The most common binary code in use today is the 8 bit ASCII code. What do the letters ASCII stand for?


Options: American Standard Code for International Interchange,    American Standard Code for Information Interchange,    American Standard Code for Intelligence Interchange,    American Scientific Code for Information Interchange

Ans:B,B


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 8342 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


. Which statement is valid?

Options: A) 1KB = 1024 bytes B) 1 MB=2048 bytes C) 1 MB = 1000 kilobytes D) 1 KB = 1000 bytes

Ans:A,A


Composition is a stronger form of which of the following?
Options: Aggregation,    Encapsulation,    Inheritance,    All of the above.

Ans:A ,A


Transmission of computerised data from one location to another is called
Options: data transfer,    data flow,    data communication,    data management

Ans:C ,C


The ALU of a computer responds to the commands coming from
Options: primary memory,    control section,    external memory,    cache memory

Ans:B,B


Which of the following is directry controlled from a keyboard.
Options: Card punch,    Punched paper tape,    Magnetic disk,    Magnetic tape

Ans:A ,A


What are the different types of real data type in C ?
Options: float, double,    short int, double, long int,    float, double, long double,    double, long int, float

Ans:C ,C


Which computer has been designed to be as compact as possible?
Options: Mini,    Super computer,    Micro computer,    Mainframe

Ans:C,(Canswer


In OSI network architecture, the dialogue control and token management are responsible of
Options: data link layer,    transport layer,    network layer,    session layer

Ans:D ,D


Any device that performs signal conversion is
Options: Modulator,    Modem,    Keyboard,    Plotter

Ans:A ,A


The data appearing first in the left portion of punched card is
Options: descriptive data,    coded data,    quantitative data,    All of the above

Ans:B ,B


What does OSS stand for?
Options: Open System Software,    Original Source Software,    Open Source Software,    Original System Server

Ans:C ,C


Coding and testing are done In a
Options: top-down manner,    bottom-up manner,    ad hoc manner,    cross sectional manner

Ans:A ,A


. When you start up the computer the boot up storage at which the BIOS versions manufacturer and data are displayed on the monitor is called
Options: a. Bootstrap b. Power on self test (POST) c. System configuration d. Kernel loading

Ans: b, b


If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be
Options: A) 216 B) 65,536 C) 64K D) Any of the above

Ans:-B,-B


. Which of the following is not a valid Zoom percentage in Excel?
Options: a. 10 b. 100 c. 300 d. 500

Ans:– d,– d


. How many margins sare there on a page?
Options: a. Two (header and footer) b. Four (top, bottom, right and left) c. Two (landscape and portrait) d. Four (center, top, left and bottom)

Ans: – B , – B


The data dictionary tells the DBMS
Options: what files are in the database,    what attribute are possessed by the data,    what these files contain,    All of the above

Ans:D ,D


. An application that executes on separate PCs like this is called a(n) __________ application.
Options: a. enterprise b. distributed c. tier d. global

Ans:6 – b ,6 – b


When was Pascaline invented?
Options: A) 1617 B) 1620 C) 1642 D) 1837

Ans:-C,-C


Which of the following functional components of a computer is responsible for the transient or temporary storage used by the CPU?
Options: Input,    Output,    CPU .,    Memory

Ans:D ,D


After planning an algorithm, you should _____ to verify that it will work correctly.
Options: Analyze the algorithm,    Code the algorithm,    Desk-check the algorithm,    Evaluate and modify (if necessary) the program.

Ans:B ,B


. Basic is ________ language.
Options: A) a procedural B) an object oriented C) both A and B D) none of the above

Ans:A,A


Which selection below best describes the term data processing?
Options: The collection of information or data,    The distribution of information or data,    The manipulation of information or data,    The storage of information or data

Ans:C ,C


Name the two persons who were the first to develop a model of the microprocessor chip.
Options: Marcian Ted Hoff,    Victor Poor,    Harry pyle,    Both (b) and (c)

Ans:D ,D


.   Which of the following statements is not true?
Options: a. Holding down the Shift key while you draw an object creates perfect squares, circles and straight lines b. The text in a text box can’t be formatted c. The drawing toolbar contains tools for drawing shapes, lines, arrows, and more d. Ctrl+S save the document

Ans:8 – B ,8 – B


What is a Firewall in Computer Network?
Options:  The physical boundary of Network B.  An operating System of Computer Network       C.  A system designed to prevent unauthorized access D.  A web browsing Software

Ans:– C ,


Functional subsystems are connected by
Options: resource flows,    decision flows,    information flows,    data flows

