A pen shaped device which can sense light, and is used to point at spots on a video screen.


Options: Mouse,    Light pen,    Joystick,    Plotter

Ans:B,(Banswer


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 11004 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Computer Fundamental Related questions:


. Which keys can be pressed quit without saving in DOS
Options: a. Ctrl + A b. Ctrl + B c. Ctrl + C d. Ctrl + D

Ans:Correct Answer: c ,Correct Answer: c


Topically, how many type III PC cards can you insert in a laptop
Options: 1,    2,    3,    4

Ans:A ,A


A relation is considered a:
Options: Column.,    one-dimensional table.,    two-dimensional table.,    three-dimensional table.

Ans:C ,C


. Which of the following statement about directories is false?
Options: a. Directories can exist inside directories b. The root directory is always at the highest level c. Directories cannot be renamed d. Directories can be deleted

Ans:6 – c ,6 – c


. The appropriate Data Type to store Time in MS Access?
Options: a. Date/Time b. Time Only c. Time d. Time cannot be stored

Ans:– a,– a


. How to restrict the values of a cell so that only whole numbers between 9 and 99 can be entered in a cell.
Options: a. The Settings tab under the menu Format -> Cells b. The Settings tab under the menu Data -> Validation c. The Settings tab under the menu Data -> Filter -> Advanced Filter d. the Settings tab under the menu Format -> Conditional Formatting

Ans:– b,– b


What command is not used to list the files chap01, chap02 and chap04?
Options: ls chap*,    ls chap[124],    ls - x chap0[124],    ls chap0[124]

Ans:B ,B


  Dedicated Computer means
Options: Doesn’t have OS B. Used by single person C. Assigned to one and only one task D. All of Above

Ans:– C ,


. Time during which a job is processed by the computer is
Options: A) Delay times B) Real time C) Execution time D) Down time

Ans:C,C


Which memory allocation policy allocate the largest hole to the process?
Options: Best-Fit B. Worst-Fit C. First-Fit D. None of them

Ans:– B ,


What is the term used when a clip art image changes the direction of faces?
Options: a. Group b. Flip c. Rotate d. All of the above

Ans: – C , – C


Which of the following provides a printed copy of your presentation?
Options: a. Outline b. Speaker notes c. Audience handouts d. All of the above

Ans: – C , – C


How does a host on an Ethernet LAN know when to transmit after a collision has occurred? In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. You can improve the CSMA/CD network by adding more hubs. After a collision, the station that detected the collision has first priority to resend the lost data. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
Options: 1 and 3,    2 and 4,    1,3 and 4,    2 and 5

Ans:D ,D


When a computer is first turned on or restarted, a special type of absolute loader is executed, called a
Options: "Compile and Go" loader,    Boot loader,    Bootstrap loader,    Relating loader

Ans:C ,C


A physical connection between the microprocessor memory and other parts of the microcomputer is known as
Options: Path,    Address bus,    Route,    All of the above

Ans:B ,B


A PC with a 486DX2 processor runs internally at SOMhz. What speed would its external logic be running?
Options: l0Mhz,    25Mhz,    50Mhz,    100 Mhz

Ans:B ,B


The programs which are as permanent as hardware and stored in ROM is known as
Options:  Hardware B.  Software C.  Firmware D.  ROM ware

Ans:– C ,


Networks that follow the 802.5 standard appear to be in a star topology but are actually operating in what type of topology?
Options: Linear bus,    Modified star,    Modified ring,    Ring

Ans:D ,D


Computer can not do anything without a
Options: Chip,    Memory,    Output device,    Program

Ans:D ,D


To move the cursor page to page of document
Options:  A) Ctrl+PgDn, B) Ctrl+PgUp, C) Both of above, D) None of above, 

Ans:-C,-C


The electronic component that has been the key to recent developments in automation is the:
Options: improved vacuum tube,    integrated circuit,    diode,    transistor

Ans:B ,B


Which of the following memory unit that processor can access more rapidly
Options:  Main Memory B.  Virtual Memory C.  Cache memory D.  Read Only Memory

Ans:– C ,


HMP (Host Monitoring Protocol) is:
Options: a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address,    a TCP/IP high level protocol for transferring files from one machine to another.,    a protocol used to monitor computers,    a protocol that handles error and control messages

Ans:C ,C


A prefix for billion which is equal to _____ is called as billi.
Options: 100,    10000,    1000,    10

Ans:D ,D


You are testing the resistance in Ohms of a fuse on a 15K amp system. If the fuse is good, the meter should read?
Options: 0.0,    0.2,    5.0,    2.0

