The organization and interconnection of the various components of a computer system is

Options: Architecture,    Networks,    Graphics,    Designing


More Computer Fundamental Related questions:

When referring to instruction words, a mnemonic is:
Options: a short abbreviation for the operand address,    a short abbreviation for the operation to be performed,    a short abbreviation for the data word stored at the operand address,    shorthand for machine language

Ans:B ,B

It is used to calculate and restructure data for easier analysis of your data. It calculates the sum,
Options: a. Parameter b. Select c. crosstab d. Append

Ans:ndash; c,ndash; c

. IBM 1401 computer was
Options: A) Mainframe Computer B) Mini Computers C) Micro Computers D) None of above


Which of the following line spacing is invalid?
Options:  A) Single, B) Double, C) Triple, D) Multiple,


Arthur Samuel is linked inextricably with a program that played:
Options: checkers,    chess,    cricket,    football

Ans:A ,A

DEC advertises that it helped to create "the world's first expert system routinely used in an industrial environment," called XCON or:
Options: PDP-11,    Rl,    VAX,    MAGNOM

Ans:B ,B

Why are vacuum tubes also called valves?
Options: A) Because they can amplify the weak signals and make them strong B) Because they can stop or allow the flow of current C) Both of above D) None of above


. A(n) _______________ query locates data from one or more tables.
Options: a. select b. summary c. parameter d. action

Ans:0 – a ,0 – a

How does a host on an Ethernet LAN know when to transmit after a collision has occurred? In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. You can improve the CSMA/CD network by adding more hubs. After a collision, the station that detected the collision has first priority to resend the lost data. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
Options: 1 and 3,    2 and 4,    1,3 and 4,    2 and 5

Ans:D ,D

You are connecting your access point and it is set to root. What does Extended Service Set ID mean?
Options: That you have more than one access point and they are in the same SSID connected by a distribution system.,    That you have more than one access point and they are in separate SSIDs connected by a distribution system.,    That you have multiple access points, but they are placed physically in different buildings.,    That you have multiple access points, but one is a repeater access point.

Ans:A ,A

. Which command is used to copy system files?
Options: a. Sys b. Command c. MD d. Move

Ans:9 – a ,9 – a

Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as
Options: Amplitude-shift keying,    Amplitude,    Amplitude modulation,    Aloha

Ans:A ,A

. A name or number used to identify a storage location is called
Options: A) A byte B) A record C) An address D) All of above


. Which American computer company is called Big Blue?
Options: A) Microsoft B) Compaq Corp C) IBM D) Tandy Svenson


The chunks of a memory are known as
Options: Sector B. Offset C. Page D. Frame

Ans:– D ,

A path by which communication is achieved between a central processor and other devices is called
Options: Audit trail,    Network,    Bus,    Channel

Ans:C ,C

Data base preparation would be most difficult in a(n)
Options: college or university,    supermarket,    hospital,    bank

Ans:D ,D

Most continuous control actuators:
Options: are of the time proportioning type,    use a 4 to 20 mA current loop input,    are used with standard continuous control loop,    (b) and (c) above

Ans:D ,D

The DROP TABLE statement:
Options: deletes the table structure only.,    deletes the table structure along with the table data.,    works whether or not referential integrity constraints would be violated.,    is not an SQL statement.

Ans:B ,B

Which of the following is the coding of data so that is can't be easily understood if intercepted.
Options: Barcode,    Decoder,    Encryption,    Mnemonics

Ans:C ,C

X.21 is
Options: a method of determining which device has access to the transmission medium at any time,    a method access control technique for multiple-access transmission media,    a very common bit-oriented data link protocol issued by ISO,    network access standard for connecting stations to a circuit-switched network

Ans:D ,D

If an Ethernet port on a router were assigned an IP address of, what would be the valid subnet address of this host?

