Off-line operation is the operation of devices without the control of


Options: Memory,    CPU,    ALU,    Control unit

Ans:B,B


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 9093






More Computer Fundamental Related questions:


. “Ctrl + Delete” is used to
Options: Delete the word just after the cursor B. Delete the word just before the cursor         C. Delete the single letter just after the cursor D. Delete the single letter just before the cursor

Ans:– A ,


. Where can you set the shedding color for a range of cells in Excel?
Options: a. Choose required color form Patterns tab of Format Cells dialog box b. Choose required color on Fill Color tool in Formatting toolbar c. Choose required color on Fill Color tool in Drawing toolbar d. All of above

Ans:– d,– d


Conversion of hexadecimal number 1D7F16 to a decimal number is
Options: 755110,    877110,    555710,    778110

Ans:A ,A


Theories are evaluated with
Options: data,    information,    principles,    propositions

Ans:D ,D


The equipment with which the computer talks to its users is called a
Options: word processor,    peripheral,    software,    diskette

Ans:B ,B


Distinguishing between the different levels of management can be accomplished by analyzing,
Options: types of decision made,    frequency with which decisions are made,    time frame considered in making decisions,    types of report information needed to make decisions

Ans:E ,E


Which of the following is considered a high-level language?
Options: Machine language,    FORTRAN,    Assembly language,    All of the above

Ans:B ,B


. In MS Access “Hyperlink” Data Type can store
Options: a. Web Address b. email Address c. Path of a File d. All of Above

Ans:– d,– d


. What is the shortcut-key for manual line break?
Options: CTRL + Enter B. Alt + Enter             C. Shift + Enter D. Space + Enter

Ans:– C ,


Report generators are used to 
Options: a. store data input by a user b. retrieve information from files c. answer queries d. both b and c

Ans:.d,.d


Which of the following data constraints would be used to specify that the value of cells in a column must be one of a specific set of possible values?
Options: A domain constraint,    A range constraint,    An intrarelation constraint,    An interrelation constraint

Ans:A ,A


Which command is used to remove the read permission of the file 'note' from both the group and others?
Options: chmod go+r note,    chmod go+rw note,    chmod go-x note,    chmod go-r note

Ans:D ,D


What is offset error?
Options: the difference between the sensor input and the absolute sensed parameter.,    the difference between the controller output and the setting of the manipulated variable.,    the difference between the control setpoint value and the actual value.,    All of the above

Ans:C ,C


. This database has only one table.
Options: a. relational b. large c. flat-file d. DBMS

Ans:8 – c ,8 – c


The file system “NTFS” stands for A)  New Type File System B)  Never Terminated File System C)  New Technology File System D)  Non Terminated File System
Options:

Ans: – C ,


A Processor
Options: is a device that performs a sequence of operations specified by instructions in memory.,    is the device where information is stored,    is a sequence of instructions,    is typically characterized by interactive processing and time of the CPU's time to allow quick response to each user.

Ans:A ,A


The characteristics of the computer system capable of thinking, reasoning and learning is known is
Options: machine intelligence,    human intelligence,    artificial intelligence,    virtual intelligence

Ans:C ,C


A loader is
Options: a program that places programs into memory and prepares them for execution,    a program that automate the translation of assembly language into machine language,    is a program that appears to execute a source program as if it were machine language,    program that accepts a program written in a high level language and produces an object program

Ans:A ,A


what is full form of ENIAC
Options:

Ans:Electronic Numerical Integrator and Computer,


In which of the storage placement strategies a program is placed in the largest available hole in the main memory?
Options: best fit,    first fit,    worst fit,    buddy

Ans:C ,C


A linker
Options: creates a load module,    is not necessary with variable partitions,    must be run after the loader,    is not needed with a good compiler

Ans:A ,A


Which of the following are word processing software?
Options: a. WordPerfect b. Easy Word c. MS Word d. All of above

Ans:– D,– D


Number of bits per symbol used in Baudot code is
Options: 1,    5,    8,    9

Ans:B ,B


. The key F12 opens a
Options: a. Save As dialog box b. Open dialog box c. Save dialog box d. Close dialog box

Ans:– A,– A


Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?
Options: A,    B,    G,    N

Ans:C ,C


You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts?
Options: 255.255.255.192,    255.255.255.224,    255.255.255.240,    255.255.255.248

Ans:B ,B


Direct Numerical Control means:
Options: using several computers to control one large machine,    using one computer to control several machines,    complete elimination of a need for a human operator.,    eliminating computers from the manufacturing process

Ans:B ,B


Which of the following is not a restriction for a table to be a relation?
Options: The cells of the table must contain a single value.,    All of the entries in any column must be of the same kind.,    The columns must be ordered.,    No two rows in a table may be identical.

