One byte can be used to encode any integer between 'O' and -inclusive


Options: 16,    256,    128,    255

Ans:D,D






More Computer Fundamental Related questions:


Access time is the highest in the case of
Options: floppy disk,    cache,    swapping devices,    magnetic disk

Ans:D ,D


.   Which of the following is not a way to cut text ?
Options: a. Select the text and press the delete button b. Select the text and select Edit, Cut from the menu c. Select the text and click the Cut button on the toolbar d. Select the text and press Ctrl + X

Ans:2 – A ,2 – A


On a leased line installation a known good external modem shows no carrier detect light. Where is the problem most likely to be?
Options: In the modem,    In the phone line,    In the computer,    In the DTC equipment

Ans:B ,B


56. After typing header text, how can you quickly enter footer text?
Options: a. Press PageDown key and type the text for footer b. Click on Switch between Heeder & Footer then type the text c. Both of above d. None of above

Ans:– C ,– C


. Which of the following is correct regarding Underline in MS-Word?
Options: a. Color of Underline can be change b. Style of Underline can be change c. Underline can be set using by shortcut key d. All of the above

Ans: –  D , –  D


. Essential business letter elements include the _____.
Options: a. date line and inside address b. message c. signature block d. all of the above

Ans:– D,– D


A manager would use a file manipulation language such as APL to cause the computer to
Options: produce pre-computed information, such as ratios,    perform screening and selection of data from the data base,    both (a) and (b),    neither (a) nor (b)

Ans:B ,B


Your CD-ROM audio cable connects to the:
Options: speaker,    sound card (or motherboard if sound is integrated with it),    power supply,    hard drive

Ans:B ,B


  The arrangement of elements such as Title and subtitle text, pictures, tables etc. is called :
Options: Layout B. Presentation C. Design D. Scheme

Ans:– A ,


You can activate a cell by
Options: a. Pressing the Tab key b. Clicking the cell c. Pressing an arrow key d. All of the above

Ans:8211; d,8211; d


Ctrl + C
Options: Copy the selected text B. Cut the selected text C. Print the selected text D. Paste the selected text

Ans:– A ,


To be successful in implementing DSS, organizations should have the following characteristics except:
Options: a well-controlled data-processing system,    willingness to commit dollars and personnel to the project.,    education and training by the organization,    powerful central computer groups to initiate and manage system projects

Ans:D ,D


. Paper spreadsheets can have all the same advantages as an electronic spreadsheet except which of the following?
Options: a. Rows and columns b. Headings c. Speed d. None

Ans:– c,– c


The data model that is produced from reverse engineering is:
Options: a conceptual model.,    an internal model.,    a logical model.,    None of the above is correct.

Ans:D ,D


Which of the following is a part of the Central Processing Unit?
Options: Printer,    Keyboard,    ) Mouse,    Arithmetic Logic Unit

Ans:D ,D


. IBM 1401 computer was
Options: A) Mainframe Computer B) Mini Computers C) Micro Computers D) None of above

Ans:A,A


What frequency range is used for microwave communications, satellite and radar?
Options: Low Frequency : 30 kHz to 300 kHz,    Medium Frequency : 300 kHz to 3 MHz,    Super High Frequency : 3000 MHz to 30000 MHz,    Extremely High Frequency :30,000 MHz

Ans:D ,D


The memory which is ultraviolet light erasable and electrically programmable is
Options: ROM,    PROM,    RAM,    EPROM

Ans:D,D


. Format a:/s will do
Options: a. Formats and then transfers system file b. Formats with verification c. Formats and scans the disk d. None of above

Ans:8 – a ,8 – a


A magnetic tape volume that is used on a data processing operation without any change to its contents is
Options: Magnetic disk,    Punched paper tape,    Master tape,    Card reader

Ans:C ,C


The brain of any computer system is
Options: ALU,    Memory,    CPU,    Control unit

Ans:C ,C


Where have the program and data to be located before the ALU and control unit of a computer can operate on it?
Options: Internal memory,    Secondary memory,    Microprocessor,    Magnetic tapes

Ans:A,A


How many NAND circuits are contained in a 7400 NAND IC?
Options: 1,    2,    4,    8

Ans:C ,C


. What does DMA stand for?
Options: A) Distinct Memory Access B) Direct Memory Access C) Direct Module Access D) Direct Memory Allocation

Ans:B,B


When you connect to an online information service, you are asked to provide some kind of identification such as your name, an account number and a password. What is the name given to this brief dialogue between you and the information system?
Options: Security procedure,    Safeguard procedure,    Identification procedure,    Log-on procedure

