RAM is used as a short memory because it is


Options: Volatile,    Has small capacity,    Is very expensive,    Is programmable

Ans:A,(Aanswer






More Computer Fundamental Related questions:


What command is used to count just the number of lines contained in a file?
Options: wc - r,    wc - w,    wc - c,    wc - l

Ans:D ,D


Straight-line operations:
Options: must be limited to two per workpiece,    must be parallel to one of the axes of the coordinate system,    can include diagonal cuts if they aren't curved,    All of the above

Ans:B ,B


. in MS Access, OLE Object Data type can store
Options: a. Microsoft Word documents b. Microsoft Excel spreadsheets c. Sounds d. All of the Above

Ans:– d,– d


Programmers refer to the goal of solving a problem as the _____.
Options: Input,    Output,    Processing,    Purpose

Ans:B ,B


Programmers refer to the items needed to reach a problem's goal as the _____
Options: Input,    Out put,    Processing,    Purpose

Ans:A ,A


The minimal set of super key is called
Options: Primary key B. Secondary key C. Candidate key D. Foreign key

Ans:– C ,


. Which key deletes text before, or to the left, of the insertion point?
Options: a. PageUp b. Delete c. PageDown d. BackSpace

Ans:5 – d ,5 – d


. The Software which contains rows and columns is called ______
Options: a. Database b. Drawing c. Spreadsheet d. Word processing

Ans:– c,– c


Which of the following statements is correct for the use of packet switching?
Options: the subdivision of information into individually addressed packets in conjunction with alternative routing arrangement enabled the transmission path to be altered in the event of congestion or individual link failure,    the employment of additional intelligence within the network enabled more sophisticated error control and link control procedures to be applied,    by employing wide bandwidth circuits for the trunk networks substantial economies through extensive sharing of capacity could be achieved.,    All of the above

Ans:D ,D


. ctrl, shift and alt are called __________ keys.
Options: a. adjustment b. function c. modifier d. alphanumeric

Ans:8 – c ,8 – c


Who is called a supervisor of computer activity? A)  Memory B)  Operating System C)  I/O Devices D)  Control Unit
Options:

Ans:– B ,


. One computer that is not considered a portable computer is
Options: A) Minicomputer B) A laptop computer C) Tablet PC D) All of the above

Ans:A,A


. What is the use of Document Map?
Options: a. to quickly format the document b. to quickly print required page c. to quickly navigate the document d. to quickly correct spelling mistakes

Ans: –  C , –  C


The _____, or typeface, defines the appearance and shape of letters, numbers, and special characters.
Options: a. font b. font size c. point d. paragraph formatting

Ans:– A,– A


If a variable is a pointer to a structure, then which of the following operator is used to access data members of the structure through the pointer variable?
Options: .,    &,    *,    ->

Ans:D ,D


. Using a custom animation effect, how do you make text appear on a slide by letter
Options: a. Apply the animation scheme fade in one by one. b. Apply an entrance effect, and then set it to by letter in the effect option dialog box c. Apply the fly in entrance to the text, and then set its speed to very slow. d. All of above

Ans:2 – B ,2 – B


Which of the following is used for serial access storage only?
Options: RAM,    Magnetic tape,    Magnetic disk,    Core memory

Ans:B,B


Which is the most widely used semiconductor?
Options: Copper,    Silicon,    Germanium,    All of the above

Ans:B ,B


A characteristic of a file server is which of the following?
Options: Manages file operations and is shared on a network.,    Manages file operations and is limited to one PC.,    Acts as a fat client and is shared on a network.,    Acts as a fat client and is limited to one PC.

Ans:A ,A


DOS system file consists of
Options: a. IBMBIO.COM, IBMDOS.COM, COMMAND.COM b. COMMAND.COM, IBMBIO.COM, FORMAT.COM c. SYS.COM,IBMBIO.COM,IBMDOS.COM d. None of the above

Ans:10 a.             ,10 a.            


