Programs are executed on the basis of a priority number in a


Options: Batch processing system B. Multiprogramming C. Time sharing D. None of these

Ans:– B ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 6576 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


.   The boxes that are displayed to indicate that the text, pictures or objects are placed in it is called ….
Options: a. Placeholder b. Auto text c. Text box d. Word art

Ans:6 – A ,6 – A


Which is NOT typically a Field Replaceable Unit?
Options: System ROM,    Power supply,    System chasis,    Video controller

Ans:C ,C


Which of the following is not used for storage purposes with main frame computers?
Options: removable disks,    fixed disks,    mass storage systems,    diskettes

Ans:D ,D


. What are the tabs that appear at the bottom of each workbook called?
Options: a. Reference tabs b. Position tabs c. Location tabs d. Sheet tabs

Ans:– d,– d


To locate a data item for storage is
Options: Field,    Feed,    Database,    Fetch

Ans:D,D


Resolution of externally defined symbols is performed by
Options: Linker,    Loader,    Compiler,    Assembler

Ans:A ,A


You can copy data or formulas
Options: a. With the copy, paste and cut commands on the edit menu b. With commands on the shortcut menu c. With buttons on the standard toolbars d. All of the above

Ans:#8211; d,#8211; d


.   After choosing a predefine template, ….. option has to be chosen to change a background color
Options: a. Design template b. Color scheme c. Animation scheme d. Color effects

Ans:0 – B ,0 – B


. Which feature is used for monitoring all document changes?
Options: Edit Document B. Monitor Change C. Track Change D. Track all

Ans: – C ,


To center worksheet titles across a range of cells, you must
Options: a. Select the cells containing the title text plus the range over which the title text is to be centered b. Widen the columns c. Select the cells containing the title text plus the range over which the title text is to be enfettered d. Format the cells with the comma style

Ans:#8211; a,#8211; a


Dived logical memory into blocks with the same size as frames are called
Options: Pages B. Frames C. Page Table D. Segmentation

Ans:– A ,


What will be the output of the program (myprog.c) given below if it is executed from the command line? cmd> myprog one two three /* myprog.c */ #include<stdio.h> int main(int argc, char **argv) { printf("%c\n", **++argv); return 0; }
Options: myprog one two three,    myprog one,    o,    two

Ans:C ,C


. To insert three columns between columns D and E you would
Options: a. Select column D b. Select column E c. Select columns E, F and G d. Select columns D, E, and F.

Ans:– c,– c


A compiler is
Options: a program that places programs into memory and prepares them for execution,    a program that automate the translation of assembly language into machine language,    program that accepts a program written in a high level language and produces an object program,    is a program that appears to execute a source program as if it were machine language

Ans:C ,C


Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?
Options: A,    B,    G,    N

Ans:C ,C


Communication circuits that transmit data in both directions but not at the same time are operating in
Options: a simplex mode,    a half-duplex mode,    a full-duplex mode,    an asynchronous mode

Ans:B ,B


When determining the efficiency of algorithm, the space factor is measured by
Options: A)Counting the maximum memory needed by the algorithm b.Counting the minimum memory needed by the algorithm c.Counting the average memory needed by the algorithm d.Counting the maximum disk space needed by the algorithm

Ans:A,Counting the maximum memory needed by the


A receiving host has failed to receive all of the segments that it should acknowledge. What can the host do to improve the reliability of this communication session?
Options: Send a different source port number.,    Restart the virtual circuit.,    Decrease the sequence number.,    Decrease the window size.

Ans:D ,D


. Which operating system can you give smallest file name?
Options: a. Ps/2 b. Dos c. Windows d. Windows NT

Ans: b, b


. A(n)_______ is a major object that can run independent of a control.
Options: a.            event b.           property c.           procedure d.            macro

Ans:– d,– d


Elapsed time, between initiating a query and receiving a response is called
Options: response time,    waiting time,    processing time,    Turnaround time

Ans:D ,D


. Shimmer, Sparkle text, Blinking Background etc. are known as
Options: a. font styles b. font effects c. word art d. text effects

Ans: – D , – D


A JSP is transformed into a(n):
Options: Java applet.,    Java servlet.,    Either 1 or 2 above.,    Neither 1 nor 2 above.

