age break is not a Section break


Options: True B. False

Ans:– A ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 6539 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More MS-Word Related questions:


What was the name of the Japanese worker who was killed by an industrial robot at the Akashi plant of Kawasaki Heavy Industries in Japan?
Options: M. Shubhagya,    Harun Shimada,    Kenji Urada,    K. Miceni

Ans:C ,C


Which of the following machines are characterised by electronic tube circuitry, delay line, rotating or electrostatic memory.
Options: First generation,    Fifth generation,    Third generation,    Second generation

Ans:A ,First generation Machines


What is the difference between mnemonic codes and machine codes?
Options: There is no difference.,    Machine codes are in binary, mnemonic codes are in shorthand English.,    Machine codes are in shorthand English, mnemonic codes are in binary.,    Machine codes are in shorthand English, mnemonic codes are a high-level language.

Ans:B ,B


Which of the following statement obtains the remainder on dividing 5.5 by 1.3 ?
Options: rem = (5.5 % 1.3),    rem = modf(5.5, 1.3),    rem = fmod(5.5, 1.3),    Error: we can't divide

Ans:C ,C


The communication mode that supports data in both directions at the same time is
Options: simplex,    half-duplex,    full-duplex,    multiplex

Ans:C ,C


. The category of operating system that you most likely have running on your PDA computer is a_________Operating system
Options: a. Real time b. Single user, single task c. Single user, multitask d. Multiuser, multitask

Ans:5 – b ,5 – b


Environment in systems parlance refers to
Options: a sub-system,    the boundary,    a part outside the boundaries,    All of the above

Ans:C ,C


Client/server security includes which of the following?
Options: Physical security,    Change control security,    Measures taken to secure all systems,    All of the above.

Ans:D ,D


To duplicate a controls formatting you can use___
Options: a. Manager b. Wizard c. Painter d. Control

Ans:ndash; c,ndash; c


Which DOS command would allow you to redirect a printer?
Options: Type,    Capture,    Mode,    Print

Ans:C ,C


Which is a machine-oriented high-level language for the GEC 4080 series machines.
Options: LOGO,    SNOBOL,    Babbage,    ALGOL

Ans:C,(Canswer


Addressing modes
Options: defines the fundamental method of determining effective operand addresses,    are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.,    performs indicated operations on two fast registers of the machine and leave the result in one of the registers.,    all of the above

Ans:B ,B


If you do not know which version of MS-DOS you are working with, which command will you use after having booted your operating system?
Options: FORMAT command,    DIR command,    VER command,    DISK command

Ans:C ,C


Which of the following is true regarding VTP?
Options: All switches are VTP servers by default.,    All switches are VTP transparent by default.,    VTP is on by default with a domain name of Cisco on all Cisco switches.,    All switches are VTP clients by default.

Ans:A ,A


The transistorized computer circuits were introduced in the
Options: First generation,    Second generation,    Third generation,    Fourth generation

Ans:B ,B


An intrusion detection system does not perform which of the following?
Options: Tries to identify attempts to hack into a computer system.,    May monitor packets passing over the network.,    May transmit message packets to the correct destination.,    Set up deception systems that attempt to trap hackers.

Ans:C ,C


What will be the output of the program? #include<stdio.h> int main() { float *p; printf("%d\n", sizeof(p)); return 0; }
Options: 2 in 16bit compiler, 4 in 32bit compiler,    4 in 16bit compiler, 2 in 32bit compiler,    4 in 16bit compiler, 4 in 32bit compiler,    2 in 16bit compiler, 2 in 32bit compiler

Ans:A ,A


. Which of the following is not an operating system?
Options: a. DOS b. Linux c. Windows d. Oracle

Ans: d, d


. Which access method is used to access cassette tape?
Options: A) Direct B) Sequential C) Both of the above D) None of the above

Ans:9-B,9-B


A random-access data storage device which gives rapid access to data is
Options: Magnetic tape,    Punched card,    Disk storage unit,    Buffer

Ans:C ,C


A vertically aligned set of tracks on a disk pack is known as
Options: Cluster,    Surface,    Cylinder,    Panel

Ans:C ,C


How many bits are used in the address bus?
Options: 7,    8,    9,    16

Ans:D ,D


A network administrator wants to upgrade the IOS of a router without removing the image currently installed. What command will display the amount of memory consumed by the current IOS image and indicate whether there is enough room available to hold both the current and new images?
Options: show version,    show flash,    show memory,    show buffers

Ans:B ,B


What will the SWAP macro in the following program be expanded to on preprocessing? will the code compile? #include<stdio.h> #define SWAP(a, b, c)(c t; t=a, a=b, b=t) int main() { int x=10, y=20; SWAP(x, y, int); printf("%d %d\n", x, y); return 0; }
Options: It compiles,    Compiles with an warning,    Not compile,    Compiles and print nothing