Ans:A ,A


You just installed a new IDE hard drive, but your system BIOS will not recognize the new drive, what should you check first.
Options: cable sequence,    jumpers on the hard drive,    drivers that need to be loaded,    hard drive manufacturer web site information

Ans:B ,B


.   Which key deletes text before, or the left of, the insertion point?
Options: a. Backspace b. Page up c. Delete d. Page down

Ans:9 – A ,9 – A


Which option in File pull-down menu is used to close a file in MSWord?
Options: New B. Quit C. Close D. Exit

Ans:– C ,


What specification covers PC hard cards?
Options: SCSI,    ISA,    PCMCIA,    MFM

Ans:C ,C


What are the stages in the compilation process?
Options:  Feasibility study, system design and testing B.  Implementation and documentation C.  Lexical Analysis, syntax analysis, and code generation D.  None of the above

Ans:– C ,


. Selecting text means, selecting?
Options: a word B. an entire sentence C. whole document D. any of the above

Ans: – D ,


Ctrl + H
Options: Open Find and Replace Dialog box with activating Replace Tab B. Open Format Dialog box activating Insert Hyper Link tab C. Open Insert Dialog box activating Insert Hyper Link Tab D. Open Insert Hyper Link Dialog box

Ans:– A ,


The other Col# are inactive when you’ve select 3 columns. How will you activate those boxes?
Options: a. double click on spacing box b. double click on inactive Col# c. Remove mark from Line between checkbox d. Remove mark from Equal Column Width check box

Ans:– D,– D


Compilers and interpreters are themselves
Options: High-level language,    Codes,    Programs,    Mnemonics

Ans:C ,C


A screen element of MS Word that is usually located below the title bar that provides categorized options is
Options: a. Menu mar b. Tool Bar c. Status Bar d. All of the above

Ans:– A,– A


What SQL command can be used to delete columns from a table?
Options: MODIFY TABLE TableName DROP COLUMN ColumnName,    MODIFY TABLE TableName DROP ColumnName,    ALTER TABLE TableName DROP COLUMN ColumnName,    ALTER TABLE TableName DROP ColumnName

Ans:C ,C


Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is
Options: Local area network,    Modem,    Base band networking,    Broad band networking

Ans:D ,D


System Specifications are used to
Options: describe system flows,    get an accurate picture of the system,    avoids ambiguity,    Ail of the above

Ans:D ,D


What will be the output of the program? #include<stdio.h> int fun(int **ptr); int main() { int i=10; const int *ptr = &i; fun(&ptr); return 0; } int fun(int **ptr) { int j = 223; int *temp = &j; printf("Before changing ptr = %5x\n", *ptr); const *ptr = temp; printf("After changing ptr = %5x\n", *ptr); return 0; }
Options: Address of i Address of j,    10 223,    Error: cannot convert parameter 1 from 'const int **' to 'int **',    Garbage value

Ans:C ,C


Which shell's wild-cards is used to match a single character?
Options: *,    ?,    [ijk],    [!ijk]

Ans:B ,B


. Which of the following is a way to access secondary memory?

Options: A) Random access memory B) Action method C) Transfer method D) Density method

Ans:A,A


Which of the following option is use to retrieval of data? a. Stack b. Data Structure c. Linked list d. Query
Options: Every primary-key value must match a primary-key value in an associated table B. Every primary-key value must match a foreign-key value in an associated table C. Every foreign-key value must match a primary-key value in an associated table D. Every foreign-key value must match a foreign-key value in an associated table

Ans:– d ,


To preview a motion path effect using the custom animation task pane, you should
Options: a. click the play button b. click the show effect button c. double click the motion path d. all of above

Ans: – A , – A


Which combination of keys allows you to perform a warm boot?
Options: Ctrl+ESC,    Ctrl+Alt+DEL,    Ctrl+Shift+DEL,    Ctrl+Shift+ENTER

Ans:B ,B


Which of are following internal commands is used in mail to forward mail to user in user-list?
Options: r user-list,    m user-list,    d user-list,    e user-list

Ans:B ,B


Which of the following is an unordered collection of elements that may contain duplicates?
Options: Set,    Bag,    List,    Dictionary

Ans:B ,B


As compared to diskettes, the hard disks are
Options: more expensive,    more portable,    less rigid,    slowly accessed

Ans:A ,A


Which of the following statements are correct about 6 used in the program? int num[6]; num[6]=21;
Options: In the first statement 6 specifies a particular element, whereas in the second statement it specifies a type.,    In the first statement 6 specifies a array size, whereas in the second statement it specifies a particular element of array.,    In the first statement 6 specifies a particular element, whereas in the second statement it specifies a array size.,    In both the statement 6 specifies array size.

Ans:B ,B

www.000webhost.com