Codes consisting of light and dark marks which may be optically read is known as


Options: Mnemonics,    Bar code,    Decoder,    All of the above

Ans:B,(Banswer


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 19388 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Computer Fundamental Related questions:


The standard VGA display has _____ pixels in its native graphics mode?
Options: 648 x 320,    640 x 480,    680 x 440,    1024 x 786

Ans:B ,B


An inventory management system should answer the questions
Options: what and why,    when and how much,    who and why,    where and when

Ans:B ,B


Which of the following Indian companies designs and manufactures super- computers?
Options: C-DOT,    C-DAC,    CMC,    All of the above

Ans:B ,B


An AI system developed by Terry A. Winograd to permit an interactive dialogue about a domain he called blocks-world.
Options: SHRDLU,    SIMD,    BACON,    STUDENT

Ans:A ,A


In order to use a DBMS, it is important to understand
Options: the physical schema,    all sub-schemas that the system supports,    one subschema,    both (a) and (b)

Ans:C ,C


. The operating system is the most common type of .... Software
Options: a. Communication b. Application c. System d. Word processing software

Ans: c, c


A _____ boot is when DOS is restarted without turning off the computer.
Options: warm,    reboot,    shutdown,    system up

Ans:A ,A


Which of the following is a computer memory that can be programmed once, but not reprogrammed.
Options: ROM,    RAM,    PROM,    EPROM

Ans:C ,C


 In PowerPoint, when the mouse pointer appears as this it indicates that the Draw Table feature is on
Options:  Solid plus sign B.  Solid arrow C.  I-beam D.  Pencil

Ans:– D ,


Which of the following commands can be used to get information about yourself?
Options: who am i,    i /4,    pwd,    which

Ans:A ,A


Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Options: Network Server,    Virtual Private Network,    Network operating system,    OSI

Ans:B ,B


. What is the symbol for multiplying?
Options: a. > b. / c. ! d. *

Ans:– d,– d


Straight-line operations:
Options: must be limited to two per workpiece,    must be parallel to one of the axes of the coordinate system,    can include diagonal cuts if they aren't curved,    All of the above

Ans:B ,B


A software that allows a personal computer to pretend it as a terminal is
Options: auto-dialing,    bulletin board,    modem,    terminal emulation

Ans:A ,A


What software packages are commonly used for businesses that have to track extensive lists of clients and inventory?
Options: Special purpose packages,    Custom made programs,    Single function application packages,    Data management packages

Ans:D ,D


MS Office provides help in many ways, which of these is one of them?
Options:  A) What is this?, B) Office Assistant, C) Help menu, D) All of the above, 

Ans:-D,-D


. Which of the following queries prompts users for input data by displaying dialog boxes?
Options: a. Append b. Delete c. Parameter d. Update

Ans:2 – c ,2 – c


What will be the output of the program? #include<stdio.h> int main() { const char *s = ""; char str[] = "Hello"; s = str; while(*s) printf("%c", *s++); return 0; }
Options: Error,    H,    Hello,    Hel

Ans:C ,C


Which file is used to configure which filesystems are mounted?
Options: /etc/mount.sys,    /etc/filesys,    /etc/sysconfig,    /etc/fstab

Ans:D ,D


. You can use the horizontal and vertical scroll bars to
Options: a. Split a worksheet into two panes b. View different rows and columns c. Edit the contents of a cell d. View different worksheets

Ans:– b,– b


Which of the following is not characteristic of a relational database model?
Options: tables,    treelike structure,    complex logical relationships,    records

Ans:B ,B


Which of command is used to copy a file?
Options: copy,    cp,    cpio,    tar

Ans:B ,B


________ is a cover for utilizing OLE DB that is designed for use by almost any language.
Options: ODBC,    ASP,    JPCD,    ADO

Ans:D ,D


31. The _____ in the Resume Wizard dialog box indicates the wizard is ready to create the document.
Options: a. Start panel b. Address panel c. Add/Sort Heading panel d. Finish panel

