A section of code to which control is transferred when a processor is interrupted is known as


Options: M,    SVC,    IP,    MDR

Ans:A,(Aanswer


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 10402 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


. Regarding data, computers are very good at
Options: A) store B) Processing C) retrieve D) All of above

Ans:D,D


. In copy con command, con stands for what?
Options: a. Control b. Console c. Contrast d. Contents

Ans:3 – b ,3 – b


In which of the following situations might a blind search be acceptable?
Options: real-life situation,    complex game,    small search space,    All of the above

Ans:C ,C


To conserve battery power on your laptop computer. What DOS v6.x command should you use?
Options: Powermon.exe,    Power.exe,    Idel.com,    Pw.sys

Ans:B ,B


Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer.
Options: Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology,    Ethernet, because it is cabled using fiber-optic cable,    Token-Ring, because it uses a MAU,    Ethernet, because it can be set up with most topologies and can use multiple transfer speeds

Ans:D ,D


Speech recognition:
Options: will never be used in industrial controls,    is already widely used in industrial controls,    will be used in more applications as the technology matures.,    All of the above

Ans:C ,C


The barcode which is used on all types of items, is read by a scanning device directly into the computer. What is the name of this scanning device?
Options: Laser scanner,    Wand,    OCR,    MICR

Ans:A ,A


. Which of the following database objects can have more than one Group Header/Footer section?
Options: a. Forms b. Queries c. Reports d. Tables

Ans:7 – c ,7 – c


Sort/Report generators
Options: a . are faster than index/report generators b . require more disk space than indexed/report generators c . do not need to sort before generating report d . both a and b

Ans:D,Both A and B


Backward recovery is which of the following?
Options: Where the before-images are applied to the database,    Where the after-images are applied to the database,    Where the after-images and before-images are applied to the database,    Switching to an existing copy of the database

Ans:A ,A


The "curse of dimensionality" relates to which problem of using operational data for BI reporting?
Options: Dirty data,    Inconsistent data,    Too much data,    Non-integrated data

Ans:C ,C


. Mini computers and micro computers are from which generation of computers?
Options: A) First B) Second C) Third D) Fourth

Ans:D,D


. What do you call a primary key field included in another table?
Options: a. Foreign key b. Parent key c. Child key d. Index

Ans:– a,– a


What is the jumper setting on a SCSI device to configure it to use the fourth SCSI id? Remember, SCSI ids start with zero.
Options: 010,    110,    011,    101

Ans:C ,C


Both conditions display on the same row in the design grid when ___operator is in use
Options: a. OR b. IN c. AND d. LIKE

Ans:ndash; c,ndash; c


Which of the following computer language is used for artificial intelligence?
Options: FORTRAN,    PROLOG,    C,    COBOL

Ans:B ,B


Which of the following term is used in connection with the organisation of files in ALGOL 68
Options: Blow,    Machine,    Biquinary,    Book

Ans:D ,D


. The magnetic storage chip used to provide non-volatile direct access storage of data and that have no moving parts are known as
Options: A) Magnetic core memory B) Magnetic tape memory C) Magnetic disk memory D) Magnetic bubble memory

Ans:D,D


Which is used for manufacturing chips?
Options: A) Bus B) Control unit C) Semiconductors D) A and b only

Ans:-C,-C


. What is the use of Cascade Delete Option in MS Access?
Options: a. It makes sure that all the records from the parent table and child table is deleted from selected database b. It makes sure that all the related records will be deleted automatically from child table when the records from parent table is deleted c. It makes sure that all the related records will be deleted automatically from Parent table when the records from child table is deleted d. None of above

Ans:– b,– b


What PPP protocol provides dynamic addressing, authentication, and multilink?
Options: NCP,    HDLC,    LCP,    X.25

Ans:C ,C


. To display the content of the disk we use
Options: a. Format b. Dir c. Copy d. WinZip

Ans:6 – b ,6 – b


The first computer introduced in Nepal was
Options: A) IBM 1400 B) IBM 1401 C) IBM 1402 D) IBM1402

Ans:-B,-B


Which of the following is not a factor in the failure of a systems development project ?
Options: inadequate user involvement,    failure of systems integration,    size of company,    continuation of a project that should have been cancelled

Ans:C ,C


A computer program consists of
Options: System flowchart,    Program flowchart,    Algorithms written in computer's language,    Discrete logical steps.