Ans:A ,A


A datum that indicates some important state in the content of input or output is
Options: Sequence,    Sentinel,    SIO,    Sibling

Ans:B,(Banswer


Dot-matrix is a type of
Options: Tape,    Printer,    Disk,    Bus

Ans:B ,B


The register which holds the address of the location to or from which data are to be transferred is known as
Options: index register,    instruction register,    memory address register,    memory data register

Ans:C,C


. In a folder, which of the following command is used to rename the file or folder
Options: a. F3 b. F4 c. F2 d. F7

Ans:0 – c ,0 – c


The Personal Consultant is based on:
Options: EMYCIN,    OPS5+,    XCON,    All of the above

Ans:D ,D


The table created by lexical analysis to describe all literals used in the source program, is
Options: Terminal table,    Literal table,    Identifier table,    Reductions

Ans:B ,B


CBCT stands for
Options: Customer Bank Credit Terminal,    Commercial Banking Credit Terminal,    Customer-Bank Communication Terminal,    Commercial Bank Communication Terminal

Ans:C ,C


Which one of the following statements is true for the voltages in a series RL circuit?
Options: The total voltages is equal to the sum of the voltages across the resistance and inductance,    The voltage always has the same amplitude and phase for every part of the circuit,    The total voltage is less than the sum of the voltages across the resistance and inductance,    The total voltage lags the total current by less than 90

Ans:C ,C


When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be configured?
Options: The Frame Relay encapsulation on the physical interface,    The local DLCI on each subinterface,    An IP address on the physical interface,    The subinterface type as point-to-point

Ans:C ,C


What are the columns in a Microsoft Access table called?
Options: a. Rows b. Records c. Fields d. Columns

Ans:ndash; c,ndash; c


On the 16-bit ISA bus, IRQ2 is elevated to which higher level Interrupt?
Options: 9,    11,    13,    15

Ans:A ,A


. The word length of a computer is measured in
Options: A) Bytes B) Millimeters C) Meters D) Bits

Ans:D,D


Point out the correct statement which correctly allocates memory dynamically for 2D array following program? #include<stdio.h> #include<stdlib.h> int main() { int *p, i, j; /* Add statement here */ for(i=0; i<3; i++) { for(j=0; j<4; j++) { p[i*4+j] = i; printf("%d", p[i*4+j]); } } return 0; }
Options: p = (int*) malloc(3, 4);,    p = (int*) malloc(3*sizeof(int));,    p = malloc(3*4*sizeof(int));,    p = (int*) malloc(3*4*sizeof(int));

Ans:D ,D


Which of the following are the best units of data on an external storage device?
Options: Bits B. Bytes C. Hertz D. Clock cycles

Ans:8 – B ,


. Which would you choose to list Synonyms & Antonyms of a selected word?
Options: a. Tools, Spelling & Grammar b. Tools, Language c. Tools, Options d. Insert, Cross-reference

Ans: –  B , –  B


What is invoked via HTTP on the Web server computer when it responds to requests from a user's Web browser?
Options: A Java application,    A Java applet,    A Java servlet,    None of the above is correct.

Ans:C ,C


. What does the VLOOKUP function do?
Options: a. Looks up text that contain ‘v’ b. Checks whether text is the same in one cell as in the next c. Finds related records d. All of above

Ans:– c,– c


Data integrity control
Options: is used to set upper and lower limits on numeric data,    requires the use of passwords to prohibit unauthorized access to the file,    has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files,    All of the above

Ans:C ,C


WRAM is used on a
Options: modem,    video card,    motherboard,    ata connector

Ans:B ,B


What technology is used for flat panel displays?
Options: Solid state,    RBG monitor,    VLSI,    Direct view storage tube

Ans:A,A


Which of the following is a communication network that is devoted to carrying computer information.
Options: Data point,    Data module,    Data network,    Data pack

Ans:C ,C


Which encapsulations can be configured on a serial interface? Ethernet Token Ring HDLC Frame Relay PPP
Options: 1 and 4,    2 only,    3, 4 and 5,    All of the above

Ans:C ,C


The manager attempts to expedite, or speed up, the flow of
Options: machines,    manpower,    material,    All of the above

Ans:C ,C


Which of the following is not true of the traditional approach to information processing?
Options: There is common sharing of data among the various applications,    It is file-oriented,    Programs are dependent on the files,    It is inflexible

Ans:A ,A


. What term refers to a specific set of values saved with the workbook?
Options: a. Range b. Scenario c. Trend line d. What-if analysis

Ans:– b,– b

www.000webhost.com