Impact printers


Options: strike a ribbon against the paper to produce character images,    include ink-jet and thermal devices,    are more expensive than Laser printers,    use optical technology

Ans:A,A






More Computer Fundamental Related questions:


You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?
Options: access-list 10 deny 192.168.160.0 255.255.224.0,    access-list 10 deny 192.168.160.0 0.0.191.255,    access-list 10 deny 192.168.160.0 0.0.31.255,    access-list 10 deny 192.168.0.0 0.0.31.255

Ans:C ,C


What is required when more than one person uses a central computer at the same time?
Options: Light pen,    Mouse,    Digitizer,    Terminal

Ans:D ,D


Which of the following memory is capable of operating at electronics speed?
Options: Semiconductor memory,    Magnetic disks,    Magnetic drums,    Magnetic tapes

Ans:A ,A


    Which of the following extensions suggest that the file is a backup copy
Options: a.    Bak b.    Bas c.    Com d.    Txt

Ans:.a,Correct Answer: a. Bak


In virtual memory systems, Dynamic address translation
Options: is the hardware necessary to implement paging,    stores pages at a specific location on disk,    is useless when swapping is used,    is part of the operating system paging algorithm

Ans:A ,A


. What is a slide transition?
Options: a. Overheads b. Letters c. A special effect used to introduce a slide in a slide show d. The way one slide looks

Ans:5 – C ,5 – C


What is the result of segmenting a network with a bridge (switch)? It increases the number of collision domains. It decreases the number of collision domains. It increases the number of broadcast domains. It decreases the number of broadcast domains. It makes smaller collision domains. It makes larger collision domains.
Options: 1 and 5,    2, 3 and 5,    3, 4 and 6,    1, 3 and 6

Ans:A ,A


Comments put in cells are called …..
Options: Smart Tip B. Cell Tip C. Web Tip D. Soft Tip

Ans:– B ,


Three-tier architecture includes which of the following?
Options: Three server layers,    A client layer and two server layers,    Two client layers and one server layer,    Three client layers

Ans:B ,B


. If you need to remove only the formatting done in a range (numbers and formula typed there should not be removed), you must
Options: a.  From Edit menu choose Clear and then Formats b.  From Edit menu choose Delete c.  Click on Remove Formatting tool on Standard Toolbar d.  Double click the Format Painter and then press Esc key in keyboard

Ans:– a,– a


Header labels contain
Options: creation data,    control totals,    both (a) and (b),    neither (a) nor (b)

Ans:A ,A


In SQL, which command is used to create a database user?
Options: ADD USER TO DATABASE,    MK USER,    CREATE USER,    All of the above

Ans:C ,C


. To print the PowerPoint presentation, press
Options: a. Ctrl + T b. Ctrl + E c. Ctrl + S d. Ctrl + P

Ans:4 – D ,4 – D


. The primary purpose of an operating system is:
Options: To make the most efficient use of the computer hardware B. To allow people to use the computer, C. To keep systems programmers employed D. To make computers easier to use

Ans: – A ,


Which of the following commands is used to summarize the disk usage?
Options: chkdsk,    fdisk,    du,    disk

Ans:C ,C


Which of the following is a serious problem of file management systems?
Options: difficult to update,    lack of data independence,    data redundancy,    program dependence

Ans:E ,E


Point out the correct statement will let you access the elements of the array using 'p' in the following program? #include<stdio.h> #include<stdlib.h> int main() { int i, j; int(*p)[3]; p = (int(*)[3])malloc(3*sizeof(*p)); return 0; }
Options: for(i=0; i<3; i++) { for(j=0; j<3; j++) printf("%d", p[i+j]); } ,    for(i=0; i<3; i++) printf("%d", p[i]); ,    for(i=0; i<3; i++) { for(j=0; j<3; j++) printf("%d", p[i][j]); } ,    for(j=0; j<3; j++) printf("%d", p[i][j]);

Ans:C ,C


A constraint that does not, affect the feasible solution region is known as
Options: redundant constraint,    unbounded solution,    slack variable,    surplus variable

Ans:A ,A


To record a sequence of keystrokes and mouse actions to play back later we use:
Options: Media player B. Sound Recorder C. Calculator D. Macro Recorder

Ans:– D ,


. Circular division of disks to store and retrieve data are known as

Options: A) tracks B) sectors C) cycles D) rings

Ans:A,A


. Slide sorter of PowerPoint is available on _____ menu.
Options: a. Insert b. File c. View d. Edit

Ans:3 – C ,3 – C


Which of the following memories needs refresh?
Options: DRAM B. SRAM C. ROM D. All of above

