The main purpose of time sharing techniques used in computers is to make the best use of the


Options: CPU,    peripherals,    seconday storage,    floppy disks

Ans:A,A


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 5046 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?
Options: A logical address that identifies the workstation,    A physical address that is randomly assigned each time the computer is started,    A physical address that is assigned by the manufacturer,    The logical domain address for the workstation

Ans:C ,C


Which one of the following phrases most accurately describes a purely capacitive circuit?
Options: Resistances provide the only opposition to current flow,    Capacitive reactance provides the only opposition to current flow,    The ac voltage leads the current by 90 degree,    Combinations of resistance and capacitive reactance provide any opposition to current flow

Ans:B ,B


The organization and interconnection of the various components of a computer system is
Options: Architecture,    Networks,    Graphics,    Designing

Ans:A,(Aanswer


Bring a page into memory only when it is needed is called
Options: Demand Memory B. Demand Paging C. Page Fault D. Page Segmentation

Ans:– B ,


A word field may consist of an optional field instruction called a(n) ______ 
Options: a. subdocument b. symbol c. signal d. switch

Ans:–  D,–  D


. Borders can be applied to
Options: a. cells b. paragraph c. text d. All of above

Ans: – D , – D


13. While working with MS-DOS, which command is used to more file from one directory to another?
Options: a. Rename b. Copy c. Move d. Cp

Ans:Correct Answer: c,Correct Answer: c


Which of the following is a special purpose language used to describe to a computer's operating system.
Options: LOGO,    APL,    ICL,    CORAL

Ans:C ,C


Terminals are used to
Options: collect data from the physical system,    provide information for the manager,    communicate management decisions to the physical system,    All of the above

Ans:D ,D


. Today’s computer giant IBM was earlier known by different name which was changed in 1924. What was that name?
Options: A) Computer Tabulating Recording Co. B) The Tabulator Ltd. C) International Computer Ltd. D) None of above

Ans:A,A


You suspect that your automatic modem dialer is not working correctly. Which of the following commands will manually dial the number 123-4567?
Options: AT1234567,    ATDT1234567,    AT1234567DL,    ATM 1234567

Ans:B ,B


While working with MS-DOS, which command is used to compare the disk in drive A with the disk in drive B, specifying to compare only first side of each disk, and only the first 8 sectors of each track?
Options: DISKCOPY A: B:/8,    DISKCOMP A: B:/l/8,    DISKCOMP A: B:/8,    DISKCOMP A: B:/l

Ans:B ,B


. We can save and protect the workbook by
Options: Write Reservation Password B. Protection Password C. Read-only Recommended D. Any of the above

Ans: – D ,


If you need to double underline a word, how will you do that?
Options:  A) Go to Format menu and then Font option. Open Underline Style and choose Double Underline, B) From Format menu choose Font option and then from Font tab open Underline Style and select Double Underline, C) Select the text then choose Format >> Font and on Font tab open Underline Style and choose Double Underline, D) Click double underline tool on formatting toolbar,

Ans:-C,-C


What is required when more than one person uses a central computer at the same time?
Options: Light pen,    Mouse,    Digitizer,    Terminal

Ans:D ,D


What layer protocol is responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Options: Layer 4 protocols,    Layer 5 protocols,    Layer 6 protocols,    Layer 7 protocols

Ans:D ,D


. Any method for controlling access to or use of memory is known

Options: A) Memory map B) Memory protection C) Memory management D) Memory instruction

Ans:B,B


Quantitative techniques used to solve business problems are called
Options: operations management,    operations science,    operations research,    management operations

Ans:C ,C


How many bytes of memory will the following code reserve? #include<stdio.h> #include<stdlib.h> int main() { int *p; p = (int *)malloc(256 * 256); if(p == NULL) printf("Allocation failed"); return 0; }
Options: 65536,    Allocation failed,    Error,    No output

Ans:B ,B


In 1985, the famous chess player David Levy beat a world champion chess program in four straight games by using orthodox moves that confused the program. What was the name of the chess program?
Options: Kaissa,    CRAY BLITZ,    Golf,    DIGDUG

Ans:B ,B


Which of the following is used for manufacturing chips?
Options: control bus,    control unit,    parity unit,    semiconductor

Ans:D ,D


Which of the following data constraints would be used to specify that the value of cells in a column must be one of a specific set of possible values?
Options: A domain constraint,    A range constraint,    An intrarelation constraint,    An interrelation constraint

Ans:A ,A


What is the similarity between a structure, union and enumeration?
Options: All of them let you define new values,    All of them let you define new data types,    All of them let you define new pointers,    All of them let you define new structures

Ans:B ,B


. Which one is notoperating system?
Options: a. P11 b. OS/2 c. Windows d. Unix

Ans: a, a


Several objectives are required to achieve a successful data base management program. These are availability of data, quality of data, and
Options: compatibility of data,    transmission of data,    desirability of data,    up-to-date data