Ans:– D ,– D


SQL stands for ________ .
Options: Structured Query Language,    Sequential Query Language,    Structured Question Language,    Sequential Question Language

Ans:A ,A


Which memory system is not as a mass memory medium?
Options: semiconductor memory,    magnetic tape,    magnetic disk,    magnetic drum

Ans:A,A


Where is a hub specified in the OSI model?
Options: Session layer,    Physical layer,    Data Link layer,    Application layer

Ans:B ,B


Exceptions to the 8085 microprocessor normal operation are called:
Options: jump instructions,    decoding,    interrupts,    jump instructions or interrupts

Ans:D ,D


Database management systems are intended to 
Options: a. eliminate data redundancy b. establish relationship among records in different files c. manage file access D. all of the above 

Ans:D,All of above


A hashing scheme is used with
Options: sequential file organization,    direct file organization,    indexed sequential file organization,    partitioned file organization

Ans:B,B


Which of the following method is used the results of a design analysis as a base for redesign decisions?
Options: The iterative design method,    The direct method,    The design selection method,    All of the above

Ans:A ,A


You can add a row using SQL in a database with which of the following?
Options: ADD,    CREATE,    INSERT,    MAKE

Ans:C ,C


With a dot matrix printer, light then dark print is most commonly caused by:
Options: Erratic paper advancement,    Erratic ribbon advancement,    Misalligned print head,    Overheating print head

Ans:B ,B


. Which of the following Windows do not have Start button
Options: a. Windows Vista b. Windows 7 c. Windows 8 d. None of above

Ans: c, c


Which of the following allow you to select more than one slide in a presentation?
Options: a. Alt + Click each slide b. Shift + drag each slide c. Shift + Click each slide d. Ctrl + Click each slide

Ans: – C , – C


. Which of the following is the most powerful computers?
Options: A) Mainframe Computer B) Mini Computers C) Micro Computers D) Super Computers

Ans:7-D,7-D


A high-pass filter:
Options: passes lower-frequency signals and reduces higher-frequency signals,    passes higher-frequency signals and reduces lower-frequency signals,    has no effect on ac signals,    increases the level of all frequencies by a significant amount

Ans:B ,B


Educational programs for the labour union officials are conducted by
Options: the firm's industrial relations department,    the vice-president of information systems,    both (a) and (b),    neither (a) nor (b)

Ans:C ,C


List Box and Text box
Options: a. are some other than that in a list box the bullets are enabled b. are different. List boxes are used to present lists and can’t be created with text boxes. c. Both of above d. None of above

Ans: – A , – A


To activate the previous cell in a pre-selected range, press
Options: a. The Alt key b. The Tab key c. The Enter key d. None of the above

Ans:D,None of the above


In Computer System Scanner is ______ Device?
Options: Input B. Output         C. Both D. None

Ans:– A ,


The computer is a part of the firm's
Options: physical system,    conceptual system,    both (a) and (b),    neither (a) nor (b)

Ans:C ,C


A turnkey package includes
Options: software,    hardware,    training,    All of the above

Ans:D ,D


Trojan-Horse programs
Options: are legitimate programs that allow unauthorized access,    do not usually work,    are hidden programs that do not show up on the system,    usually are immediately discovered

Ans:A ,A


In SQL, the command(s) is(are) used to create an index for a table or cluster
Options: CREATE INDEX,    MODIFY INDEX,    SET INDEX TO FILE,    All of the above

Ans:A ,A


. Commonly network of network is called
Options: a. MS Word b. MS Excel c. Internet d. MS Access

Ans:9 – c ,9 – c


Which one of the following devices is most often used for measuring opposition to current flow in a circuit?
Options: Ammeter,    Voltmeter,    Ohmmeter,    Wattmeter

Ans:C ,C


. Which of the following devices can be sued to directly image printed text?

Options: A) OCR B) OMR C) MICR D) All of above

Ans:A,A


What command is used to remove files?
Options: dm,    rm,    delete,    erase

Ans:B ,B


Most AC power is obtained from:
Options: generators,    batteries,    oscillators,    lightning

Ans:C ,C

www.000webhost.com