Ans:C ,C


A step-up transformer has a turns ratio of 1:4. If the line voltage is 115 V rms, what is the peak secondary voltage?
Options: 700 V,    707 V,    651 V,    208 V

Ans:C ,C


. Which is not a valid property for attribute setting?
Options: a. C,b. S,c. H,d. R

Ans:3 – a ,3 – a


The peak value of a sine waveform is:
Options: the amplitude at 70.7% of the maximum value,    the amplitude at 90% of the maximum value,    the amplitude at 1.41 times the maximum value,    the maximum positive or negative value

Ans:D ,D


Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer:
Options: Bandwidth alternatives,    Switching alternating,    Inter organizational networks,    Extranets

Ans:C ,C


. We can save and protect the workbook by
Options: Write Reservation Password B. Protection Password C. Read-only Recommended D. Any of the above

Ans: – D ,


. The Search tool CANNOT be used on which major Access object?
Options: a. Forms b. Queries c. Reports d. Tables

Ans:2 – c ,2 – c


The tracks on a disk which can be accessed without repositioning the R/W heads is
Options: Surface,    Cylinder,    Cluster,    All of the above

Ans:B ,B


Which of the following is true concerning a procedure?
Options: You do not create them with SQL.,    They do not need to have a unique name.,    They include procedural and SQL statements.,    They are the same thing as a function.

Ans:C ,C


Modern Computers are very reliable but they are not
Options: A) Fast B) Powerful C) Infallible D) Cheap

Ans:-C,-C


The executive vice-president usually has responsibility for the
Options: physical system of the firm,    conceptual information system of the firm,    vice-president of finance,    All of the above

Ans:A ,A


Number cruncher is the informal name for
Options: Mini computer,    Super computer,    Micro computer,    Mainframe computer

Ans:B ,B


Which one of the following statements best applies to a series RLC circuit?
Options: The voltage waveform for each component always has the same amplitude and phase as the applied voltage,    The current waveform for each component always has the same amplitude and phase as the applied current,    All of the above,    The sum of the current is always less than the applied current

Ans:B ,B


Zani's framework of effective MIS argues that MIS can only be designed in a:
Options: top down fashion,    co-ordinative fashion,    by managerial participation,    bottom up

Ans:A ,A


Point out the error in the program #include<stdio.h> #define SI(p, n, r) float si; si=p*n*r/100; int main() { float p=2500, r=3.5; int n=3; SI(p, n, r); SI(1500, 2, 2.5); return 0; }
Options: 26250.00 7500.00,    Nothing will print,    Error: Multiple declaration of si,    Garbage values

Ans:C ,C


. In the third Generation of computers

Options: A) Distributed data processing first became popular B) An operating system was first developed C) High level procedural language were first used D) Online real time systems first become popular

Ans:B,B


Who founded the FSF?
Options: Linus Torvalds,    Richard Stallman,    Bob Young,    All of the above

Ans:B ,B


Mistakes made in the requirements analysis stage show up in
Options: System design,    System development,    System testing,    System implementation

Ans:D ,D


A DBMS that combines a DBMS and an application generator is ________ .
Options: Microsoft's SQL Server,    Microsoft's Access,    IBM's DB2,    Oracle Corporation's Oracle

Ans:B ,B


Which of the following statements correctly assigns 12 to month using pointer variable pdt? #include<stdio.h> struct date { int day; int month; int year; }; int main() { struct date d; struct date *pdt; pdt = &d; return 0; }
Options: pdt.month = 12,    &pdt.month = 12,    d.month = 12,    pdt->month = 12

Ans:D ,D


What is the meaning of Bandwidth in Network?
Options:  Transmission capacity of a communication channels B.  Connected Computers in the Network C.  Class of IP used in Network D.  None of Above

Ans:– A ,


A 32 bit microprocessor has the word length equal to
Options: 2 bytes,    32 bytes,    4 bytes,    8 bytes

Ans:C ,C


. The __________ performs document tracking.
Options: a. distributed application b. enterprise software c. Oracle software d. EDM software

Ans:2 – d ,2 – d

www.000webhost.com