An AND gate


Options: implements logic addition,    is equivalent to a series switching circuit,    is an any or all gate,    is equivalent to a parallel switching circuit

Ans:B,B






More Computer Fundamental Related questions:


RS-232 is a standard that applies to?
Options: Parallel port,    Serial port,    Game port,    All of the above

Ans:B ,B


. If you need a calculation in an unbound control, you can create a custom _____.
Options: a. string b. expression c. relationship d. syntax

Ans:4 – b ,4 – b


. Which of the following database objects can have more than one Group Header/Footer section?
Options: a. Forms b. Queries c. Reports d. Tables

Ans:7 – c ,7 – c


A Turnaround document
Options: is circulated among all the staff of an organization.,    is circulated among all the heads of departments of an organization.,    is output at one point which later comes back as an input,    All of the above

Ans:C ,C


Physical connection between Microprocessor Memory and other parts is called _________
Options: A. Path B. Hub C. Address bus D. None of the above

Ans:C,


. Who invented Slide Rules?
Options: A) John Napier B) William Oughtred C) Gottfried Leibnitz D) Blaise Pascal

Ans:4-B,4-B


Where does a computer add and compare data?
Options: a. Hard disk b. Floppy disk c. CPU chip d. Memory chip

Ans:1.c,1.c


In order to increase the amount of memory available for a system, what is the maximum size of a swap partition (with kernel version 2.2.x)?
Options: 2GB,    128MB,    64MB,    32MB

Ans:A ,A


What is the name of the computer which was first used for programming and playing of music?
Options: ELLIAC,    ENIAC,    UNIVAC,    All of the above

Ans:A,A


What SQL command can be used to delete columns from a table?
Options: MODIFY TABLE TableName DROP COLUMN ColumnName,    MODIFY TABLE TableName DROP ColumnName,    ALTER TABLE TableName DROP COLUMN ColumnName,    ALTER TABLE TableName DROP ColumnName

Ans:C ,C


The complexity of linear search algorithm is
Options: a. O(n) b. O(log n) c. O(n2) d. O(n log n)  

Ans:a,a


. Which was the world’s first microcomputer that used Intel 80386 microprocessor chip?
Options: A) IBM PS/2 B) HP-9830 C) DeskPro-386 D) IBM-360

Ans:5-C,5-C


The operating system keeps the information of files in a table called
Options: File Folder Table (FFT) B. File Index Table (FIT) C. File Allocation Table (FAT) D. Directory Index Table (DIT)

Ans: – C ,


A factor which would strongly influence a businessperson to adopt a computer is its:
Options: Accuracy,    Reliability,    Speed,    All of the above

Ans:D ,D


Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Options: Layer 7 protocols,    Layer 6 protocols,    Layer 5 protocols,    Layer 4 protocols

Ans:A ,A


. ___ is a compromise mode between Shut Down and Sleep mode because it does not consume power and remembers the current state of your desktop
Options: a. Shut Down b. Restart c. Sleep d. Hibernate

Ans:3 – d ,3 – d


What file contains commands that configure systems devices?
Options: Command.com,    Config.sys,    Autoexec.bat,    Win.ini

Ans:B ,B


2. Which command is used to see the sub-directory structure of drive?
Options: a. Tree b. List c. Subdir d. Subtree

Ans:Correct Answer: a ,Correct Answer: a


Which bitwise operator is suitable for turning on a particular bit in a number?
Options: && operator,    & operator,    || operator,    | operator

Ans:D ,D


A number that is used to control the form of another number is known as
Options: Map,    Mask,    Mamtossa,    Marker

Ans:B,(Banswer


Using Find command in Word, we can search?
Options: characters B. formats C. symbols D. All of the above

Ans:– D ,


A distributed network configuration in which all data/information pass through a central computer is
Options: bus network,    star network,    ring network,    Point-to-point network

Ans:B ,B


Client-side extensions:
Options: add functionality to the server.,    add functionality to the browser.,    add functionality to the firewall.,    add functionality to the network.

