The device that can both feed data into and accept data from a computer is


Options: ALU,    CPU,    Input-Output device,    All of the above

Ans:C,(Canswer


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 19634 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Computer Fundamental Related questions:


. The __________ determines how long you must hold down an alphanumeric key before the keyboard will repeat the character.
Options: a. strike rate b. repeat rate c. default rate d. threshold rate

Ans:0 – b ,0 – b


Which of the following are the two main components of the CPU?
Options: control unit and registers,    registers and main memory,    control unit and ALU,    ALU and bus

Ans:C ,C


. Use of icons and windows are characteristics of …… interface
Options: a. Command driven b. Windows orientated c. Graphical user d. Menu driven

Ans:5 – c ,5 – c


The total number of messages handled by a computerized telephone system on a daily basis is an example of:
Options: Frequency,    Updating,    Volume,    All of the above

Ans:C ,C


. The__ button on the tool box display data from a related table
Options: a. Sub form sub report b. Relationships c. Select objects d. More controls

Ans:3 – a ,3 – a


A snowflake schema is which of the following types of tables?
Options: Fact,    Dimension,    Helper,    All of the above

Ans:D ,D


. MS Excel provides the default value for step in Fill Series dialog box
Options: a.  0 b.  1 c.  5 d.  10

Ans:– b,– b


Hardware _____ memory is seldom used in modern computers.
Options: ROM,    RAM,    LIFO,    PROM

Ans:C ,C


Which of the following high speed non¬impact printers are fast enough to print the entire book in about 1 minute.
Options: Laser,    Dot-matrix,    Page,    Line

Ans:C ,C


What will be the output of the program ? #include<stdio.h> int main() { float arr[] = {12.4, 2.3, 4.5, 6.7}; printf("%d\n", sizeof(arr)/sizeof(arr[0])); return 0; }
Options: 5,    4,    6,    7

Ans:B ,B


An econometric model requires
Options: a computer with large auxiliary storage capacity,    a data base of economic data,    a model base of quantitative analysis programs,    All of the above

Ans:D ,D


What is the size of the reserved memory area?
Options: 64 kb,    384 kb,    640 kb,    1024 kb

Ans:B ,B


A code which uses more bits for each character then what is necessary is known as
Options: Hollerith code,    Gray code,    Redundant code,    Mnemonics

Ans:C ,C


If the ASCII character H is sent and the character I is received, what type of error is this?
Options: single-bit,    multiple-bit,    burst,    recoverable

Ans:A ,A


If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?
Options: access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftp access-list 111 permit ip any 0.0.0.0 255.255.255.255,    access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any,    access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp,    access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 permit ip any 0.0.0.0 255.255.255.255

Ans:D ,D


A variable P is called pointer if
Options: a. P contains the address of an element in DATA. b. P points to the address of first element in DATA c. P can store only memory addresses d. P contain the DATA and the address of DATA

Ans:- a,- a


How often are BPDUs sent from a layer 2 device?
Options: Never,    Every 2 seconds,    Every 10 minutes,    Every 30 seconds

Ans:B ,B


What will be the output of the program? #include<stdio.h> int main() { typedef int LONG; LONG a=4; LONG b=68; float c=0; c=b; b+=a; printf("%d,", b); printf("%f\n", c); return 0; }
Options: 72, 68.000000,    72.000000, 68,    68.000000, 72.000000,    68, 72.000000

Ans:A ,A


Front-end processor is a _____ designed specifically to handle the communications processing task.
Options: ALU,    Control unit,    CPU,    Register

Ans:C ,C


A ternary relationship involves how many entities?
Options: 3 or less,    3,    More than 3,    3 or more

Ans:B ,B


Who was the father of Punched Card Processing?
Options: J Presper Eckert,    Charles Babbage,    Dr. Herman Hollerith,    Blaise Pascal

Ans:C,C


Interconnected networks need communication processors such as switches, routers, hubs, and gateways. Select the best fit for answer:
Options: TCP/IP,    Protocol,    Open Systems,    Internetwork processor

Ans:D ,D


. Which of the following is related to fifth generation computers?

