How many types of storage loops exist in magnetic bubble memory?


Options: 8,    4,    16,    2

Ans:D,D


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 10942 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


A dot-matrix printer
Options: is an input device,    is an output device,    cannot print alphabet,    has a speed of 1000 cps

Ans:B ,B


A program that is employed in the development, repair or enhancement of other programs is known as
Options: System software,    Software tool,    Applications program,    Utility program

Ans:B,(Banswer


Which of the following keys is used to overstrike a whole line?
Options: R,    v,    C,    u

Ans:A ,A


Each excel file is called a workbook because
Options: a. It can contain text and data b. It can be modified c. It can contain many sheets including worksheets and chart sheets d. You have to work hard to create it

Ans:#8211; c,#8211; c


. You can check the conditions against __________ when applying conditional formatting
Options: a. Cell value b. Formula c. Both of above d. None of above

Ans:– c,– c


What is the main difference between DDCMP and SDLG?
Options: DDCMP does not need special hardware to final the beginning of a message.,    DDCMP has a message header,    SDLC has a IP address,    SDLC does not use CRC

Ans:A ,A


When was vacuum tube invented?
Options: A) 1900 B) 1906 C) 1910 D) 1880

Ans:-B,-B


What two methods are available to build electronic continuous control?
Options: Analog and mechanical,    Pneumatic and analog,    Analog and digital,    All of the above

Ans:C ,C


In virtual memory systems, Dynamic address translation
Options: is the hardware necessary to implement paging,    stores pages at a specific location on disk,    is useless when swapping is used,    is part of the operating system paging algorithm

Ans:A ,A


You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?
Options: access-list 10 deny 172.16.48.0 255.255.240.0,    access-list 10 deny 172.16.0.0 0.0.255.255,    access-list 10 deny 172.16.64.0 0.0.31.255,    access-list 10 deny 172.16.48.0 0.0.15.255

Ans:D ,D


The most common binary code in use today is the 8 bit ASCII code. What do the letters ASCII stand for?
Options: American Standard Code for International Interchange,    American Standard Code for Information Interchange,    American Standard Code for Intelligence Interchange,    American Scientific Code for Information Interchange

Ans:B,B


Each time you turn the power switch on, which control files will the computer check?
Options: COMMAND.COM, IO.SYS,    COMMAND.COM, DATE.COM, TIME.COM,    C0MMAND.COM, IO.SYS, MSDOS.SYS,    CHKDSK.EXE

Ans:C ,C


Which of the following is true of a network structure?
Options: a. It is a physical representation of the data b. It allows a many-to-many relationship c. It is conceptually simple d. It will be dominant data base of the future

Ans:. b ,. b


. Where can you change automatic or manual calculation mode in Excel?
Options: a.  Double CAL indicator on status bar b.  Go to Tools >> Options >> Calculation and mark the corresponding radio button c.  Both of above d.  None of above

Ans:– b,– b


Tab scrolling button
Options: a. Allow you to view a different worksheet b. Allow you to view additional worksheet rows down c. Allow you to view additional worksheet columns to the right d. Allow you to view additional sheets tabs

Ans:#8211; d,#8211; d


A memory that holds micro programs is
Options: Core memory,    ROM,    RAM,    Control memory

Ans:B,(Banswer


A specific part of an arithmetic & logic unit that is used to perform the operation of multiplication is
Options: Multiplier,    Multiplener,    Multivibrator,    Quantization

Ans:A ,A


The Third Generation Computer was made with ________.
Options: Vacuum Tube B. Discrete Components C. IC D. Bio Chips

Ans:– C ,


An AI technique that allows computers to understand associations and relationships between objects and events is called:
Options: heuristic processing,    cognitive science,    relative symbolism,    pattern matching

Ans:D ,D


You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?
Options: 2,    3,    4,    5

Ans:D ,D


The language that the computer can understand and execute is called
Options: Machine language,    Application software,    System program,    All of the above

Ans:A ,A


. A(n) ____ in the Record Selector indicates a new record.
Options: a. check mark b. pencil c. asterisk d. arrow

Ans:2 – c ,2 – c


. When sharing data in Office, the ________ document is the document in which the data was first entered.
Options: a. source b. destination c. original d. primary

Ans:–  A,–  A


. Circular division of disks to store and retrieve data are known as

Options: A) tracks B) sectors C) cycles D) rings

Ans:A,A


Which of the following languages is more suited to a structured program?
Options: PL/1,    FORTRAN,    BASIC,    PASCAL

Ans:D ,D


The word 'linear' in linear programming is used to describe:
Options: relationship among two or more variables in a straight line,    relationship among two or more variable which are directly proportional,    relationship among two or more variables is linear,    all of the above