Ans:B ,B


What was originally called the "imitation game" by its creator?
Options: The Turing Test,    LISP,    The Logic Theorist,    Cybernetics

Ans:A ,A


What does Belady’s Anomaly related to?
Options: Page Replacement Algorithm B. Memory Management Algorithm C. Deadlock Prevention Algorithm D. Disk Scheduling Algorithm

Ans:– A ,


A CPU's processing power is measured in:
Options: IPS,    CIPS,    MIPS,    nano-seconds

Ans:C ,C


. During the boot process, the …. looks for the system file
Options: a. CD b. BIOS c. CPU d. DVD

Ans:7 – b ,7 – b


A file that includes an index directory to facilitate random access is
Options: Sequential file,    Indexed file,    Random file,    Serial file

Ans:B ,B


. The problem with …file is that they slow your computer’s operation
Options: a. Fragmented b. Formatted c. Program d. All of above

Ans:2 – a ,2 – a


Most algorithms begin by _____.
Options: Displaying the input items,    Displaying the output items,    Entering the input items into the computer,    Entering the output items into the computer

Ans:C ,C


How many layers are in the TCP/IP model?
Options: 4 layers B. 5 layers C. 6 layers D. 7 layers

Ans:– A ,


. Hard disk is coated in both sides with
Options: A) Magnetic metallic oxide B) Optical metallic oxide C) Carbon layer D) All of the above

Ans:6-A,6-A


In SQL, which command is used to remove a stored function from the database?
Options: REMOVE FUNCTION,    DELETE FUNCTION,    DROP FUNCTION,    ERASE FUNCTION

Ans:C ,C


Which utility is useful for finding the local host name?
Options: NBTSTAT,    Netstat,    PING,    Hostname

Ans:D ,D


A prefix for billion which is equal to _____ is called as billi.
Options: 100,    10000,    1000,    10

Ans:D ,D


What does DMA stand for?
Options: Distinct Memory Access B. Direct Memory Access C. Direct Module Access D. Direct Memory Allocation

Ans:– B ,


Which of the following modifications may not succeed?
Options: Changing a column data type from char to date,    Changing a column data type from numeric to char,    Both of the above actions should succeed.,    Neither of the above actions will succeed.

Ans:A ,A


________ is a cover for utilizing OLE DB that is designed for use by almost any language.
Options: ODBC,    ASP,    JPCD,    ADO

Ans:D ,D


In which numbering system can the binary number 1011011111000101 be easily converted to?
Options: Decimal system,    Hexadecimal system,    Octal system,    No need to convert

Ans:B ,B


. What is an intersection of a row and a column?
Options: a. Form b. Cursor c. Cell d. Record

Ans:– c,– c


.   Which type of font is best suitable for large amount of text?
Options: a. serif fonts b. sans serif fonts c. text fonts d. picture fonts

Ans:4 – A ,4 – A


What function does a serial interface perform in data communication?
Options: Converts serial data into audio signals,    Converts analog signals into digital signals,    Converts parallel data into a stream of bits,    Decodes incoming signals into computer data

Ans:C ,C


A technique used by codes to convert an analog signal into a digital bit stream is known as
Options: A) Pulse code modulation B) Pulse stretcher C) Query processing D) Queue management

Ans:-A,-A


What will be the output of the program? #include<stdio.h> int main() { int i; char c; for(i=1; i<=5; i++) { scanf("%c", &c); /* given input is 'a' */ printf("%c", c); ungetc(c, stdin); } return 0; }
Options: aaaa,    aaaaa,    Garbage value.,    Error in ungetc statement.

Ans:B ,B


A __ name must be unique within a database
Options: a. Table b. Field c. Record d. Character

Ans:ndash; a,ndash; a


The CPU of a computer transfers print output to a temporary disk memory at high speed and then gets back to processing another job without waiting for the output to got to the printer. In this way, the CPU does not remain idle due to its own high speed as compared to the low speed of the printer. What is the name of this memory?
Options: External memory,    I/O memory,    ROM,    Buffer memory

Ans:D,D


What protocol(s) is(are) allowed a user to retrieve her/his mail from the mail server to her/his mail reader?
Options: POP3,    FTP,    MAP,    All of the above

Ans:A ,A


Which of the following files will displayed by this command cat *ch*
Options: patch,    catch,    .ch,    All of the above

Ans:D ,D


Identify false statement
Options: a. You can find deleted files in recycle bin b. You can restore any files in recycle bin if you ever need c. You can increase free spaceof disk by sending files in recycle bin d. You can right click and choose Empty Recycle Bin to clean it at once

Ans:c,c


An Enterprise Resource Planning application is an example of a(n) ________ .
Options: single-user database application,    multiuser database application,    e-commerce database application,    data mining database application

Ans:B ,B

www.000webhost.com