Ans:D ,D


What is the uses of subnetting?
Options: It divides one large network into several smaller ones B. It divides network into network classes C. It speeds up the speed of network D. None of above

Ans:– A ,


A physical connection between the microprocessor memory and other parts of the microcomputer is known as
Options: A) Path B) Address bus C) Route D) All of the above

Ans:-B,-B


A form of code that uses more than one process and processor, possibly of different type, and that may on occasions have more than one process or processor active at the same time, is known as
Options: multiprogramming,    multi threading,    broadcasting,    time sharing

Ans:B ,B


Which of the following is a method to create a new table in MS Access?
Options: a. Create table in Design View b. Create Table using wizard c. Create Table by Entering data d. All of above

Ans:ndash; d,ndash; d


Pick out the wrong statement.
Options: Information stored in RAM can be changed by over writing it,    Information stored in ROM cannot be changed by overwriting,    Information can be stored in any location of RAM,    Computer main memory can be accessed only sequentially

Ans:D ,D


Which command is used to link the files?
Options: lk,    ln,    cp,    tar

Ans:B ,B


You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?
Options: access-list 10 deny 172.16.48.0 255.255.240.0,    access-list 10 deny 172.16.0.0 0.0.255.255,    access-list 10 deny 172.16.64.0 0.0.31.255,    access-list 10 deny 172.16.48.0 0.0.15.255

Ans:D ,D


. Which of the following is not a database application?
Options: a. dBase b. Flash c. FoxPro d. Access

Ans:– b,– b


. To exit from the Resume Wizard and return to the document window without creating a resume, click the _____ button in any panel in the Resume Wizard dialog box.
Options: a. Cancel b. Back c. Next d. Finish

Ans:– D,– D


. Which of the following is not a basic step in creating a worksheet?
Options: a. Save the workbook b. Modify the worksheet c. Enter text and data d. Copy the worksheet

Ans:– d,– d


21. What is the smallest and largest font size available in Font Size tool on formatting toolbar?
Options: a. 8 and 72 b. 8 and 64 c. 12 and 72 d. None of above

Ans:– A ,– A


One data dictionary software package is called
Options: DB/DC dictionary,    TOTAL,    ACCESS,    any of the above

Ans:A ,A


Your customer tells you the print quality of their dot matrix printer is light then dark. Which of the following could cause the problem.
Options: Paper slippage,    Improper ribbon advancement,    Paper thickness,    Head position

Ans:B ,B


All Operating Systems get their total memory initialized from?
Options: CPU,    BIOS,    ROM,    RAM

Ans:B ,B


. EBCDIC stands for
Options: A) Extended Binary Coded Decimal Interchange Code B) Extended Bit Code Decimal Interchange Code C) Extended Bit Case Decimal Interchange Code D) Extended Binary Case Decimal Interchange Code

Ans:A,A


The keyword used to transfer control from a function back to the calling function is
Options: switch,    goto,    go back,    return

Ans:D ,D


.   To edit the text within the boxes of an organization chart, you
Options: a. Select the box and text, then make the changes b. Select the box, then make the changes c. Highlight the text, then make the changes d. Highlight the text then make the change

Ans:9 – A ,9 – A


. Which of the following is correct syntax in Excel?
Options: =IF(LogicalTest, TrueResult, FalseResult) B. =IF(LogicalTest, (TrueResult, FalseResult)) C. =IF(LogicalTest, TrueResult) (LogicalTest, FalseResult) D. =IF(LogicalTest, TrueResult), IF(LogicalTest, FalseResult)

Ans:– A ,


A file produced by a spreadsheet 
Options: a. is generally stored on disk in an ASCII text fromat b. can be used as is by the DBMS c. both a and b d. none of the above

Ans:0.a,0.a


In what file can you specify which users are not allowed to access a system via FTP?
Options: /etc/ftpusers,    /etc/hosts.deny,    /etc/ftpaccess,    All of the above

Ans:A ,A


. What happens if you edited an image inserted in PowerPoint?
Options: a.  The original file that was inserted is not changed b.  The original file that was inserted is changed c.  The original file is changed when you save presentation d.  None of above

Ans:5 – A ,5 – A


The function of CPU is
Options: to provide a hard copy,    to read, interpret and process the information and instruction,    to communicate with the operator,    to provide external storage of text

Ans:B ,B


. Which of the following is not a form of data?
Options: A) numbers and characters B) images C) sound D) none of above

Ans:D,D


.   auto clip art is a feature that
Options: a. automatically places clip art in your presentation b. scans your presentation for incorrect spelling of words on each slide c. scans your presentation for incorrect spelling in word art objects d. all of the above

Ans:5 – D ,5 – D


Educational programs for the labour union officials are conducted by
Options: the firm's industrial relations department,    the vice-president of information systems,    both (a) and (b),    neither (a) nor (b)

Ans:C ,C

www.000webhost.com