A group of magnetic tapes, videos or terminals usually under the control of one master is


Options: Cylinder,    Cluster,    Surface,    Track

Ans:B,(Banswer


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 10270 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


The word 'linear' in linear programming is used to describe:
Options: relationship among two or more variables in a straight line,    relationship among two or more variable which are directly proportional,    relationship among two or more variables is linear,    all of the above

Ans:B ,B


What service is not monitored by inetd ?
Options: SSH,    time,    ntalk,    finger

Ans:A ,A


In data transmission, the bit coding scheme used to represent a byte is typically:
Options: EBCDIC,    ASCII,    SNA,    Hexadecimal

Ans:B ,B


In SQL, which command is used to add new rows to a table?
Options: ALTER TABLE,    ADD ROW,    INSERT,    APPEND

Ans:C ,C


You record the algorithm in the _____ column of the IPO chart.
Options: Input,    Output,    Processing,    Purpose

Ans:C ,C


Which of the following communications lines is best suited to interactive processing applications?
Options: narrowband channels,    simplex lines,    full-duplex lines,    mixed band channels

Ans:C ,C


When a disk stack is serviced by a comb-like access mechanism, there is one read/write head for each
Options: disk,    disk surface,    track,    cylinder

Ans:B ,B


. The __________ is the software tool to store or access data.
Options: a. table b. DBMS c. query d. report

Ans:6 – b ,6 – b


. Which of the following is text browser?
Options: a. Lynx b. Hot Java c. Netscape d. Internet Explorer

Ans:5 – a ,5 – a


Which of the following function will return a value of 8?
Options: ROUNDUP(8.4999, 0) B. ROUNDDOWN(8.4999, 0) C. ROUND(8.4999, 0) D. Only B and C

Ans:– D ,


. Which is the menu command to recolor a picture on a slide
Options: a. Insert -> Picture -> Recolor b. Tools -> Picture -> Recolor c. Format -> Picture -> Recolor d. Edit -> Picture -> Recolor

Ans:4 – C ,4 – C


One byte can be used to encode any integer between 'O' and -inclusive
Options: 16,    256,    128,    255

Ans:D,D


You should never put floppy drives, hard drives, or even VCR tapes or cassette tapes on top of speakers (or near any other source of magnetism) because of:
Options: RFI,    EMI,    EXE,    FYI

Ans:B ,B


When the values in one or more attributes being used as a foreign key must exist in another set of one or more attributes in another table, we have created a(n):
Options: transitive dependency.,    insertion anomaly.,    referential integrity constraint.,    normal form.

Ans:C ,C


On executing the below program what will be the contents of 'target.txt' file if the source file contains a line "To err is human"? #include<stdio.h> int main() { int i, fss; char ch, source[20] = "source.txt", target[20]="target.txt", t; FILE *fs, *ft; fs = fopen(source, "r"); ft = fopen(target, "w"); while(1) { ch=getc(fs); if(ch==EOF) break; else { fseek(fs, 4L, SEEK_CUR); fputc(ch, ft); } } return 0; }
Options: r n,    Trh,    err,    None of above

Ans:B ,B


Access time in a computer memory is the time required to
Options: Locate the stored data,    Retrieve the stored data,    Both locate and retrieve the data,    All of the above

Ans:C ,C


When did IBM release the first version of disk operating system DOS version 1.0?
Options: 1981,    1982,    1983,    1984

Ans:A ,A


What is stderr ?
Options: standard error,    standard error types,    standard error streams,    standard error definitions

Ans:C ,C


. Which of the following printing devices an output composed of a series of data?
Options: A) Wire matrix printer B) Band printer C) Wang image printer D) Both a and c

Ans:D,D


. Which of the following is correct?
Options: =POWER(2^3) B. =POWER(2,3)             C. =POWER(2#3) D. =POWER(2*3)

Ans:– B ,


A programming language intended to solve a no. of different types of problems is
Options: COBOL,    General purpose programming language,    BASIC,    FORTRAN

Ans:B ,B


. Which of the following dialog boxes enables users to enforce referential integrity in a One-To-Many relationship?
Options: a. Edit Relationships b. Indexes c. Option d. Show Table

Ans:6 – a ,6 – a


A hashing scheme is used with
Options: sequential file organization,    direct file organization,    indexed sequential file organization,    partitioned file organization

Ans:B,B


What does the passive command provide to dynamic routing protocols?
Options: Stops an interface from sending or receiving periodic dynamic updates.,    Stops an interface from sending periodic dynamic updates but not from receiving updates.,    Stops the router from receiving any dynamic updates.,    Stops the router from sending any dynamic updates.