Ans:D ,D


Human beings are referred to as Homosapiens. Which device is called Silico sapiens?
Options: Monitor,    Hardware,    Robot,    Computer

Ans:D,D


What is the result of segmenting a network with a bridge (switch)? It increases the number of collision domains. It decreases the number of collision domains. It increases the number of broadcast domains. It decreases the number of broadcast domains. It makes smaller collision domains. It makes larger collision domains.
Options: 1 and 5,    2, 3 and 5,    3, 4 and 6,    1, 3 and 6

Ans:A ,A


How many primary partitions can exist on one drive?
Options: 16,    4,    2,    1

Ans:B ,B


Expand EDVAC
Options:

Ans:Electronic Discrete Variable Automatic Computer,


You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign?
Options: 255.255.255.192,    255.255.255.224,    255.255.255.240,    255.255.255.248

Ans:B ,B


What is the default subnet mask for a class A network?
Options: 127.0.0.1,    255.0.0.0,    255.255.255.0.0,    255.255.255.0

Ans:B ,B


. What is the name of the computer terminal which gives paper printout?
Options: A) Display screen B) Soft copy terminal C) Hard copy terminal D) Plotter

Ans:C,C


Which command is used to sort the lines of data in a file in alphabetical order?
Options: sort,    sh,    st,    sort -r

Ans:A ,A


Resolution of externally defined symbols is performed by
Options: Linker,    Loader,    Compiler,    Assembler

Ans:A ,A


Super-computers
Options: Are found at thousands of sites around the world,    Can now fit on a single silicon chip,    Are usually designed to process accounting applications,    Are not fast enough for some applications

Ans:D ,D


Indicate which of the following is not true about an interpreter?
Options: Interpreter generates an object program from the source program,    Interpreter is a kind of translator,    Interpreter analyses each source statement every time it is to be executed,    All of the above

Ans:A ,A


. A .... is a named location on a disk where files are stored
Options: a. Folder b. Pod c. Version d. None of the above

Ans: a, a


. Where can you change automatic or manual calculation mode in Excel?
Options: a.  Double CAL indicator on status bar b.  Go to Tools >> Options >> Calculation and mark the corresponding radio button c.  Both of above d.  None of above

Ans:– b,– b


What will be the output of the program ? #include<stdio.h> int main() { enum status {pass, fail, absent}; enum status stud1, stud2, stud3; stud1 = pass; stud2 = absent; stud3 = fail; printf("%d %d %d\n", stud1, stud2, stud3); return 0; }
Options: 0, 1, 2,    1, 2, 3,    0, 2, 1,    1, 3, 2

Ans:C ,C


You can place an ISA device in an EISA slot.
Options: True,    False,    ,    

Ans:A ,A


. First generation computers used _________ for memory
Options: A) vacuum tubes B) silicon chips C) magnetic drum D) RAM

Ans:C,C


Which of the following is a technique for hiding the internal implementation details of an object?
Options: Encapsulation,    Polymorphism,    Inheritance,    All of the above.

Ans:A ,A


Which command is used to make all files and sub-directories in the directory (progs) executable by all users?
Options: chmod -R a+x progs,    chmod -R 222 progs,    chmod -1 a+x progs,    chmod -x a+x progs

Ans:A ,A


. Which one is notoperating system?
Options: a. P11 b. OS/2 c. Windows d. Unix

Ans: a, a


. An error in software or hardware is called a bug. What is the alternative computer jargon for it?
Options: A) Leech B) Squid C) Slug D) Glitch

Ans:D,D


. Which of the following is not purely output device?
Options: A) Screen B) Printer C) Speaker D) Plotter

Ans:A,A


After you service a laser printer, you notice dirty print. Which of the following would correct the problem.
Options: Clean the developer tank,    Reset the printer,    Run several blank pages,    Clean the laser diode

Ans:C ,C


. To hold row and column titles in places so that they do not scroll when you scroll a worksheet, click the
Options: a. Unfreeze panes command on the window menu b. Freeze panes command on the window menu c. Hold titles command on the edit menu d. Split command on the window menu

Ans:– b,– b


. A Pixel is __________
Options:  A computer program that draws picture B.  A picture stored in secondary memory C.  The smallest resolvable part of a picture D.  None of these

Ans: – C ,


in the context of animations, what is a trigger?
Options: a. An action button that advances to the next slide b. An item on the slide that performs an action when clicked c. The name of a motion path d. All of above

Ans: – B , – B

www.000webhost.com