. Descending Order of a data Hierarchy is

Options: Database – File – Record – Fields – Bytes – Bit B. Database – File – Record – Fields – Bit – Bytes C. Database – Record – File – Fields – Bytes – Bit D. Database – Record – Fields – File – Bytes – Bit

Ans:– A ,

More Computer Fundamental Related questions:

. In Computer System Memory management operations are performed by
Options: User B. Hardware       C. Programmer D. Operating system

Ans:– D ,

The vice-president of information has primary responsibility for
Options: recognizing information needs,    preparing an MIS study proposal,    setting MIS objectives,    establishing MIS constraints

Ans:B ,B

0. What is a file extension of Templates in Microsoft Word?
Options: .Dtep B. .Dott C. .Dotx D. .Doct

Ans: – C ,

Which of the following is not a type of relationship that can be applied in Access database
Options: a. One to One b. One to Many c. Many to Many d. All of above can be applied

Ans:ndash; d,ndash; d

Embedded SQL is which of the following?
Options: Hard-coded SQL statements in a program language such as Java.,    The process of making an application capable of generating specific SQL code on the fly.,    Hard-coded SQL statements in a procedure.,    Hard-coded SQL statements in a trigger.

Ans:A ,A

. In Access 2007, to set a table to open as a document tab, you need to go to the ____.
Options: a. Microsoft Office button b. Navigation Pane c. Quick Access toolbar d. Database Tools command tab

Ans:5 – a ,5 – a

Which of the following holds data and processing instructions temporarily until the CPU needs it?
Options: ROM,    control unit,    main memory,    coprocessor chips

Ans:C ,C

. What type of relationship is created when you select a primary key in both related tables?
Options: a. One-To-One b. Indeterminate c. One-To-Many d. Many-To-Many

Ans:7 – a ,7 – a

Which of the following is correct in VLSM?
Options: Can have subnets of different sizes B. Subnets must be in same size             C. No required of subnet D. All of above

Ans:– A ,

Which SQL-92 standard SQL command can be used to change a table name?
Options: RENAME TABLE,    CHANGE TABLE,    ALTER TABLE,    None of the above is correct.

Ans:D ,D

Punched cards were first introduced by
Options: Powers B. Pascal C. Jacquard D. Herman Hollerith

Ans:– D ,

78. What should you do if you require to paste the same format in many places?
Options: a. Click the Format painter and go on pasting in many places holding Alt Key b. Double click the format painter then go on pasting in many places c. Click the format painter then go on pasting to many places holding Ctrl Key d. All of above

Ans:– B ,– B

. How to specify cell range from A9 to A99 in Excel?
Options: (A9, A99) B. (A9 to A99) C. (A9 : A99) D. (A9 – A99)

Ans:– C ,

The most commonly used standard data code to represent alphabetical, numerical and punctuation characters used in Electronic Data Processing system is called
Options: ASCII,    EBCDII,    BCD,    All of the above

Ans:A ,A

. Binary circuit elements have
Options: A) One stable state B) Two stable state C) Three stable state D) None of above


Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?
Options: A,    B,    G,    N

Ans:C ,C

The default and maximum size of text field in Access
Options: a. 50 and 255 Characters b. 8 and 1 GB c. 266 characters & 64000 characters d. None of above

Ans:ndash; a,ndash; a

The computer translates the condition of each switch to a number. What number is represented by the ON state?
Options: +7,    +3.75,    1,    0

Ans:C ,C

Which of the following toolbars provide different options in various master views?
Options: a. Common tasks toolbar b. Drawing toolbar c. Formatting toolbar d. Standard toolbar

Ans: – A , – A

Trend analysis:
Options: is used only in financial planning,    can improve control system response,    requires a very expensive system to implement,    is a brand new concept

Ans:B ,B

The symbols used in an assembly language are
Options: Codes,    Mnemonics,    Assembler,    All of the above


What device prevents power interruptions, resulting in corrupted data?
Options: Battery back-up unit,    Surge protector,    Multiple SIMMs strips,    Data guard system

Ans:A ,A

The section of the CPU that selects, interprets and sees to the execution of program instructions
Options: Memory,    Register unit,    Control unit,    ALU

