The computer program language which is widely used in computer science and engineering and also in business is


Options: COBOL,    FORTRAN,    PASCAL,    LISP

Ans:C,C


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 15390 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Computer Fundamental Related questions:


. Microprocessors can be used to make
Options: A) Computer B) Digital systems C) Calculators D) All of the above

Ans:1-D,1-D


A basic S-R flip-flop can be constructed by cross-coupling which basic logic gates?
Options: AND or OR gates,    XOR or XNOR gates,    NOR or NAND gates,    AND or NOR gates

Ans:C ,C


Compilers and interpreters are themselves
Options: High-level language,    Codes,    Programs,    Mnemonics

Ans:C ,C


The control unit of a microprocessor
Options: stores data in the memory,    accepts input data from a keyboard,    Performs arithmetic / logic / functions,    All of the above

Ans:E ,E


Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?
Options: access-list 100 permit tcp any 196.15.7.0 0.0.0.255 eq www,    access-list 10 deny tcp any 196.15.7.0 eq www,    access-list 100 permit 196.15.7.0 0.0.0.255 eq www,    access-list 110 permit ip any 196.15.7.0 0.0.0.255

Ans:A ,A


. Which of the following symbol sets would be most likely to contain a mathematical symbol such as a degree sign, greater than or equal to, or a Greek letter?
Options: a. Wingdings b. Wingdings 3 c. Webdings d. Symbol

Ans: – D , – D


Which command is used to terminate all processes in your own system except the login shell?
Options: kill 1,    kill 0,    cancel all,    cancel 1

Ans:B ,B


Data integrity control
Options: is used to set upper and lower limits on numeric data,    requires the use of passwords to prohibit unauthorized access to the file,    has the data dictionary keep the date and time of last access last back-up, and most recent modification for all files,    All of the above

Ans:C ,C


The memory sizes in mainframe computers and advanced technology micro computers are expressed as
Options: Bytes,    Kilo-bytes,    Bits,    Megabytes

Ans:D ,D


.   Which of the following is not a transition effect?
Options: a. Blinks diagonal b. Dissolve c. Fade through black d. Blinds vertical

Ans:0 – A ,0 – A


Graphic representation of the control logic of processing functions or modules representing a system, is known as:
Options: Structured analysis,    Structured chart,    Structured English,    System Flow chart

Ans:B ,B


What is the power dissipation of a resistance that has 24 V dropped across it and 0.25 A flowing through it?
Options: 3 W,    6 W,    64 W,    122 W

Ans:B ,B


Business Intelligence (BI) reporting systems cannot do which of the following operations?
Options: Filter data,    Group data,    Modify data,    Both filter and group data

Ans:C ,C


Which of the following is the fastest?
Options: CPU,    magnetic tapes and disks,    video terminal,    sensors, mechanical controllers

Ans:A ,A


A modern digital computer has
Options: Extremely high speed,    Large memory,    Almost unlimited array,    All of the above

Ans:D ,D


In a pure inductor:
Options: ac current leads the voltage by 90 degree,    ac current and voltage are exactly in phase,    ac current lags the voltage by 90 degree,    ac current is converted to dc voltage

Ans:C ,C


A processing unit that coordinates networks and data communication is known as
Options: Control unit,    Communications processor,    Register unit,    CPU

Ans:B,B


. “Ctrl + Down Arrow” is used to
Options: a. Moves the cursor one paragraph down b. Moves the cursor one line down c. Moves the cursor one page down d. Moves the cursor one screen down

Ans:–  A,–  A


Which command will show you the summary of the NAT configuration?
Options: show ip nat translations,    show ip nat statistics,    debug ip nat,    clear ip nat translations *

Ans:B ,B


In the DBM approach, application programs perform the
Options: storage function,    processing functions,    access control,    All of the above

Ans:B ,B


. Dot-matrix is a type of
Options: A) Tape B) Printer C) Disk D) Bus

Ans:B,B


. Personnel who design, program, operates and maintains computer equipment refers to
Options: A) Console-operator B) Programmer C) Peopleware D) System Analyst

Ans:C,C


Which of the following data structure cant store the non-homogeneous data elements?
Options: a. Arrays b. Records c. Pointers d. None  

Ans:a,a


The _____ symbol is used in a flowchart to represent a calculation task.
Options: Input,    Output,    Process,    Start

Ans:C ,C


Which of the following statement is true?
Options: A switch creates a single collision domain and a single broadcast domain. A router creates a single collision domain.,    A switch creates separate collision domains but one broadcast domain. A router provides a separate broadcast domain.,    A switch creates a single collision domain and separate broadcast domains. A router provides a separate broadcast domain as well.,    A switch creates separate collision domains and separate broadcast domains. A router provides separate collision domains.