Options: A) Knowledge information processing system B) Very large scale integration (VLSI) C) Both of above D) Only b

Ans:A,A


The following are components of a database except ________ .
Options: user data,    metadata,    reports,    indexes

Ans:C ,C


. Paper spreadsheets can have all the same advantages as an electronic spreadsheet except which of the following?
Options: a. Rows and columns b. Headings c. Speed d. None

Ans:– c,– c


What Is a process variable?
Options: A manipulated variable,    A controlled variable,    A process parameter that changes value,    All of the above

Ans:D ,D


Which runs on computer hardware and serve as platform for other software to run on?
Options: Operating System B. Application Software C. System Software D. All

Ans:– A ,


The DC voltage on most circuit boards is:
Options: -12 volts,    0 volts,    +5 volts,    +12 volts

Ans:C ,C


Control Unit of a digital computer is often called the
Options: Clock,    Nerve center,    ICs,    All of the above

Ans:B,B


Convert the 11014B machine language instructions into assembly language, assuming that they were not generated by pseudo-ops:
Options: ASRA,    LOADA h#OD4E, i,    STOREA h#014B, d,    ADDA h#01FE, i

Ans:C ,C


UNIVAC is
Options: A) Universal Automatic Computer B) Universal Array Computer C) Unique Automatic Computer D) Unvalued Automatic Computer

Ans:A,A


Terminal Table
Options: a permanent table which lists all key words and special symbols of the language in symbolic form,    a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure,    consists of a full or partial list of the tokens as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation,    contains all constants in the program

Ans:A ,A


A linker
Options: creates a load module,    is not necessary with variable partitions,    must be run after the loader,    is not needed with a good compiler

Ans:A ,A


You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use?
Options: 255.255.255.192,    255.255.255.224,    255.255.255.240,    255.255.255.248

Ans:C ,C


Encryption is being used primarily with
Options: file retention,    transaction entry,    computer processing,    data communication

Ans:D ,D


Which would you choose to display the statistics about a document?
Options: tools, word count B. insert, statistics C. tools, spelling and grammar D. tools, statistics

Ans:– A ,


The function(s) of the Syntax phase is/ are:
Options: to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs,    to build a literal table and an identifier table,    to build a uniform symbol table,    to parse the source program into the basic elements or tokens of the language

Ans:A ,A


. The acronym of WORM in a Computer System is
Options: Write Only Read Only B. Write Once Read Many C. Write Only Read Memory D. Write Once Read Memory

Ans:– B ,


. Which of the following is best for quick copy operation?
Options: Copy and Paste B. Windows Clipboard C. Drag and Drop D. Auto Text

Ans: – C ,


to view headers and footers, you must switch to
Options: normal view B. print layout view C. print preview mode D. both B and C

Ans:– D ,


. We can save and protect the workbook by
Options: Write Reservation Password B. Protection Password C. Read-only Recommended D. Any of the above

Ans: – D ,


Communication ports are found on the back of microcomputers. They are used to connect the computer to _____
Options: printers,    modems,    other hardware,    All of the above

Ans:D ,D


COM1 is typically represented by which of the following?
Options: 15 pin port,    9 pin male port,    9 pin female port,    25 pin male port

Ans:B ,B


Information concerning the probability distribution of a profit rate can be generated by using:
Options: electronic spreadsheet,    artificial intelligence,    time-series analysis,    management science techniques

Ans:D ,D


All the instructions and procedures needed to start up a computer, to the point it can load an operating system, are stored in ROM chips. In IBM compatible PCs this is called the _____
Options: RAM BIOS,    ROM BIOS,    EPROM,    POST

Ans:B,B


The Thevenin resistance is equal in value to the
Options: Load resistance,    Half the load resistance,    Internal resistance of a Morton circuit,    Open-load resistance

Ans:A ,A


Each model of a computer has a unique
Options: Assembly language,    Machine language,    High level language,    All of the above

Ans:B,B


In CRC there is no error if the remainder at the receiver is _____.
Options: equal to the remainder at the sender,    zero,    nonzero,    the quotient at the sender

Ans:B ,B


. While inserting a diskette into the diskette drive of a PC, the diskette’s label side should face

Options: A) East B) North C) South D) Up

Ans:D,D


What is the maximum scale percentage available in Scale drop down box?
Options:  A) 500, B) 200, C) 100, D) 90, 

Ans:-B,-B

www.000webhost.com