A compiler means


Options: A person who compiles source programs,    The same thing as a programmer,    Keypunch operator,    A program which translates source program into object program

Ans:D,(Danswer






More Computer Fundamental Related questions:


A notation used to express clearly on algorithm is known as
Options: Algorithmic language,    Assembly language,    Machine language,    High level language

Ans:A,(Aanswer


How can you increase the font size of selected text by one point every time?
Options:  A) By pressing Ctrl + ], B) By pressing Ctrl + [, C) By pressing Ctrl + }, D) By pressing Ctrl + {,

Ans:-A,-A


To verify that the note text is positioned correctly on the page, switch to _____ view or display the document in print preview.
Options: a. normal b. print layout c. page layout d. page edit

Ans:– B,– B


15. While working with which command is used to copy all files from the currently logged drive and directory with the extension .txt to the drive a
Options: a. Copy a. *.txt b. Copy *.txt a: c. Copy *.txt c: d. Copy *.txt all.txt

Ans:Correct Answer: b,Correct Answer: b


The space factor when determining the efficiency of algorithm is measured by
Options: a. Counting the maximum memory needed by the algorithm b. Counting the minimum memory needed by the algorithm c. Counting the average memory needed by the algorithm d. Counting the maximum disk space needed by the algorithm  

Ans:a,a


The selected design template can be applied
Options: a. to current slide only b. to all the slides c. to all the new presentation you create d. all of above

Ans: – D , – D


Helping people keep track of things is the purpose of a(n) ________ .
Options: database,    table,    instance,    relationship

Ans:A ,A


High-level languages:
Options: are "procedure-oriented",    are very difficult to use,    cannot be used with automatic systems.,    require knowledge of the computer design

Ans:A ,A


What is the default subnet mask for a class A network?
Options: 127.0.0.1,    255.0.0.0,    255.255.255.0.0,    255.255.255.0

Ans:B ,B


The elements of an array are stored successively in memory cells because
Options: a. by this way computer can keep track only the address of the first element and the addresses of other elements can be calculated b. the architecture of computer memory does not allow arrays to store other than serially c. both of above d. none of above

Ans:a,a


Which of the following is NOT an Oracle-supported trigger?
Options: BEFORE,    DURING,    AFTER,    INSTEAD OF

Ans:B ,B


Router operates in which layer of OSI Reference Model?
Options:  Layer 1 (Physical Layer) B.  Layer 3 (Network Layer) C.  Layer 4 (Transport Layer) D.  Layer 7 (Application Layer)

Ans: – B ,


Semaphores
Options: synchronize critical resources to prevent deadlock,    synchronize critical resources to prevent contention,    are used to do I/O,    are used for memory management

Ans:A ,A


Without using the mouse or the arrow keys, what is the fastest way of getting to cell A1 in a spreadsheet?
Options: a. Press Ctrl +Home b. Press Home c. Press Shift + Home d. Press Alt + Home

Ans:#8211; a,#8211; a


The accuracy of the floating-point numbers representable in two 16-bit words of a computer is approximately
Options: A) 16 digits B) 6 digits C) 9 digits D) All of above

Ans:-B,-B


Which statement describes a spanning-tree network that has converged?
Options: All switch and bridge ports are in the forwarding state.,    All switch and bridge ports are assigned as either root or designated ports.,    All switch and bridge ports are in either the forwarding or blocking state.,    All switch and bridge ports are either blocking or looping.

Ans:C ,C


Management has become more complex because
Options: there is less time to react to competitive actions,    the equipment used in many of the firm's activities has become more complex,    firms have become larger,    All of the above

Ans:D ,D


. A word field may consist of an optional field instruction called a(n) ______ 
Options: a. subdocument b. symbol c. signal d. switch

Ans:–  D,–  D


Which programming languages are classified as low level languages?
Options: Basic, COBOL, FORTRAN B. Prolog 2, Expert Systems C. Knowledge based Systems D. Assembly Languages

Ans:  – D ,


The primary interactive method of communication used by humans is:
Options: reading,    writing,    speaking,    All of the above

Ans:C ,C


. Ctrl + T
Options: a. Hanging Indent b. Left Indent c. Open Tabs Dialog box d. Terminate all opened Dialog box

Ans:–  A,–  A


22. The Footnote Text style defines characters as _____.
Options: a. 12-point Times New Roman and paragraphs as single-spaced and right-aligned b. 10-point Times New Roman and paragraphs as double-spaced and left-aligned c. 12-point Times New Roman and paragraphs as double-spaced and right-aligned d. 10-point Times New Roman and paragraphs as single-spaced and left-aligned

Ans:– D ,– D


The light pen was developed in
Options: 1942,    1976,    1950,    1992

Ans:C ,C


A set of programs that handle a firm's data base responsibilities is called a
Options: Data Base Management System (DBMS),    Data Base Processing System (DBPS),    Data Management System (DMS),    All of the above

Ans:D ,D


Which of the following TCP/IP protocol is used for transferring files from one machine to another?
Options: RARP,    ARP,    TCP,    FTP