Ans:B ,B


The most prominent system in the retail sales industry is the _____ system.
Options: POS (point-of-scale),    COBOL,    ACM,    PC/XT

Ans:A ,A


What are the appropriate Hex codes for setting Linux swap and Linux native partition types in fdisk?
Options: 82 and 83,    92 and 93,    63 and 64,    82 and 85

Ans:A ,A


. The computer size was very large in
Options: A) First Generation B) Second Generation C) Third Generation D) Fourth Generation

Ans:2-A,2-A


You get a CMOS checksum error during bootup. What is most likely the cause?
Options: power supply is bad,    BIOS needs updating,    CMOS battery is nearing end of life,    hard drive types are incorrectly defined

Ans:C ,C


Which of the following are not likely to be found on a PC main circuit board
Options: RAM chips,    Microprocessor chips,    ROM chips,    LCD clocks

Ans:D ,D


. What is the maximum zoom percentage in Microsoft PowerPoint?
Options: a. 100 b. 200 c. 300 d. 400

Ans:7 – D ,7 – D


You need to gather the IP address of a remote switch that is located in Hawaii. What can you do to find the address?
Options: Issue the show ip arp command on the router connected to the switch.,    Issue the show ip route command on the router connected to the switch.,    Issue the show cdp neighbor command on the router connected to the switch.,    Issue the show cdp neighbors detail command on the router connected to the switch.

Ans:D ,D


. The acronym of WORM in a Computer System is
Options: Write Only Read Only B. Write Once Read Many C. Write Only Read Memory D. Write Once Read Memory

Ans:– B ,


What is a Firewall in Computer Network?
Options:  The physical boundary of Network B.  An operating System of Computer Network       C.  A system designed to prevent unauthorized access D.  A web browsing Software

Ans:– C ,


You have purchased a MAU (Multistation Access Unit) from your computer supplier and now must decide what type of network card you should install in the workstations. Which of the following would be the most appropriate?
Options: Fast SCSI Wide,    Token-Ring,    ArcServe,    Ethernet

Ans:B ,B


A section of code that may only be executed by one process at any one time is
Options: CPM,    Critical resource,    Critical region,    Gray code

Ans:C ,C


Synchronous protocols
Options: transmit characters one at a time,    allow faster transmission than asynchronous protocols do,    are generally used by personal computers,    are more reliable

Ans:B ,B


There are several procedures you can implement to provide maximum security. The most important of these is:
Options: do not leave training manuals unsecured,    run regular simulated tests using TARP (testing of Applications Recovery Planes),    Verify the reputation of the people installing your system,    do not allow unbonded service people to work on your equipment

Ans:B ,B


Which device is used as the standard pointing device in a Graphical User Environment?
Options:  Keyboard B.  Mouse C.  Joystick D.  Track ball

Ans:– B ,


The order entry subsystem creates a file of order records that are input to the
Options: production subsystem,    inventory subsystem,    control subsystem,    quality subsystem

Ans:B ,B


Which is not a factor when categorizing a computer?
Options: Speed of the output device,    Amount of main memory the CPU can use,    Cost of the system,    Capacity of the hard disk

Ans:E ,E


Auto clipart is a feature that
Options: a. Automatically places clipart in your presentation b. Scans your presentation for incorrect spelling in your words on each slide c. Scans your presentation for incorrect spelling in Word Arts objects d. All of above

Ans: – D , – D


Terminal Table
Options: a permanent table which lists all key words and special symbols of the language in symbolic form,    a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure,    consists of a full or partial list of the tokens as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation,    contains all constants in the program

Ans:A ,A


. The command used to create logical drive for specific location of disk
Options: a. Fdisk b. Format c. Subst d. All of the above

Ans: c, c


Current is measured in units of:
Options: volts,    amps,    ohms,    farads

Ans:B ,B


. To print the PowerPoint presentation, press
Options: a. Ctrl + T b. Ctrl + E c. Ctrl + S d. Ctrl + P

Ans:4 – D ,4 – D


The memory which is ultraviolet light erasable and electrically programmable is
Options: ROM,    PROM,    RAM,    EPROM

Ans:D,D


A form can be used to
Options: modify records,    delete records,    format printed output,    All of the above

Ans:D ,D


. Desktop is a
Options: a. Provides workspace b. Screen saver c. Display program d. Working with my document

Ans:0 – a ,0 – a


. List Box and Text box
Options: a.  Are some other than that in a list box the bullets are enabled b.  Are different. List boxes are used to present lists and can’t be created with text boxes. c.  Both of above d.  None of above

Ans:1 – A ,1 – A

www.000webhost.com