A path by which communication is achieved between a central processor and other devices is called


Options: Audit trail,    Network,    Bus,    Channel

Ans:C,(Canswer


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 7443 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


Which of the following best illustrates the default subnet mask for a class A,B, and C Network?
Options: 0.0.0.0, 0.0.0.1, 0.0.1.1,    255.255.255.0, 255.255.0.0, 255.0.0.0,    255.0.0.0, 255.255.0.0, 255.255.255.0,    255.255.0.0, 255.255.255.0, 255.255.255.255

Ans:C ,C


Which device is used to backup the data?
Options: Floppy Disk B. Tape C. Network Drive D. All of the above

Ans:– D ,


. The .... displays the name of every computer user on the computer
Options: a. Wish list screen b. Command screen c.Welcome screen d. None of the above

Ans: c, c


What is the main advantage of magnetic core memory over semiconductor RAM memory?
Options: more compact and smaller,    more economical,    a bit does not have to write after reading,    non volatile

Ans:D ,D


Which of the following is the coding of data so that is can't be easily understood if intercepted.
Options: Barcode,    Decoder,    Encryption,    Mnemonics

Ans:C ,C


Who is credited with the idea of using punch cards to control patterns in a weaving machine?
Options: Pascal,    Hollerith,    Babbage,    jacquard

Ans:D ,D


The control unit of a microprocessor
Options: stores data in the memory,    accepts input data from a keyboard,    Performs arithmetic / logic / functions,    none of the above

Ans:D,None of the above


General ledger is also referred to as:
Options: main ledger,    extra ledger,    nominal ledger,    All of the above

Ans:C ,C


Which program is used to automatically install Red Mat Linux on identical hardware?
Options: bzimage.img,    tar,    ghost,    mkkickstart

Ans:D ,D


To prevent toner from sticking to a laser printer's heat rollers, apply which of the following:
Options: Alcohol,    Oil,    Ammonia,    Beer or Jack Daniels

Ans:B ,B


The main purpose of time sharing techniques used in computers is to make the best use of the
Options: CPU,    peripherals,    seconday storage,    floppy disks

Ans:A,A


A computer file contains several records. What does each record contain?
Options: Bytes,    Words,    Fields,    Database

Ans:C ,C


A pointer is
Options: A keyword used to create variables,    A variable that stores address of an instruction,    A variable that stores address of other variable,    All of the above

Ans:C ,C


A hard copy would be prepared on a
Options: Line printer,    Dot matrix printer,    Type writer terminal,    Plotter

Ans:E ,E


A file produced by a spreadsheet 
Options: a. is generally stored on disk in an ASCII text fromat b. can be used as is by the DBMS c. both a and b d. none of the above

Ans:0.a,0.a


We have been given access to the company's operational data, and have been asked to produce a report. We discover that some of the data we need are in an SQL server database while other needed data are in a separate Oracle database. This is an example of ________ .
Options: dirty data,    inconsistent data,    non-integrated data,    a "wrong format" problem

Ans:C ,C


If every non-key attribute is functionally dependent on the primary key, the relation will be in
Options: First Normal Form B. Second Normal Form C. Third Normal Form D. Fourth Formal Form

Ans:– C ,


Which of the following is not considered as a tool at the system design phase?
Options: piechart,    data-flow diagram,    decision table,    systems flowchart

Ans:A ,A


. RD command are used to
Options: a. Remove an empty directory b. Remove non empty directory c. Remove directory including files d. None of the above

Ans:9 – a ,9 – a


Changing oil in an automobile is an example of
Options: preventative maintenance,    scheduled maintenance,    both (a) and (b),    neither (a) nor (b)

Ans:C ,C


Which of the following modifications may not succeed?
Options: Changing a column data type from char to date,    Changing a column data type from numeric to char,    Both of the above actions should succeed.,    Neither of the above actions will succeed.