Ans:A ,A

Microprocessors as switching devices are for which generation computers
Options: A) First Generation B) Second Generation C) Third Generation D) Fourth Generation


Which one of the following phrases best describes residual magnetism?
Options: Magnetism that remains in the core of an electromagnet after the current through the coil is turned off,    The force of attraction between the poles of a permanent and temporary magnetic field,    The amount of magnetic flux that is not confined to the core material of an electromagnet,    The circular magnetic field that surrounds a conductor carrying a current

Ans:A ,A

Thesaurus tool in MS Word is used for
Options:  A) Spelling suggestions, B) Grammar options, C) Synonyms and Antonyms words, D) All of above,


What command is used to hang up a MODEM when using the "AT Command set"?
Options: ATZ,    ATD,    ATR,    ATH

Ans:D ,D

.   You can add multiple subordinates to a position by
Options: a. Clicking the subordinate button as you press and hold shift b. Clicking the subordinate button each and every time you add a subordinate c. Clicking the subordinate button as many times as the desired boxes d. All of above

Ans:4 – D ,4 – D

Which of the following tool allows you to change your default X Window desktop?
Options: switchdesk,    intrc,    xinitre,    Xchange

Ans:A ,A

A critical region is
Options: a program segment that has not been proved bug-free,    a program segment that often causes unexpected system crashes,    a program segment where shared resources are accessed,    one which is enclosed by a pair of P and V operations on semaphores

Ans:D ,D

. Which of the following database objects can have more than one Group Header/Footer section?
Options: a. Forms b. Queries c. Reports d. Tables

Ans:7 – c ,7 – c

. Which command is used to see the version of operating system?
Options: a. Vol b. Version c. Ver d. None of the above

Ans: c, c

. How many characters can be entered in a single command line?
Options: a. 64 b. 127 c. 80 d. 90

Ans:6 – b ,6 – b

When assessing the table structure of an acquired set of tables with data, determining foreign keys is (part of) the:
Options: first step.,    second step.,    third step.,    fourth step.

Ans:B ,B

Personnel Administration Data systems, personnel planning data systems and the payroll system all
Options: calculate payroll deductions,    update the accounts payable file,    access the inventory file,    Ail of the above

Ans:E ,E

ODL supports which of the following types of association relationships?
Options: Unary,    Unary and Binary,    Unary and Binary and Ternary,    Unary and Binary and Ternary and higher

Ans:B ,B

. What is the function of an operating system?
Options: a. Manages computer’s resources very efficiently b. Takes care of scheduling jobs for execution c. Manages the flow of data and instructions d. All of the above

Ans:3 – d ,3 – d

An electrical inter-connection that permit 8 or more bits of data to be moved in the same instant of time is called
Options: Outline processor,    Parallel interface,    Page layout program,    Fasimile system

Ans:B ,B

Portrait and Landscape are
Options:  A) Page Orientation, B) Paper Size, C) Page Layout, D) All of above, 


The ability to combine name and addresses with a standard document is called _________ 
Options: a. document formatting b. database management c. mail merge d. form letters

Ans:–  C,–  C

Internet-like networks between a company and its business partners. Select the best fit for answer:
Options: Bandwidth alternatives,    Switching alternating,    Inter organizational networks,    Extranets

Ans:D ,D

. What does Belady’s Anomaly related to?
Options: a. Page Replacement Algorithm b. Memory Management Algorithm c. Deadlock Prevention Algorithm d. Disk Scheduling Algorithm

Ans:6 – a ,6 – a

. Which of the following is not an XT microprocessor?
Options: A) 8006 B) 8086 C) 8088 D) None of above


. Worksheet can be renamed by 
Options: a. Adding ? symbol at the end of filename while saving workbook b. Click on Worksheet tab by Holding CTRL Key and type new name c. Double Click on the Worksheet tab and type new name d. Worksheet cannot renamed

Ans:– c,– c

Which symbol is used to separate more than one command in the same command line?
Options: $,    #,    :,    ;

Ans:D ,D

While working with MS-DOS, which command is used to move file from one directory to another?
Options: RENAME,    COPY,    MOVE,    CP

Ans:C ,C

The complexity of linear search algorithm is
Options: A)O(n) b.O(log n) c.O(n2) d.O(n log n)


Which three commands can be used to check LAN connectivity problems on a router? show interfaces show ip route tracert ping dns lookups
Options: 1 ,2 and 4,    2 and 5,    3 and 5,    None of the above

Ans:A ,A

. How should you print a selected area of a worksheet, if you’ll want to print a different area next time?
Options: a. On the file menu, point to print area, and then click set print area. b. On the file menu, click print, and then click selection under print what c. On the view menu, click custom views, then click add d. All of above

Ans:– b,– b

If you want to keep track of different editions of a document which features will you use?
Options:  A) Editions, B) Versions, C) Track Change, D) All of above, 


. Which of the following generation computers had expensive operation cost?
Options: A) First B) Second C) Third D) Fourth