Communication ports are found on the back of microcomputers. They are used to connect the computer to _____


Options: printers,    modems,    other hardware,    All of the above

Ans:D,D


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 9731 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


What protocols are used to configure trunking on a switch? VLAN Trunking Protocol VLAN 802.1Q ISL
Options: 1 and 2,    3 and 4,    1 only,    2 only

Ans:B ,B


A relational database management (RDBM) package manages data in more than one file at once. How does it organize these file? As
Options: tables,    relations,    tuple,    both (a) and (b)

Ans:D ,D


Footnotes, endnotes, and indexes are all inserted as __________
Options: bookmarks B. cross-references C. hyperlinks D. word fields

Ans:– D ,


A 25-pin female connector on the back of your computer will typically be:
Options: Serial port 1,    A parallel port,    Docking,    COM2 port

Ans:B ,B


To copy cell contents using drag and drop press the
Options: a. End key b. Shift key c. Ctrl key d. Esc key

Ans:#8211; a,#8211; a


Which of the following is not an advantage of the data-base approach?
Options: elimination of the data redundancy,    ability to associate related data,    increased security,    program/data independence

Ans:E ,E


The magnetic storage chips used to provide nonvolatile direct access storage of data and that have no moving parts are known as
Options: Magnetic core memory,    Magnetic tape memory,    Magnetic disk memory,    Magnetic bubble memory

Ans:D ,D


The digital computer was developed primarily in
Options: A) USSR B) Japan C) USA D) UK

Ans:-C,-C


. Which one is not a system tool?
Options: a. Backup b. Disk defragment c. Virus scanning d. All of the above

Ans: c, c


What is the shortcut key to “Undo ” the last action in a document?
Options: Ctrl + X B. Ctrl + Y      C. Ctrl + Z D. None of above

Ans:– C ,


Which of the following is not the approach to Handling Deadlocks
Options: Deadlock Prevention B. Deadlock Avoidance C. Detect & Recover D. Virtual Memory

Ans:– D ,


When operating above its resonant frequency, a parallel RLC circuit has the characteristics of a:
Options: parallel RL circuit,    parallel RC circuit,    parallel RLC circuit operated above its resonant frequency,    purely resistive circuit

Ans:B ,B


The__ button on the tool box display data from a related table
Options: a. Sub form sub report b. Relationships c. Select objects d. More controls

Ans:ndash; a,ndash; a


The receive equalizer reduces delay distortions using a
Options: tapped delay lines,    gearshift,    descrambler,    difference engine

Ans:A ,A


Which of the following protocols uses both TCP and UDP?
Options: FTP,    SMTP,    Telnet,    DNS

Ans:D ,D


. UNIX operating system is a(n)
Options: a. Time sharing operating system b. Multi-user operating system c. Multi-tasking operating system d. All of the above

Ans:2 – d ,2 – d


In the following program where is the variable a getting defined and where it is getting declared? #include<stdio.h> int main() { extern int a; printf("%d\n", a); return 0; } int a=20;
Options: extern int a is declaration, int a = 20 is the definition,    int a = 20 is declaration, extern int a is the definition,    int a = 20 is definition, a is not defined,    a is declared, a is not defined

Ans:A ,A


. IBM 1401 computer was
Options: A) Mainframe Computer B) Mini Computers C) Micro Computers D) None of above

Ans:A,A


The principles of structured programming forbid the use of
Options: WHILE-DO,    GOTO,    IF-THEN-ELSE,    DO-WHILE

Ans:B ,B


17. What is the smallest width of a column?
Options: a. 0″ b. 0.5″ c. 1″ d. 1.5″

Ans:– B ,– B


. To store your picture in a database requires a(n) __________ field.
Options: a. BLOB b. text c. image d. logical

Ans:3 – a ,3 – a


You can embed a MS-Organization Chart in a slide by
Options: a. Clicking the object command on the edit menu b. Clicking the object command on the edit menu c. Clicking the insert new slide button the standard toolbar, then double click the organization chart button on the formatting toolbar d. Clicking the MS-Organization Chart button on the standard toolbar

Ans: – B , – B


One data dictionery software package is called
Options: a. DB/DC dictionary b. TOTAL c. ACCESS d. Datapac

Ans:A ,DB/DC dictionary


. What are symbols used to identify items in a list?
Options: a. Icons b. Markers c. Bullets d. Graphics

Ans:9 – C ,9 – C


Software that's loaded into a computer primary storage area is known as
Options: Memory-resident package,    File management system,    Electronic spread sheet program,    Utilities

