Computer Operators


Options: Write computer programs for specific problems,    Operate the devices which input and output data from the computer,    Normally require a college degree in computer science,    All of the above

Ans:B,B


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 10573 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


97. What is the shortcut key for “Find and Replace” dialog box?
Options: a. Ctrl + F b. Ctrl + R c. Ctrl + H d. Ctrl + Shift + F

Ans:–  C ,–  C


The coming together of three technologies i.e. microelectronics, computing and communications has ushered in
Options: information explosion,    information technology,    business revolution,    educational upgradation

Ans:B ,B


To enable RIPng, which of the following would you use?
Options: Router1(config-if)# ipv6 ospf 10 area 0.0.0.0,    Router1(config-if)# ipv6 router rip 1,    Router1(config)# ipv6 router eigrp 10,    Router1(config-rtr)# no shutdown

Ans:B ,B


Who invented Java?
Options: Netscape,    Microsoft,    Sun,    None of the above is correct.

Ans:C ,C


.   The quickest way to create a PowerPoint presentation is to use the
Options: a. Word for windows templates b. Auto creation wizard c. Auto content wizard d. Presentation wizard

Ans:7 – C ,7 – C


What problem is solved by Dijkstra's banker's algorithm?
Options: mutual exclusion,    deadlock recovery,    deadlock avoidance,    cache coherence

Ans:C ,C


. Which of the following printing devices an output composed of a series of data?
Options: A) Wire matrix printer B) Band printer C) Wang image printer D) Both a and c

Ans:D,D


Which command is used to delete the directory that is empty?
Options: a. Del *.* b. RD c. Erase d. MD

Ans:Answer: b. RD,Answer: b. RD


Which of the following is true of a network structure?
Options: a. It is a physical representation of the data b. It allows a many-to-many relationship c. It is conceptually simple d. It will be dominant data base of the future

Ans:. b ,. b


When mapping a regular entity into a relation which of the following is true?
Options: One relation is created.,    Two relations are created.,    Three relations are created.,    Four relations are created.

Ans:A ,A


. Which computers are used as servers for any medium sized organizations?
Options: A) Mainframe Computer B) Mini Computers C) Micro Computers D) Super Computers

Ans:B,B


Where as a computer mouse moves over the table surface, the trackball is
Options: A) Stationary B) Difficult to move C) Dragged D) Moved in small steps

Ans:-A,-A


In AI programming, a list may contain:
Options: cells,    fields,    pointers,    All of the above

Ans:D ,D


The marketing mix does not include
Options: place,    product,    persuasion,    promotion

Ans:C ,C


  What does “apply design template” do?
Options: Changes the content of the slide B. Adds functionality to the slide C. Changes the look of the slide without changing the content D. None of the above

Ans:– C ,


What will the SWAP macro in the following program be expanded to on preprocessing? will the code compile? #include<stdio.h> #define SWAP(a, b, c)(c t; t=a, a=b, b=t) int main() { int x=10, y=20; SWAP(x, y, int); printf("%d %d\n", x, y); return 0; }
Options: It compiles,    Compiles with an warning,    Not compile,    Compiles and print nothing

Ans:C ,C


The first set of the three permissions (rw) pertains to the owner of the file, indicating that the owner has
Options: executable permission only,    write and executable permissions,    both read and executable permissions.,    both read and write permissions

Ans:D ,D


The CCITT Recommendation X.25 specifies three layers of communications:
Options: application, presentation and session,    Session, transport and network,    physical datalink and network,    datalink, network and transport

Ans:C ,C


. When you insert an Excel file into a Word document, the data are
Options: a. Hyperlinked b. Placed in a word table c. Linked d. Embedded

Ans:– b,– b


With MS-DOS which command will divide the surface of the blank floppy disk into sectors and assign a unique address to each one?
Options: FORMAT command,    FAT command,    VER command,    CHKDSK command

Ans:A ,A


The device that can both feed data into and accept data from a computer is
Options: ALU,    CPU,    Input-Output device,    All of the above

Ans:C,(Canswer


What command is used to assign executable permission to the owner of the file named "letter"?
Options: chmod ugo + x letter,    chmod u + x letter,    chmod u + w letter,    chmod g + x letter

Ans:B ,B


Which command is required for connectivity in a Frame Relay network if Inverse ARP is not operational?
Options: frame-relay arp,    frame-relay map,    frame-relay interface-dci,    frame-relay lmi-type

Ans:B ,B


In a document what is the maximum number of columns that can be inserted in MS Word Table?
Options:  A) 35, B) 15, C) 63, D) 65, 

Ans:-C,-C


Each answer below shows example data from a table. Which answer is an example of the multivalue, multicolumn problem?
Options: Three columns have the values 534-2435, 534-7867, and 546-2356 in the same row.,    Three rows have the values Brown Small Chair, Small Chair Brown, and Small Brown Chair in the same column.,    Three rows have the values Brown, NULL, and Blue in the same column.,    One row has the value "He is interested in a Silver Porsche from the years 1978-1988" in a column.

