,    90

Ans:C ,C


The term referring to evacuating the content of some part of the machine is known as
Options: Dump,    Enhancement,    Down,    Compiler

Ans:A ,A


  After choosing a predefined template, which option has to be chosen to change the background color?
Options: Design Template B. Color Scheme C. Animation Scheme D. Color Effects

Ans:– B ,


What type of control pins are needed in a microprocessor to regulate traffic on the bus, in order to prevent two devices from trying to use it at the same time?
Options: Bus control,    Interrupts,    Bus arbitration,    Status

Ans:C ,C


A multifield transformation does which of the following?
Options: Converts data from one field into multiple fields,    Converts data from multiple fields into one field,    Converts data from multiple fields into multiple fields,    All of the above

Ans:D ,D


. We can start the application from?
Options: a. Log off b. Network place c. Recycle bin d. Run

Ans:2 – d ,2 – d


Layer-2 Switch is also called
Options: Multiport Hub B. Multiport Switch C. Multiport Bridge D. Multiport NIC

Ans:– C ,


What is route poisoning?
Options: It sends back the protocol received from a router as a poison pill, which stops the regular updates.,    It is information received from a router that can't be sent back to the originating router.,    It prevents regular update messages from reinstating a route that has just come up.,    It describes when a router sets the metric for a downed link to infinity.

Ans:D ,D


An electronic circuit with about 20 transistors fabricated on a silicon chip is known as
Options: SSI,    MSI,    DPS,    RJE

Ans:A ,A


Strong AI is
Options: the embodiment of human intellectual capabilities within a computer.,    a set of computer programs that produce output that would be considered to reflect intelligence if it were generated by humans.,    the study of mental faculties through the use of mental models implemented on a computer.,    All of the above

Ans:A ,A


. Booting means
Options: a. Restarting computer b. Installing program c. Removing errors d. Switch off

Ans:7 – a ,7 – a


The conference that launched the AI revolution in 1956 was held at:
Options: Dartmouth,    Harvard,    New York,    Stanford

Ans:A ,A


Which of the following bus types are used by the Apple Macintosh computer?
Options: ISA,    NuBus,    EISA,    MCA

Ans:B ,B


Which command will be used with vi editor to append text at end of line?
Options: A,    a,    i,    I

Ans:A ,A


Which of the following is associated with networks?
Options: Download, node,    Star topology,    Point-to-Point,    Both (a) and (b)

Ans:D ,D


Point out the error in the program f(int a, int b) { int a; a = 20; return a; }
Options: Missing parenthesis in return statement,    The function should be defined as int f(int a, int b),    Redeclaration of a,    None of above

Ans:C ,C


12. Swapping
Options: a. Works best with many small partitions b. Allows many programs to use memory simultaneously c. Allows each program in turn to use the memory d. Does not work with overlaying

Ans:Correct Answer: c,Correct Answer: c


To select an entire column in MS-EXCEL, press?
Options: CTRL + C B. CTRL + Arrow key C. CTRL + S D. None of the above

Ans:– D ,


.   Material consisting of text and numbers is best presented as
Options: a. A table slide b.  A bullet slide c. A title slide d. All of above

Ans:1 – A ,1 – A


44. Which feature is used to replace straight quotes with smart quotes as you type?
Options: a. Auto Correct as you type b. Auto Change as you type c. Auto Format as you type d. Smart Tags as you type

Ans:–  C ,–  C


A device which converts human readable data into machine language is
Options: Card reader,    Card punch,    Punched paper tape,    Character reader

Ans:D ,D


Which of the following statement obtains the remainder on dividing 5.5 by 1.3 ?
Options: rem = (5.5 % 1.3),    rem = modf(5.5, 1.3),    rem = fmod(5.5, 1.3),    Error: we can't divide

Ans:C ,C


A public key encryption system
Options: allows anyone to decode the transmission,    allows only the correct sender to decode the data,    allows only the correct receiver to decode the data,    does not encode the data before transmitting it

Ans:C ,C


Which of the following is not a disadvantage of wireless LAN?
Options: Slower data transmission,    higher error rate,    interference of transmissions from different computers,    All of the above

Ans:D ,D


. An input /output device at which data enters or leaves a computer system is
Options: A) Keyboard B) Terminal C) Printer D) Plotter

Ans:8-B,8-B


The Primary job of the operating system is A)  Manage Commands B)  Manage Users         C)  Manage Programs D)  Manage Resources
Options:

Ans:– D ,


. LSI, VLSI & ULSI chips were used in which generation?

Options: A) First B) Second C) Third D) Fourth

Ans:D,D


Text boundary can be displayed or hidden from
Options:  A) Auto text option from Insert menu, B) Options from Tools menu, C) Customize from Tools menu, D) All of above, 

Ans:-B,-B


Which of the following is a problem of file management system?
Options: a. difficult to update b. lack of data independence c. data redundancy d. All of above

Ans:d,All of above


Which of the following are layers in the TCP/IP model? Application Session Transport Internet Data Link Physical
Options: 1 and 2,    1, 3 and 4,    2, 3 and 5,    3, 4 and 5

Ans:B ,B


In a pure inductor:
Options: ac current leads the voltage by 90 degree,    ac current and voltage are exactly in phase,    ac current lags the voltage by 90 degree,    ac current is converted to dc voltage

Ans:C ,C


    Which command divides the surface of the blank disk into sectors and assign a unique address to each one
Options: a.    Ver b.    Format c.    Fat d.    Chkdsk

Ans:.b,Correct Answer: b. Format

www.000webhost.com