Ans:A ,A


Which command is used to send the contents of file named REPORT/TXT to the standard printing device?
Options: TYPE REPORT.TXT TO PRINTER,    TYPE REPORT.TXT > PRN,    TYPE REPORT.TXT | PRN,    TYPE REPORT.TXT | PRINTER

Ans:B ,B


A subtype discriminator is which of the following?
Options: An attribute of the supertype whose values determine the subtype,    An attribute of the subtype whose values determine the supertype,    An attribute of the supertype whose values determine the supertype,    An attribute of the subtype whose values determine the subtype

Ans:A ,A


Which of the following commands is used to identify the type of file by context?
Options: ls,    cat,    file,    more

Ans:C ,C


Eliminating modification anomalies is a(n) ________ of normalization.
Options: advantage,    disadvantage,    either an advantage or disadvantage,    neither an advantage nor disadvantage

Ans:A ,A


What command is used to list the jobs currently in print queues?
Options: lpq,    lpr,    lprm,    lpc

Ans:A ,A


Systems software is a program that directs the overall operation of the computer, facilitates its use and interacts with the users. What are the different types of this software?
Options: Operating system,    Languages,    Utilities,    All of the above

Ans:D ,D


The unit of hardware an operator uses to monitor computer processing is the:
Options: Card reader,    CPU,    Line printer,    Console

Ans:D ,D


. The word Abacus is derived from Abax, a word from
Options: A) Latin language B) Greek Language C) Sanskrit language D) Ancient Egypt

Ans:A,A


Suppose the voltage from a power outlet is 120 Vrms. What is the peak voltage?
Options: 100 V,    120 V,    170 V,    180 V

Ans:C ,C


. You created a query with two tables that did NOT have a join line. The first table has 12 records and the second has 5. The resulting recordset would have how many records?
Options: a. 7 b. 17 c. 60 d. Not enough information to tell

Ans:5 – c ,5 – c


For a type 0 system, the steady-state:
Options: error for a step input is always zero,    error for a velocity input is always zero,    input for acceleration input is always non-zero,    (a) and (c)

Ans:C ,C


Mistakes made in the system analysis stage show up in :
Options: implementation,    system design,    system developments,    All of the above

Ans:A ,A


Every video card must have?
Options: CMOS,    RAM,    CPU,    All of the above

Ans:B ,B


The terminal device that functions as a cash register, computer terminal, and OCR reader is the:
Options: A) Data collection terminal B) OCR register terminal C) Video Display terminal D) POS terminal

Ans:-D,-D


. Dedicated Computer is A
Options: Computer having multiple Monitors B. Computer assigned one task at a time C. Computer having multiple Operating Systems D. Computer is designed to use by single person

Ans:– B ,


. You created a query with two tables that have relationship of One-To-Many with referential rules applied. The first table has 3 records and the second has 8. With using a right outer join, how many records will the resulting recordset have?
Options: a. 5 b. 8 c. 24 d. Not enough information to tell

Ans:9 – c ,9 – c


The language used in application programs to request data from the DBMS is referred to as the
Options: DML,    DDL,    query language,    All of the above

Ans:A ,A


A computer program that instructs other programs to perform a particular type of operation is
Options: System software,    Application program,    Compiler,    Interpreter

Ans:A ,A


Who is credited with the idea of using punch cards to control patterns in a weaving machine?
Options: Pascal,    Hollerith,    Babbage,    jacquard

Ans:D ,D


An organization containing manufacturing, marketing, and finance areas is called a
Options: matrix organization,    flow network organization,    modular organization,    functional organization

Ans:D ,D


. To install the new font
Options: a. Start -> setting -> control panel -> font b. Start -> setting -> control panel -> font -> install new font c. Start -> control panel -> font -> install new font d. Start -> setting -> font

Ans: b, b


Which of the following commands is used to summarize the disk usage?
Options: chkdsk,    fdisk,    du,    disk

Ans:C ,C


A subdivision of main storage created by operational software is referred to as a:
Options: compartment,    time-shared program,    divided core,    partition

Ans:D ,D


Slide Transaction can be apply to
Options: Current Slide B. Selected Slides C. All Slides D. All of the above

Ans:– D ,


Where have the program and data to be located before the ALU and control unit of a computer can operate on it?
Options: Internal memory,    Secondary memory,    Microprocessor,    Magnetic tapes

Ans:A,A

www.000webhost.com