How many types of storage loops exist in magnetic bubble memory?


Options: 8,    4,    16,    2

Ans:D,D






More Computer Fundamental Related questions:


Which is a swapping device is used to hold the images of pages in main memory.
Options: Plex,    Paging drum,    Card punch,    Optical mark reader

Ans:B ,B


The mistake, committed by interchanging two digits in a numeric held, during data entry, is called
Options: transposition error,    transcription error,    Beta testing error,    Alpha testing error

Ans:A ,A


You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign?
Options: 255.255.224.0,    255.255.240.0,    255.255.248.0,    255.255.252.0

Ans:B ,B


  Which of the following is not an underline option in the format cells dialog box?
Options: Double B. Single Accounting        C. Double Accounting D. Single Engineering

Ans:– D ,


Which of the following storage and retrieval methods would be well suited to your processing requirements if you only need to retrieve records one at a time and there is no fixed pattern to the requests for data and records?
Options: indexed sectors,    sequential,    direct,    indexed direct

Ans:D ,D


Character readers are those devices which read the characters printed on the source documents and then convert them directly into computer-usable input. Which of the following is not a character reader?
Options: OCR,    MICR,    OMR,    LCD

Ans:D ,D


The two functional areas concerned with material flow are
Options: production and marketing,    manufacturing and purchasing,    marketing and finance,    manufacturing and finance

Ans:A ,A


Which of the following professions has not been affected by personal computers?
Options: medical,    clerical,    accounting,    law

Ans:E ,E


To autofit the width of column
Options:  A) Double click the right border of column, B) Double click the left border of column, C) Double click the column header, D) All of above,

Ans:-A,-A


Which is used to provide the sight information to the right person at the right time for proper decision making?
Options: DBMS,    MIS,    ISO,    PSO

Ans:B ,B


. The commonly used standard data code to represent alphabetical, numerical and punctuation characters used in electronic data processing system is called
Options: A) ASCII B) EBCDIC C) BCD D) All of above

Ans:D,D


In what module, multiple instances of execution will yield the same result even if one instancy has not terminated before the next one has begun?
Options: non-reusable module,    serially reusable,    reenterable module,    recursive module

Ans:C ,C


What is the extension of Word files?
Options:  A) FIL, B) DOT, C) DOC, D) TXT,

Ans:-C,-C


. The least significant bit of the binary number, which is equivalent to any odd decimal number, is:

Options: A) 0 B) 1 C) 1 or 0 D) 3

Ans:A,A


. Which of the following memory unit that processor can access more rapidly
Options: a. Main Memory b. Virtual Memory c. Cache memory d. Read Only Memory

Ans:6 – c ,6 – c


Ultimately, internal constraints can be traced to limits on
Options: manpower,    money,    machines,    material

Ans:B ,B


Which of the following commands is used to list contents of directories?
Options: ls,    lp,    dir,    tar

Ans:A ,A


The imitation of a systems investigation may result from:
Options: a manager's formal request,    a scheduled system's review,    an analyst's investigation,    All of the above

Ans:D ,D


. What does the expression [detail] ! [product] * 1.30 do?
Options: a. multiplies the contents of detail and product fields by 1.3 b. First divides detail by product and then multiplies by 1.3 c. multiplies the contents of detail in the product table by 1.3 d. multiplies the contents of product in the detail table by 1.3

Ans:– d,– d


. Which of the following is a disk compression tool?
Options: a. Drive space b. Scandisk c. Defragmenter d. None of the above

Ans:5 – a ,5 – a


Tab scrolling button
Options: a. Allow you to view a different worksheet b. Allow you to view additional worksheet rows down c. Allow you to view additional worksheet columns to the right d. Allow you to view additional sheets tabs

Ans:#8211; d,#8211; d


Which is the best process to access number of records from the same file?
Options: a batch job,    a real-time job,    an on-line job,    All of the above

Ans:A ,A


. MS-EXCEL can be used to automate
Options: a. Financial statements, Business forecasting b. Transaction registers, inventory control c. Accounts receivable, accounts payable d. Any of the above

Ans:– d,– d


A search value can be an exact value or it can be
Options: a. Logical Operator b. Relationship c. Wild card character d. Comparison operation

Ans:ndash; c,ndash; c


“Ctrl + End” is used to
Options: a. Moves the cursor to the end of Line b. Moves the cursor to the end of Document c. Moves the cursor to the end of Paragraph d. None of the Above