Ans:A ,A


The technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself:
Options: time sharing,    time out,    time domain,    FIFO

Ans:A ,A


A physical connection between the microprocessor memory and other parts of the microcomputer is known as
Options: Path,    Address bus,    Route,    All of the above

Ans:B ,B


. Which of the following class of computers can not support multiple users simultaneously?

Options: A) Mainframe Computer B) Mini Computers C) Micro Computers D) All of them can support

Ans:C,C


What frequency range is used for FM radio transmission?
Options: Very Low Frequency : 3 kHz to 30. kHz,    Low Frequency : 30 kHz to 300 kHz,    High Frequency : 3 MHz to 30 MHz,    Very High Frequency : 30 MHz to 300 MHz

Ans:D ,D


For what purposes are views used?
Options: To hide columns only,    To hide rows only,    To hide complicated SQL statements only,    All of the above are uses for SQL views.

Ans:D ,D


With an IP address of 201.142.23.12, what is your default subnet mask?
Options: 0.0.0.0,    255.0.0.0,    255.255.0.0,    255.255.255.0

Ans:D ,D


A compiler means
Options: A person who compiles source programs,    The same thing as a programmer,    Keypunch operator,    A program which translates source program into object program

Ans:D ,D


In what file can you specify which users are not allowed to access a system via FTP?
Options: /etc/ftpusers,    /etc/hosts.deny,    /etc/ftpaccess,    All of the above

Ans:A ,A


The primary memory of a personal computer consists of:
Options: ROM only,    RAM only,    Both ROM and RAM,    Memory module

Ans:C ,C


What is the full form of AT in the IBM PC-AT?
Options: A. Applied Technology B. Advance Technology C. Additional Technology D. None of the Above

Ans:B,


Which of the structure is incorrcet? 1 : struct aa { int a; float b; }; 2 : struct aa { int a; float b; struct aa var; }; 3 : struct aa { int a; float b; struct aa *var; };
Options: 1,    2,    3,    1, 2, 3

Ans:B ,B


. HTML stands for ____.
Options: a. High Text Mail List b. Hyperlink Markup Language c. HyperText Markup Language d. Hyperlink Transfer Markup Language

Ans:4 – c ,4 – c


. The acronym of WORM in a Computer System is
Options: Write Only Read Only B. Write Once Read Many C. Write Only Read Memory D. Write Once Read Memory

Ans:– B ,


. A function inside another function is called _______
Options: a. Nested function b. Round function c. Sum function d. Text function

Ans:– a,– a


.   Which type of font is best suitable for large amount of text?
Options: a. serif fonts b. sans serif fonts c. text fonts d. picture fonts

Ans:4 – A ,4 – A


. Validation Rule in a field will
Options: a. Checks the value entered when user leaves the field b. Displays the value in specified format when user leaves the field c. Defines the appearance for the text d. There is no option of Validation Rule

Ans:– a,– a


. Hyperlinks cannot be
Options: a. Special shapes like stars and banners b. Drawing objects like rectangles ovals c. Pictures d. All can be hyperlinks

Ans:– d,– d


What is the usable size of Network bits in Class B of IP address?
Options: 04 B. 08 C. 14 D. 16

Ans:– C ,


Which command allows you to view your file 24 lines at a time?
Options: more,    pg,    cat,    lp

Ans:B ,B


The following are components of a database except ________ .
Options: user data,    metadata,    reports,    indexes

Ans:C ,C


A regular subquery can be processed:
Options: from the top down.,    from the bottom up.,    by nesting.,    None of the above is correct.

Ans:B ,B


In an absolute loading scheme, which loader function is accomplished by loader?
Options: Reallocation,    Allocation,    Linking,    Loading

Ans:D ,D


The time required for the fetching and execution of one simple machine instruction is
Options: Delay time,    CPU cycle,    Real time,    Seek time

Ans:B,(Banswer


Which of the following registers hold the information before it goes to the decoder
Options: control register,    data register,    accumulator,    address register

Ans:B ,B


What is route poisoning?
Options: It sends back the protocol received from a router as a poison pill, which stops the regular updates.,    It is information received from a router that can't be sent back to the originating router.,    It prevents regular update messages from reinstating a route that has just come up.,    It describes when a router sets the metric for a downed link to infinity.

Ans:D ,D

www.000webhost.com