Ans:B ,B


14. Which command in DOS can be used to recover accidentally deleted files?
Options: a. UNDELETE b. DELETE/CANCEL c. RESTORE d. RECOVER

Ans:Correct Answer: a ,Correct Answer: a


What project is currently developing X server support?
Options: XFree86 Project, Inc.,    RHAD Labs,    GNOME Project,    All of the above

Ans:A ,A


Which of the following, is a component of an expert system?
Options: inference engine,    knowledge base,    user interface,    All of the above

Ans:D ,D


The data recording area between the blank gaps on magnetic tape is called a/ an:
Options: Record,    Block,    Field,    Database

Ans:B,B


This is the stage in database design where one gathers and lists all the necessary fields for the database project.
Options: a. data definition b. data refinement c. establishing relationship d. none of the above

Ans:ndash; a,ndash; a


. To instruct Word to stop bulleting paragraphs, do any of the following except _____.
Options: a. press the enter key twice b. click the Undo button on the Standard toolbar c. press the backspace key to remove the bullet d. click the Bullets button on the Formatting toolbar

Ans:– B,– B


. When did John Napier develop logarithm?
Options: A) 1416 B) 1614 C) 1641 D) 1804

Ans:B,B


    Which command divides the surface of the blank disk into sectors and assign a unique address to each one
Options: a.    Ver b.    Format c.    Fat d.    Chkdsk

Ans:.b,Correct Answer: b. Format


A basic capacitor is composed of:
Options: two conductors separated by a dielectric,    two dielectrics separated by a conductor,    two coils separated by a dielectric,    two coils separated by a conductor

Ans:A ,A


The Internet Control Message Protocol (ICMP)
Options: allows gateways to send error a control messages to other gateways or hosts,    provides communication between the Internet Protocol Software on one machine and the Internet Protocol Software on another,    reports error conditions to the original source, the source must relate errors to individual application programs and take action to correct the problem,    All of the above

Ans:D ,D


A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results. Can you tell in which component is the raw data fed?
Options: Mass Memory,    Main memory,    Logic unit,    Arithmetic unit

Ans:B,B


One of the three most common types of payment systems is the
Options: pinion fund transaction system,    travel expense reimbursement system,    accounts payable system,    All of the above

Ans:D ,D


Which of the following is the allocation method of a disk space?
Options: Contiguous allocation B. Linked allocation C. Indexed allocation D. All of the Above

Ans:– D ,


Seeks analysis
Options: is used for analyzing paging problems,    is used for analyzing device busy problems,    is used for analyzing control-unit busy problems,    is only shown on real-time displays

Ans:B ,B


. Which one of the following input device is user-programmable?
Options: A) Dumb terminal B) Smart terminal C) VDT D) Intelligent terminal

Ans:D,D


Which of the following occurs when a transaction rereads data it has previously read and finds modification or deletions caused by a committed transaction?
Options: Nonrepeatable read,    Phantom read,    Dirty read,    Consistent read

Ans:A ,A


Which method is frequently used, especially in the early stages of design?
Options: The iterative design method,    The direct method,    The design selection method,    All of the above

Ans:A ,A


One of the major benefits of using CAD in tool design is that:
Options: product design represents approximately one-half the engineering costs,    tool motions can be checked to see if there is interference between the tool and the object,    there is better coordination in the materials-handling area,    it simplifies the trial-and-error method

Ans:B ,B


Client/server security includes which of the following?
Options: Physical security,    Change control security,    Measures taken to secure all systems,    All of the above.

Ans:D ,D


You can use drag-and-drop to embed excel worksheet data in a word document
Options: a. By dragging a range of excel data to the word button on the taskbar while pressing the Ctrl key b. By dragging a range of excel data to the word button on the taskbar while pressing Shift key c. By dragging a range of excel data to the word button on the taskbar while pressing Alt key d. None of above

Ans:#8211; a,#8211; a


What will be the output of the program? #include<stdio.h> #define PRINT(i) printf("%d,",i) int main() { int x=2, y=3, z=4; PRINT(x); PRINT(y); PRINT(z); return 0; }
Options: 2, 3, 4,,    2, 2, 2,,    3, 3, 3,,    4, 4, 4,

Ans:A ,A


. It is possible to _______ a data source before performing a merge.
Options: a. create b. modify c. sort d. all of the above

Ans:– D,– D


The transistor has a collector current of 10 mA and a base current of 40 mA. What is the current gain of the transistor?
Options: 250 μA,    350 μA,    0.25 μA,    300 μA

Ans:A ,A


A 4 KHz noise less channel with one sample ever 125 per sec is used to transmit digital signals. Differential PCM with 4 bit relative signal value is used. Then how many bits per second are actually sent?
Options: 32 Kbps,    64 Kbps,    8 Kbps,    128 Kbps.

Ans:A ,A


In which tcp_wrappers file can you specify to allow all connections from all hosts?
Options: /etc/hosts.allow,    /etc/hosts.deny,    /etc/hosts,    /etc/tcp.conf

Ans:A ,A


The most important advantage of a video disk is
Options: Compactness,    Potential capacity,    Durability,    Cost effectiveness

Ans:B ,B


Which technique is being investigated as an approach to automatic programming?
Options: generative CAI,    specification by example,    All of the above,    non-hierarchical planning

Ans:B ,B

www.000webhost.com