Ans:B ,B


Which of the following statement is valid?
Options: A) Lady Augusta is the first programmer B) Ada is the daughter of Lord Byron, a famous English poet C) ADA is a programming language developed by US Defense D) All of above

Ans:-D,-D


What is the size of Host bits in Class B of IP address?
Options: 04 B. 08 C. 16 D. 32

Ans:– C ,


What is the highest address possible if 16 bits are used for each address?
Options: 65536,    12868,    16556,    643897

Ans:A,A


Which of the following are word processing software?
Options:  A) WordPerfect, B) Easy Word, C) MS Word, D) All of above, 

Ans:-D,-D


The packets switching concept was first proposed
Options: in the late 1980s for the Defense Ministry of US.,    in the early 1960s for military communication systems, mainly to handle speech,    in the late 1950s for Defense Ministry of US,    All of the above

Ans:B ,B


Point out the correct statement will let you access the elements of the array using 'p' in the following program? #include<stdio.h> #include<stdlib.h> int main() { int i, j; int(*p)[3]; p = (int(*)[3])malloc(3*sizeof(*p)); return 0; }
Options: for(i=0; i<3; i++) { for(j=0; j<3; j++) printf("%d", p[i+j]); } ,    for(i=0; i<3; i++) printf("%d", p[i]); ,    for(i=0; i<3; i++) { for(j=0; j<3; j++) printf("%d", p[i][j]); } ,    for(j=0; j<3; j++) printf("%d", p[i][j]);

Ans:C ,C


Binary numbers need more places for counting because
Options: They are always big numbers,    Any no. of 0's can be added in front of them,    Binary base is small,    0's and l's have to be properly spaced apart

Ans:C,(Canswer


A system has two IDE hard drives that are each divided into primary and extended partitions, which drive letter is assigned to the primary partition of the second drive?
Options: C,    D,    E,    F

Ans:B ,B


. Main storage is also called
Options: A) Accumulator B) Control Unit C) Register Unit D) Memory

Ans:7-D,7-D


Which of the following do you use to change margins?
Options: a. formatting toolbar b. page setup dialog box c. Standard toolbar d. paragraph dialog box

Ans:–  B,–  B


Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as
Options: Amplitude-shift keying,    Amplitude,    Amplitude modulation,    Aloha

Ans:A ,A


Which of the following name does not relate to stacks?
Options: a. FIFO lists b. LIFO list c. Piles d. Push-down lists

Ans: a, a


The processing capability of a microcomputer can be enhanced with the help of
Options: addition processor,    expansion cards,    secondary memory,    buffer memory

Ans:B ,B


. This is the stage in database design where one gathers and list all the necessary fields for the database project.
Options: a. Data definition b. Data refinement c. Establishing relationship d. None of the above

Ans:1 – a ,1 – a


What type of addressing format is used by Class A network.
Options: Net.Net.Net.Node,    Net.Net.Node.Node,    Net.Node.Net.Node,    Net.Node.Node.Node

Ans:D ,D


. The primary purpose of an operating system is:
Options: a. To make the most efficient use of the computer hardware b. To allow people to use the computer, c. To keep systems programmers employed d. To make computers easier to use

Ans: a, a


Which gate sends on a pulse when it receives one at either or both of its terminals.
Options: NOR,    NOT,    OR,    NAND

Ans:C ,C


An operation that will increase the length of a list is
Options: Insert,    Look-up,    Modify,    All of the above

Ans:A ,A


The second set of the three permissions (r-) indicates that
Options: group has read permission only,    other has read permission only,    owner has read permission only,    group has write permission only

Ans:A ,A


. Charles Babbage is considered the father of modern computers because
Options: A) of his difference engine B) of his analytical engine C) his concept of input, mill and output D) All of above

Ans:C,C


The Personal Consultant is based on:
Options: EMYCIN,    OPS5+,    XCON,    All of the above

Ans:D ,D


What command is used to compare the files?
Options: ccp,    du,    cmp,    comp

Ans:C ,C


What is the shortcut key you can press to create a copyright symbol?
Options:  A) Alt+Ctrl+C, B) Alt + C, C) Ctrl + C, D) Ctrl + Shift + C,

Ans:-A,-A


The Enterprise tier of the three-tiered database architecture includes:
Options: managing the data.,    managing the User-system interface.,    processing HTTP protocol.,    processing scripting tasks.

Ans:A ,A


. What is the use of Notes in slides?
Options: a. It will be displays at the time of Slide Presentation b. This is just Note about the slide c. This is just for printing purpose only d. Notes cannot be inserted in Slides

Ans:0 – B ,0 – B


The first set of the three permissions (rw) pertains to the owner of the file, indicating that the owner has
Options: executable permission only,    write and executable permissions,    both read and executable permissions.,    both read and write permissions

Ans:D ,D

www.000webhost.com