Ans:B ,B


Many large organizations have information _____ where managers can use fourth-generation languages to retrieve the facts they need from online data bases, and where staff experts are available to provide PC hardware/ software guidance.
Options: expert,    centers,    control,    MIS

Ans:B ,B


. Which data type is better to use for storing the price of an item?
Options: a. Text b. AutoNumber c. Number d. Currency

Ans:– d,– d


What command is used to create a backup configuration?
Options: copy running backup,    copy running-config startup-config,    config mem,    wr mem

Ans:B ,B


Which of the following is part of an administrative policy to secure a database?
Options: Authentication policies,    Limiting particular areas within a building to only authorized people,    Ensure appropriate responses rates are in external maintenance agreements,    All of the above.

Ans:D ,D


Indicate which of the following is not true about 4GL?
Options: 4GL does not support a high-level of screen interaction,    Many database management system packages support 4GLs,    A 4GL is a software tool which is written, possibly, in some third generation language,    All of the above

Ans:A ,A


Frames from one LAN can be transmitted to another LAN via the device
Options: Router,    Bridge,    Repeater,    Modem

Ans:B ,B


. We can replace a font on all sides with another font using the option :
Options: a. Edit –> Fonts b. Tools –> Fonts c. Tools -> Replace Fonts d. Format -> Replace Fonts

Ans:1 – D ,1 – D


A characteristic of a distributed MIS structure is:
Options: computers supporting local DP operations,    a multiprocessing environment,    integrative sharing of the workload,    All of the above

Ans:C ,C


The term referring to evacuating the content of some part of the machine is known as
Options: Dump,    Enhancement,    Down,    Compiler

Ans:A,(Aanswer


. Page Down Key
Options: Moves the cursor one line down B. Moves the cursor one page down C. Moves the cursor one screen down D. Moves the cursor one paragraph down

Ans:– C ,


What will be the output of the program? #include<stdio.h> #include<stdlib.h> union employee { char name[15]; int age; float salary; }; const union employee e1; int main() { strcpy(e1.name, "K"); printf("%s %d %f", e1.name, e1.age, e1.salary); return 0; }
Options: Error: RValue required,    Error: cannot convert from 'const int *' to 'int *const',    Error: LValue required in strcpy,    No error

Ans:D ,D


. What happens when you press Ctrl + X after selecting some cells in Excel?
Options: a.  The cell content of selected cells disappear from cell and stored in clipboard b.  The cells selected are marked for cutting c.  The selected cells are deleted and the cells are shifted left d.  The selected cells are deleted and cells are shifted up

Ans:– b,– b


How can you make the selected character superscripted?
Options:  A) Ctrl + =, B) Ctrl + Shift + =, C) Alt + Ctrl + Shift + =, D) None of above,

Ans:-B,-B


. We can restore the deleted files and folders from
Options: a. Recycle bin b. My document c. Control panel d. All of the above

Ans:2 – a ,2 – a


Communication circuits that transmit data in both directions but not at the same time are operating in
Options: a simplex mode,    a half-duplex mode,    a full-duplex mode,    an asynchronous mode

Ans:B ,B


. Ctrl + N
Options: Save Document B. Open Document C. New Document D. Close Document

Ans:– C ,


Which symbol will be used with grep command to match the pattern pat at the beginning of a line?
Options: ^pat,    $pat,    pat$,    pat^

Ans:A ,A


. which of the following is not a database object?
Options: a. Tables b. Queries c. Relationships d. Reports

Ans:9 – c ,9 – c


________ is an interface by which application programs can access and process SQL databases in a DBMS-independent manner.
Options: ODBC,    OLE DB,    JPCD,    ADO

Ans:A ,A


What will be the output of the program (myprog.c) given below if it is executed from the command line? cmd> myprog 10 20 30 /* myprog.c */ #include<stdio.h> int main(int argc, char **argv) { int i; for(i=0; i<argc; i++) printf("%s\n", argv[i]); return 0; }
Options: 10 20 30,    myprog 10 20,    myprog 10 20 30,    10 20

Ans:C ,C


The most common security failure is
Options: carelessness by users,    depending on passwords,    too much emphasis on preventing physical access,    insufficient technology used to prevent breaches

Ans:A ,A


hich of the following is not the Section Break Option?
Options: Next Page B. Previous Page C. Odd Page D. Even Page

Ans:– B ,


Which of the following terms describe 1024 kilobytes?
Options: Kilobyte,    Megabyte,    Gigabyte,    Terabyte

Ans:B ,B


Bridge works in which layer of the OSI model?
Options: Appliation layer B. Transport layer                    C. Network layer D. Datalink layer

Ans:– D ,

www.000webhost.com