Ans:–  B,–  B


. __________ is used to build ‘intuitive’ queries.
Options: a. SQL b. Xbase c. QBE d. XML

Ans:1 – c ,1 – c


The value of each bead in heaven is
Options: A) 1 B) 3 C) 5 D) 7

Ans:-C,-C


Which command will show you the summary of the NAT configuration?
Options: show ip nat translations,    show ip nat statistics,    debug ip nat,    clear ip nat translations *

Ans:B ,B


A hard copy would be prepared on a
Options: Line printer,    Dot matrix printer,    Type writer terminal,    Plotter

Ans:E ,E


Which feature helps you to inserts the contents of the Clipboard as text without any formatting
Options: a. Paste Special b. Format Painter c. Page Setup d. Styles

Ans:–  A,–  A


hich of the following is not the Section Break Option?
Options: Next Page B. Previous Page C. Odd Page D. Even Page

Ans:– B ,


Which language was devised by Dr. Seymour Aubrey Papert?
Options: APL,    COBOL,    LOGO,    FORTRAN

Ans:C,(Canswer


If a file has read and write permissions for the owner, then the octal representation of the permissions will be
Options: 1,    6,    5,    3

Ans:B ,B


.   The size of a table object
Options: a. Is dependent on the amount of text within the table b. Is determined by the presentation design but can be changed c. Is determined by the presentation design and cannot be changed d. a and c

Ans:4 – B ,4 – B


_____ decisions concern the execution of specific tasks to assure that they are. carried out efficiently and effectively.
Options: tactical,    strategic,    operational,    management

Ans:C ,C


12. Swapping
Options: a. Works best with many small partitions b. Allows many programs to use memory simultaneously c. Allows each program in turn to use the memory d. Does not work with overlaying

Ans:Correct Answer: c,Correct Answer: c


. What is the use of Referential Integrity in MS Access?
Options: a. It allow to enter a value in the foreign key field of a child table if that value exist in the primary key of the parent table b. It does not allow to enter a value in the foreign key field of a child table if that value exist in the primary key of the parent table c. It allow to enter a value in the Primary key field of a child table if that value exist in the Foreign key of the parent table d. None of above

Ans:– a,– a


Which command is used to remove an index from the database in SQL?
Options: DELETE INDEX,    DROP INDEX,    REMOVE INDEX,    ROLL BACK INDEX

Ans:B ,B


Which of the following typically uses a keyboard for input?
Options: desktop terminal,    point-of-sale terminal,    financial transaction terminal,    executive workstation

Ans:E ,E


. Any method for controlling access to or use of memory is known

Options: A) Memory map B) Memory protection C) Memory management D) Memory instruction

Ans:B,B


What does the NOW() function return?
Options: It returns the serial number of the current date and time B. It returns the serial number of the current date C. It returns the serial number of the current time D. None of the above

Ans:– D ,


. The primary advantage of key-to-tape data entry system is
Options: A) A large percentage of editing can be performed at the time of data entry B) Key verification is easily performed C) The tape is reusable D) Keying errors can be detected as they occur.

Ans:C,C


Which of the following translate back from machine code something resembling the source language
Options: Interpreter,    Compiler,    Assembler,    Decompiler

Ans:D ,D


.   to add a new row to a table you would
Options: a. click the insert rows command on the insert menu b. press the enter key c. click the insert rows button on the standard toolbar d. none of the above

Ans:8 – D ,8 – D


Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?
Options: A,    B,    G,    N

Ans:C ,C


Why are vacuum tubes also called valves?
Options: A) Because they can amplify the weak signals and make them strong B) Because they can stop or allow the flow of current C) Both of above D) None of above

Ans:-B,-B


In a _____ a parent record type can be linked to one or more "child" record types, but a child record type can have only one parent.
Options: Network database,    Relational database,    Distributed database,    Hierarchical database

Ans:D ,D


Which of the following languages is more suited to a structured program?
Options: PL/1,    FORTRAN,    BASIC,    PASCAL

Ans:D,(Danswer


What should be the first step while OS upgrading? A)  Delete old Operating System B)  Backup old Operating System C)  Backup Critical Data D)  Format Hard Disks
Options:

Ans:– C ,


Changing the appearance of a document is called
Options:  A) Proofing, B) Editing, C) Formatting, D) All of above, 

Ans:-C,-C

www.000webhost.com