Ans:– A ,


A normal CD-ROM usually can store up to __________data?
Options: 680 KB B. 680 Bytes C. 680 MB D. 680 GB

Ans:– C ,


. Which of the following computer is not invented by J.P. Eckert and John Mauchly?
Options: A) ENIAC B) EDVAC C) UNIVAC D) EDSAC

Ans:6-D,6-D


Which of the following is not the required condition for binary search algorithm?
Options: a. The list must be sorted b. there should be the direct access to the middle element in any sublist c. There must be mechanism to delete and/or insert elements in list d. none of above

Ans:- c,- c


Which of the following is(are) true of system analysts?
Options: their responsibility is to analyze and design system software,    they may be looked upon as an intermediary between users and programmers,    they are heavily involved with the system-development life cycle,    both (a) and (c)

Ans:D ,D


Operating system, editors, and debuggers comes under?
Options: System Software B. Application Software C. Utilities D. None of the above

Ans:– A ,


In comparison to the internal (main) memory, tape or disk memory is
Options: slower and more expensive,    slower and less expensive,    faster and more expensive,    faster and less expensive

Ans:B ,B


The DC voltage on most circuit boards is:
Options: -12 volts,    0 volts,    +5 volts,    +12 volts

Ans:C ,C


Which of the following is not logical operator?
Options: &,    &&,    ||,    !

Ans:A ,A


. What is the first stage in software development?
Options: A) Specification and design B) Testing C) System Analysis D) Maintenance

Ans:C,C


. User action such as keystroke or mouse click are referred to as
Options: a. Interrupt b. Tasks c. Processes d. Event

Ans:3 – d ,3 – d


. Time during which a job is processed by the computer is
Options: A) Delay times B) Real time C) Execution time D) Down time

Ans:C,C


What will be the output of the program (sample.c) given below if it is executed from the command line? cmd> sample friday tuesday sunday /* sample.c */ #include<stdio.h> int main(int argc, char *argv[]) { printf("%c", *++argv[2] ); return 0; }
Options: s,    f,    u,    r

Ans:C ,C


PowerPoint Application allows you to produce
Options: Animated Presentations B. Paper Printouts of Slides C. Notes for the Speaker D. All of the above.

Ans:– D ,


Which of the following commands is used to get directory one level up?
Options: cd,    cd ..,    cd/,    chdir

Ans:B ,B


. The advantage of COM are its __ and __
Options: A) Compact size; speed readability B) Compact size, speed C) Readability; speed D) Low cost; readability

Ans:A,A


. Which of the following class of computers can process physical quantities such as speed?
Options: A) Analog Computers B) Digital Computers C) Hybrid Computers D) None of above

Ans:A,A


Which of the following is a wrong example of network layer:
Options: Internet Protocol (IP) ARPANET,    X. 25 Packet Level Protocol (PLP) - ISO,    Source routing and Domain naming - Usenet,    X.25 level 2 - ISO

Ans:D ,D


If you want to execute more than one program at a time, the systems software you are using must be capable of:
Options: word processing,    virtual memory,    compiling,    multitasking

Ans:D ,D


In which numbering system can the binary number 1011011111000101 be easily converted to?
Options: Decimal system,    Hexadecimal system,    Octal system,    No need to convert

Ans:B ,B


. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
Options: A) Leech B) Squid C) Slug D) Glitch

Ans:D,D


73. Ctrl + E
Options: a. Exit Application b. Select All c. Clear All d. Align Center

Ans:–  D ,–  D


Which of the following communications modes support two-way traffic but in only one direction of a time?
Options: simplex,    half-duplex,    three-quarters duplex,    full-of the above

Ans:B ,B


Which layer of OSI determines the interface of the system with the user?
Options: Network,    Application,    Data-link,    Session

Ans:B ,B


A problem is first connected to its proposed solution during the _____ stage.
Options: conceptualization,    identification,    formalization,    implementation.

Ans:C ,C


. Which is an example of a formula?
Options: a. =A1+A2 b. =add(A1:A2) c. A1+A2 d. SUM(A1:A2)

Ans:– a,– a


What is the size of Host bits in Class B of IP address?
Options: 04 B. 08 C. 16 D. 32

Ans:– C ,


The first step of the implementation phase is
Options: select the computer,    announce the implementation project,    implementation planning,    prepare physical facilities

Ans:C ,C


Which of the following is not a font style?
Options:  A) Bold, B) Italics, C) Regular, D) Superscript, 

Ans:-D,-D

www.000webhost.com