Which one of the following symbols is not used in an ERD?
Options: Rectangle,    Oval,    Diamond,    Circle

Ans:D ,D


A typical light switch in your home is a:
Options: knife switch,    toggle switch,    rotary switch,    momentary push button switch

Ans:B ,B


In analyzing the compilation of PL/I program, the term "Lexical analysis" is associated with
Options: recognition of basic syntactic constructs through reductions,    recognition of basic elements and creation of uniform symbols,    creation of more optional matrix,    use of macro processor to produce more optimal assembly code

Ans:B ,B


Which of the following is a machine language instruction?
Options: ADD 5,    10001101,    GOTO XOUT,    All of the above

Ans:B ,B


Queries in Access can be used as
Options: a. view, change and analyze data in different ways b. a source of records for forms and reports c. Only a d. Both a and b

Ans:ndash; d,ndash; d


. How to restrict the values of a cell so that only whole numbers between 9 and 99 can be entered in a cell.
Options: The Settings tab under the menu Format -> Cells B. The Settings tab under the menu Data -> Validation C. The Settings tab under the menu Data -> Filter -> Advanced Filter D. the Settings tab under the menu Format -> Conditional Formatting

Ans:– B ,


In OLE DB, which of the following represents characteristics of the recordset abstraction?
Options: Properties,    Collections,    Methods,    Abstractions

Ans:A ,A


Which command is used to delete the directory that is empty?
Options: DEL *.*,    RD,    ERASE,    MD

Ans:B ,B


The language that the computer can understand and execute is called
Options: Machine language,    Application software,    System program,    All of the above

Ans:A ,A


The accident file is commonly updated in the
Options: accident and claims data system,    payroll system,    employment control reporting system,    personnel activity reporting system

Ans:A ,A


When creating a pool of global addresses, which of the following can be used instead of the netmask command?
Options: / (slash notation),    prefix-length,    no mask,    block-size

Ans:B ,B


The function(s) of the Syntax phase is/ are:
Options: to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs,    to build a literal table and an identifier table,    to build a uniform symbol table,    to parse the source program into the basic elements or tokens of the language

Ans:A ,A


The extract process is which of the following?
Options: Capturing all of the data contained in various operational systems,    Capturing a subset of the data contained in various operational systems,    Capturing all of the data contained in various decision support systems,    Capturing a subset of the data contained in various decision support systems

Ans:B ,B


Which part interprets program instructions and initiate control operations.
Options: Input,    Storage unit,    Logic unit,    Control unit

Ans:D,(Danswer


When both inputs of a J-K flip-flop cycle, the output will:
Options: be invalid,    not change,    change,    toggle

Ans:B ,B


When the minimum and maximum number of instances of an entity is one, you know which of the following?
Options: Mandatory one,    Optional one,    Mandatory many,    Cannot tell

Ans:A ,A


Which application allows a user to access and change remote files without actual transfer?
Options: TELNET,    NFS,    FTP,    DNS

Ans:B ,B


The startup routine runs, when machine boots up is known as
Options: a.POST b. BOOT up c. Operating Routine d. I/O operation

Ans:1  b.       ,1  b.      


What protocol does PPP use to identify the Network layer protocol?
Options: NCP,    ISDN,    HDLC,    LCP

Ans:A ,A


Which command is used to remove a file?
Options: remove,    rm,    mv,    del

Ans:B ,B


After entering all fields required for a table, if you realize that the third field is not needed, how will you remove?
Options: a. You need to delete the whole tablThere is no method to remove a particular field only. b. Delete all the fields from third downwards and reenter the required fields again. c. Select the third column in datasheet view then  Delete d. Select the third row in table design view then Delete

Ans:ndash; d,ndash; d


Which, of the following checks, cannot be carried out on the input data to a system?
Options: consistency check,    Syntax check,    Range check,    All of the above

Ans:B ,B


The flow and timing to data to and from the microprocessor is regulated by
Options: control pins,    address pins,    data pins,    power pins

Ans:A ,A


What is a TSR?
Options: test status request,    terminate and stay resident program,    take status request,    token set ready

Ans:B ,B


A subdivision of main storage created by operational software is referred to as a:
Options: compartment,    time-shared program,    divided core,    partition

Ans:D ,D


What is meant by computer literacy?
Options: Knowing what a computer can and cannot do,    Ability to write computer programs,    Knowing computer related vocabulary,    Ability to assemble computers

Ans:A ,A


The birthplace of the World Wide Web is considered to be
Options: the Department of Defense,    CERN,    ARPA,    Netscape

Ans:B ,B


With respect to a network interface card, the term 10/100 refers to
Options: protocol speed,    a fiber speed,    megabits per seconds,    minimum and maximum server speed

Ans:C ,C


A smart solid-state sensor is:
Options: one that integrates both logic and a solid-state sensor into one unit.,    one that has two or three substrates,    not available today,    All of the above

Ans:A ,A


An expert system differs from a database program in that only an expert system:
Options: contains declarative knowledge,    contains procedural knowledge,    features the retrieval of stored information,    expects users to draw their own conclusions

Ans:B ,B

www.000webhost.com