Ans:A ,A


Which of the following data structure store the homogeneous data elements?
Options: a. Arrays b. Records c. Pointers d. None  

Ans:a,Arrays


. Which is not the function of the operating system?
Options: a. Memory management b. Disk management c. Application management d. Virus protection

Ans:3 – d ,3 – d


. A .... is a named location on a disk where files are stored
Options: a. Folder b. Pod c. Version d. None of the above

Ans: a, a


Creating a read-only database is a task that is ________ assigned to beginning database professionals.
Options: always,    commonly,    seldom,    never

Ans:B ,B


You need to find the broadcast address used on a LAN on your router. What command will you type into the router from user mode to find the broadcast address?
Options: show running-config,    show startup-config,    show interfaces,    show protocols

Ans:C ,C


Impact printers
Options: strike a ribbon against the paper to produce character images,    include ink-jet and thermal devices,    are more expensive than Laser printers,    use optical technology

Ans:A ,A


. What type of relationship is created when you select a primary key in both related tables?
Options: a. One-To-One b. Indeterminate c. One-To-Many d. Many-To-Many

Ans:7 – a ,7 – a


Which program is used to schedule particular jobs or programs at particular times on the system?
Options: vi,    Outlook,    Scheduler,    cron

Ans:D ,D


A vertically aligned set of tracks on a disk pack is known as
Options: Cluster,    Surface,    Cylinder,    Panel

Ans:C ,C


The strategy of allowing processes that are logically runnable to be temporarily suspended is called
Options: preemptive scheduling,    non preemptive scheduling,    shortest job first,    first come first served

Ans:A ,A


An Access database object that is used to enter, view or edit records
Options: a. Table b. Form c. Query d. Report

Ans:ndash; b,ndash; b


.Finding the location of the element with a given value is:
Options: A)Traversal b.Search c.Sort d.None of above

Ans:B,B


Views constructed from SQL SELECT statements that conform to the SQL-92 standard may not contain:
Options: GROUP BY.,    WHERE.,    ORDER BY.,    FROM.

Ans:C ,C


. Which of the following is not essential component to perform a mail merge operation?
Options: a. Main document b. Data source c. Merge fields d. Word fields

Ans:– D,– D


Which of the following systems software does the job of merging the records from two flies into one?
Options: Documentation system,    Utility program,    Networking software,    Security software

Ans:B ,B


Where would you load the mouse driver mouse.sys?
Options: config.sys,    autoexec.bat,    win.ini,    io.sys

Ans:A ,A


. During the boot process, the …. looks for the system file
Options: a. CD b. BIOS c. CPU d. DVD

Ans:7 – b ,7 – b


42. Which of the following is the second step in creating a macro?
Options: a. Start recording b. Using your mouse or keyboard, perform the task you want to automate c. Assign a keyboard shortcut to the macro d. Give the macro a name

Ans:– D ,– D


. Magnetic tape can serve as
Options: A) Secondary storage media B) Output media C) Input media D) All of the above

Ans:A,A


. In what respect computers are superior to human beings?

Options: A) Diligence B) Intelligence C) Both of above D) None of above

Ans:A,A


What command do you type to save the configuration stored in RAM to NVRAM?
Options: Router(config)#copy current to starting,    Router#copy starting to running,    Router(config)#copy running-config startup-config,    Router#copy run startup

Ans:D ,D


Which of the following summation operations is performed on the bits to check an error-detecting code?
Options: Codec,    Coder-decoder,    Checksum,    Attenuation

Ans:C ,C


. Which function will you use to enter current time in a woksheet cell?
Options: a. =today() b. =now() c. =time() d. =currentTime()

Ans:– b,– b


. Which device can understand difference between data & programs?
Options: A) Input device B) Output device C) Memory D) Microprocessor

Ans:D,D


. What is System Analysis?

Options: A) The design of the screen the user will see and use to enter or display data B) System analysis defines the format and type of data the program will use C) System Analysis involves creating formal model of the problem to be solved D) None of the above

Ans:C,C


In OSI model, which of the following layer transforms information from machine format into that understandable by user
Options: application,    presentation,    session,    physical

Ans:B ,B


54. If the number of columns is selected 1 and the line between check box is marked, where is the line drawn?
Options: a. in the left margin b. in the right margin c. both in left and right margin d. None of Above

Ans:– D ,– D


Critical path of the PERT chart is:
Options: path which takes the longest time to complete the project,    the shortest path,    both of the above,    path which takes the shortest time to complete the project

Ans:A ,A


Which computer has been designed to be as compact as possible?
Options: Mini,    Super computer,    Micro computer,    Mainframe

Ans:C ,C

www.000webhost.com