Ans:D ,D


Which of the following is not user defined data type? 1 : struct book { char name[10]; float price; int pages; }; 2 : long int l = 2.35; 3 : enum day {Sun, Mon, Tue, Wed};
Options: 1,    2,    3,    Both 1 and 2

Ans:B ,B


One of a class of storage devices that can access storage locations in any order is
Options: DTE,    DASD,    DDE,    DDC

Ans:B ,B


Point out the correct statement which correctly free the memory pointed to by 's' and 'p' in the following program? #include<stdio.h> #include<stdlib.h> int main() { struct ex { int i; float j; char *s }; struct ex *p; p = (struct ex *)malloc(sizeof(struct ex)); p->s = (char*)malloc(20); return 0; }
Options: free(p); , free(p->s);,    free(p->s); , free(p);,    free(p->s);,    free(p);

Ans:B ,B


Which was the first commercial computer built by M.V. Wilkies.
Options: Super computer,    LEO,    Mainframe,    Micro computer

Ans:B ,B


To remove duplicate rows from the results of an SQL SELECT statement, the ________ qualifier specified must be included.
Options: ONLY,    UNIQUE,    DISTINCT,    SINGLE

Ans:C ,C


Which of the following systems software does the job of merging the records from two files into one?
Options: Security software,    Utility program,    Networking software,    Documentation system

Ans:B ,B


In an absolute loading scheme, which loader function is accomplished by loader
Options: Reallocation,    Allocation,    Linking,    Loading

Ans:D ,D


What is the meaning of “Hibernate” in Windows XP/Windows 7? A)  Restart the Computer in safe mode B)  Restart the Computer in hibernate mode C)  Shutdown the Computer terminating all the running applications D)  Shutdown the Computer without closing the running applications
Options:

Ans:– D ,


. Which of the following is extension of WordPad?
Options: a. .ppt. b. .xls c. .rtf d. None of above

Ans:8 – c ,8 – c


What command do you use to create Linux file systems?
Options: fdisk,    mkfs,    fsck,    mount

Ans:B ,B


When Word flags a possible spelling or grammar error, it also changes the mark on the Spelling and Grammar Status icon to a _____.
Options: a. green X b. green check mark c. red X d. red check mark

Ans:– C,– C


. The slide that is used to introduce a topic and set the tone for the presentation is called the
Options: a. Table slide b. Graph slide c. Bullet slide d. Title slide

Ans:2 – D ,2 – D


0. Windows displays various options to shutdown. Which is suitable at the end ofday?
Options: a. Shut Down b. Restart c. Sleep d. Hibernate

Ans: - a, - a


Top-level managers are responsible for _____ plans and decisions.
Options: strategic,    structured,    simulation,    tactical

Ans:A ,A


. The ALU of a computer normally contains a number of high speed storage element called
Options: A) Semiconductor memory B) Registers C) Hard disks D) Magnetic disk

Ans:B,B


The teleprocessing system appropriate for a probability encoding system is
Options: an on-line batch system,    an interactive time-sharing system,    a large-scale batch system,    All of the above

Ans:B ,B


A _____ is an outline of a process that keeps develop successful information systems
Options: System Development Life Cycle,    CASE tool,    Phased Conversion,    Success Factors

Ans:A ,A


ASK, PSK, FSK, and QAM are examples of _____ encoding.
Options: digital-to-digital,    digital-to-analog,    analog-to-analog,    analog-to-digital

Ans:B ,B


What protocol does PPP use to identify the Network layer protocol?
Options: NCP,    ISDN,    HDLC,    LCP

Ans:A ,A


Which of the following symbol modes are used to input of graphics to General CAD system?
Options: Live and Rectangle mode,    Arc and Circle mode,    Dimension and Alphanumeric mode,    All of the above

Ans:D ,D


An astable multivibrator is a circuit that:
Options: has two stable states,    is free-running,    produces a continuous output signal,    is free-running and produces a continuous output signal

Ans:C ,C


The location for subdirectories for local programs and executables for user and administrative commands, is:
Options: /usr,    /tmp,    /opt,    /mnt

Ans:A ,A


To enable EIGRP, which of the following would you use? Router1(config-if)# ipv6 ospf 10 area 0.0.0.0 Router1(config-if)# ipv6 router rip 1 Router1(config)# ipv6 router eigrp 10 Router1(config-rtr)# no shutdown Router1(config-if)# ipv6 eigrp 10
Options: 1, 3 and 5,    3, 4 and 5,    1 and 3,    5 only

Ans:B ,B


The period of a waveform is:
Options: the time required to complete one full cycle,    the number of cycles completed in one second,    the time required for the voltage to rise from 10% to 90% of the peak amplitude,    equal to 0.707 times the peak amplitude

Ans:A ,A


. Relationship can be establish between two tables by
Options: a. Drag Primary key of a table into Foreign key of another table b. Drag Foreign key of a table into Primary key of another table c. Drag any key of a table into any key of another table d. All of the above

Ans:– a,– a

www.000webhost.com