Ans:C ,C


What will be the output of the program? #include<stdio.h> int main() { char huge *near *far *ptr1; char near *far *huge *ptr2; char far *huge *near *ptr3; printf("%d, %d, %d\n", sizeof(ptr1), sizeof(*ptr2), sizeof(**ptr3)); return 0; }
Options: 4, 4, 4,    2, 4, 4,    4, 4, 2,    2, 4, 8

Ans:A ,A


The most straightforward resource flow is
Options: manpower,    machines,    material,    money

Ans:B ,B


When a group of computers is connected together in a small area without the help of telephone lines, it is called
Options: Remote communication network (RCN),    Local area network(LAN),    Wide area network (WAN),    Value added network (VAN)

Ans:B ,B


JDBC stands for:
Options: Java Database Connectivity,    Java Database Components,    Java Database Control,    None of the above is correct.

Ans:A ,A


Data integrity control
Options: is used to set upper and lower limits on numeric data,    requires the use of passwords to prohibit unauthorized access to the file,    has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files,    All of the above

Ans:C ,C


Which programming language is based on Algol 60.
Options: PILOT,    SNOBOL,    ADA,    SIMULA

Ans:D,(Danswer


. How will MS Word will respond in repeated word.
Options: A Red wavy line under the repeated word B. A Green wavy line under the repeated word C. A Blue wavy line under the repeated word D. None of the above

Ans:– A ,


What is the maximum data rate for the 802.11b standard?
Options: 6Mbps,    11Mbps,    22Mbps,    54Mbps

Ans:B ,B


Managers who are potential users of the MIS
Options: select the optimum equipment configurations,    evaluate alternate equipment configurations,    describe information needs,    All of the above

Ans:E ,E


An Excel Workbook is a collection of …….
Options: Workbooks B. Worksheets C. Charts D. Worksheets and Charts

Ans:– D ,


Which of the following is not used for storage purposes with main frame computers?
Options: removable disks,    fixed disks,    mass storage systems,    diskettes

Ans:D ,D


Which one of the following properties of a magnetic circuit can be directly compared to resistance in an electrical circuit?
Options: Reluctance,    Permeability,    Permeance,    Retentivity

Ans:A ,A


. Concatenation of text can be done using
Options: a. Apostrophe (‘) b. Exclamation (!) c. Hash (#) d. Ampersand (&)

Ans:– d,– d


What will be the output of the program? #include<stdio.h> #include<math.h> int main() { printf("%d, %d, %d\n", sizeof(3.14f), sizeof(3.14), sizeof(3.14l)); return 0; }
Options: 4, 4, 4,    4, 8, 8,    4, 8, 10,    4, 8, 12

Ans:C ,C


The Banker’s algorithm is used
Options:  to rectify deadlock B.  to detect deadlock         C.  to prevent deadlock D.  to slove deadlock

Ans:– C ,


A Decision table
Options: represents the information flow,    documents rules, that select one or more actions, based on one or more conditions, from a set of possible conditions.,    gets an accurate picture of the system,    shows the decision paths

Ans:B ,B


. The three parts of an IIF function are separated by _____.
Options: a. dashes b. asterisks c. semicolons d. commas

Ans:8 – d ,8 – d


8. …..interface consists of things like program counter, registers, interrupts and terminals
Options: a. Hardware b. Software c. Data d. None

Ans:Correct Answer: a,Correct Answer: a


Which of the following services use TCP? DHCP SMTP HTTP TFTP FTP
Options: 1 and 2,    2, 3 and 5,    1, 2 and 4,    1, 3 and 4

Ans:B ,B


Which system was developed by Rank-Xeron for use with office computers and other equipment.
Options: UNIX,    ETHERNET,    PC-DOS,    MS-DOS

Ans:B ,B


. ctrl, shift and alt are called __________ keys.
Options: a. adjustment b. function c. modifier d. alphanumeric

Ans:8 – c ,8 – c


An MIS can be developed by
Options: a fire department,    a college testing service,    an ocean transportation company,    All of the above

Ans:D ,D


The Josephson tunneling device illustrates principles associated with the advanced storage technique:
Options: cryogenics,    CCD,    EBAM,    holographing

Ans:A ,A


The first firm to mass-market a microcomputer as a personal computer was
Options: IBM,    Sperry Univac,    Radio Shack,    Data General Corporation

Ans:C ,C


______ shares characteristics with both hardware and software
Options: Operating system B. Software C. Data D. None

Ans:– A ,


. Which is an internal command?
Options: a. Scandisk b. XCOPY c. Deltree d. None of the above

Ans:1 – d ,1 – d

www.000webhost.com