Ans:C ,C

A typical worksheet has …. Number of columns
Options: a. 128 b. 256 c. 512 d. 1024

Ans:#8211; b,#8211; b

. We can restore the deleted files and folders from
Options: a. Recycle bin b. My document c. Control panel d. All of the above

Ans:2 – a ,2 – a

. How many margins sare there on a page?
Options: a. Two (header and footer) b. Four (top, bottom, right and left) c. Two (landscape and portrait) d. Four (center, top, left and bottom)

Ans: – B , – B

Which of the following formulas will Excel Not be able to calculate?
Options: a. =SUM(Sales)-A3 b. =SUM(A1:A5)*.5 c. =SUM(A1:A5)/(10-10) d. =SUM(A1:A5)-10

Ans:#8211; a,#8211; a

Any method for controlling access to or use of memory is known as
Options: Memory map,    Memory protection,    Memory management,    Memory instruction

Ans:B ,B

The keyword used to transfer control from a function back to the calling function is
Options: switch,    goto,    go back,    return

Ans:D ,D

in which year was UK’s premier computing event called ?The which computer? started?
Options: A) 1980 B) 1985 C) 1986 D) 1987


Which of the following is true of a network structure?
Options: It is a physical representation of the data,    It allows a many-to-many relationship,    It is conceptually simple,    It will be the dominant data base of the future

Ans:B ,B

Which of the following layer of OSI model also called end-to-end layer?
Options: Presentation layer B. Network layer C. Session layer D. Transport layer

Ans: – D ,

The Al researcher who co-authored both the Handbook of Artificial Intelligence and The Fifth Generation is:
Options: Bruce Lee,    Randy Davis,    Ed Feigenbaum,    Mark Fox

Ans:C ,C

Daisy chain is a device for
Options: connecting a number of controllers to a device,    connecting a number of devices to a controller,    interconnecting a number of devices to a number of controllers,    all of the above

Ans:B ,B

Addressing modes
Options: defines the fundamental method of determining effective operand addresses,    are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing.,    performs indicated operations on two fast registers of the machine and leave the result in one of the registers.,    all of the above

Ans:B ,B

The complexity of merge sort algorithm is
Options: a. O(n) b. O(log n) c. O(n2) d. O(n log n)  


What is the uses of subnetting?
Options: It divides one large network into several smaller ones B. It divides network into network classes C. It speeds up the speed of network D. None of above

Ans:– A ,

. Which of the following resources must be protected by the operating system?
Options: a. I/O b. Memory c. CPU d. All of the above

Ans:9 – d ,9 – d

When a group of computers is connected together in a small area without the help of telephone lines, it is called
Options: Remote communication network (RCN),    Local area network(LAN),    Wide area network (WAN),    Value added network (VAN)

Ans:B ,B

Which standard govern parallel communications?
Options: RS232,    RS-232a,    CAT 5,    IEEE 1284

Ans:D ,D

How many characters can be typed in a single cell in Excel?
Options: a. 256 b. 1024 c. 32000 d. 65535


Which of the following terms is the most closely related to main memory?
Options: nonvolatile,    permanent,    control unit,    temporary

Ans:D ,D

A network schema
Options: restricts the structure to a one-to-many relationship,    permits many-to-many relation¬ships,    stores data in tables,    All of the above

Ans:B ,B

. Which components appear in the initial Windows start up display?
Options: a. Dialog boxes b. Start menu c. Taskbar d. All of above

Ans: c, c

Which of the following is separated by a subnet mask?
Options: DHCP scopes,    Network ID and host ID,    Domains,    Subnets

Ans:B ,B

Which of following provides reliable communication?
Options: TCP B. IP C. UDP D. All of the above

Ans:– A ,

. On a PC, how much memory is available to application software?
Options: A) 1024 KB B) 760 KB C) 640 KB D) 560 KB


To select one hyperlink after another during a slide presentation, what do you press?
Options: a. Tab b. Ctrl + K c. Ctrl + h d. All of above

Ans: – A , – A

Which of the following is an essential file of a MS-DOS boot disk?


. The Search tool is best used when searching for ______ data.
Options: a. simple b. multiple c. unique d. formatted

Ans:6 – a ,6 – a