Ans:C ,C


. What are inserted as cross-reference in Word?
Options: a. Placeholders b. Bookmarks c. Objects d. Word fields

Ans:–  D,–  D


You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
Options: access-list 10 deny 192.168.160.0 255.255.224.0,    access-list 10 deny 192.168.160.0 0.0.191.255,    access-list 10 deny 192.168.160.0 0.0.31.255,    access-list 10 deny 192.168.0.0 0.0.31.255

Ans:C ,C


When the minimum number of instances of an entity is one, you know which of the following?
Options: Mandatory one,    Optional one,    Mandatory many,    Cannot tell

Ans:D ,D


Which of the following are used to quickly accept, store, and transfer data and instructions that are being used immediately by the CPU?
Options: microprocessors,    registers,    ROM chips,    data buses

Ans:B ,B


The ALU of a central processing unit does the essential maths work for the computer. What does the control unit do?
Options: Communicates its results,    Activates the output device,    Monitors the flow of information,    Control the printer

Ans:C ,C


Vision sensors:
Options: will remain very costly,    can not improve much in the next decade,    will more closely match the capabilities of the human eye,    All of the above

Ans:C ,C


Which of the following languages is often translated to pseudo code?
Options: Assembly,    FORTRAN,    PASCAL,    BASIC

Ans:C ,C


RS-232 is a standard that applies to:
Options: serial ports,    parallel ports,    game ports,    networks

Ans:A ,A


D/A (digital to analog) conversion:
Options: results in a binary code as the final output,    has to be sampled at 1/2 the highest input frequency,    must be fed through a filter to reproduce the original signal accurately,    both (b) and (c)

Ans:C ,C


ODBC minimum SQL grammar contains which of the following?
Options: INSERT, UPDATE, DELETE only,    Stored Procedures only,    Literals for date, time and timestamp only,    CREATE VIEW, DROP VIEW only

Ans:A ,A


What will be the output of the program? #include<stdio.h> typedef struct error {int warning, err, exception;} ERROR; int main() { ERROR e; e.err=1; printf("%d\n", e.err); return 0; }
Options: 0,    1,    2,    Error

Ans:B ,B


. Status indicators are located on the
Options: a. Vertical scroll bar b. Horizontal scroll bar c. Formula bar d. Formatting toolbar

Ans:– c,– c


A composite attribute is which of the following?
Options: An attribute that can be broken into components,    An attribute that cannot be broken into components,    Multiple attributes,    An identifier

Ans:A ,A


Which constraint requires that the binary relationship indicate all combinations that must appear in the ternary relationship?
Options: MUST COVER,    MUST NOT,    Both of the above.,    None of the above is correct.

Ans:A ,A


. Which of the following are loaded in safe mode?
Options: a. Keyboard driver b. Mouse driver c. VGA drive d. All of above

Ans: d, d


. What are the tabs that appear at the bottom of each workbook called?
Options: a. Reference tabs b. Position tabs c. Location tabs d. Sheet tabs

Ans:– d,– d


. The arrangement of elements such as Title and subtitle text, pictures, tables etis called :
Options: a. Layout b. Presentation c. Design d. Scheme

Ans:2 – A ,2 – A


The function of CPU is
Options: to provide a hard copy,    to read, interpret and process the information and instruction,    to communicate with the operator,    to provide external storage of text

Ans:B ,B


Indicate which, of the following, in not true about an interpreter
Options: Interpreter generates an object program from the source program,    Interpreter is a kind of translator,    Interpreter analyses each source statement every time it is to be executed,    All of the above

Ans:A ,A


ISDN stands for:
Options: internal select data nulls,    integrated services digital network,    interval set down next,    interior sector direct none

Ans:B ,B


The primary interactive method of communication used by humans is:
Options: reading,    writing,    speaking,    All of the above

Ans:C ,C


Which is not a factor when categorizing a computer?
Options: Speed of the output device,    Amount of main memory the CPU can use,    Cost of the system,    Capacity of the hard disk

Ans:E ,E


Magnetic tape can serve as
Options: Input media,    Output media,    Secondary storage media,    All of the above

Ans:D ,D


. The Stepped Reckoner was invented by

Options: A) John Napier B) William Oughtred C) Gottfried Leibnitz D) Blaise Pascal

Ans:C,C


A wrist grounding strap contains which of the following:
Options: Surge protector,    Capacitor,    Voltmeter,    Resistor

Ans:D ,D

www.000webhost.com