The 2's complement of a binary no. is obtained by adding.....to its 1's complement.


Options: 0 ,    1,    10,    12

Ans:B,(Banswer


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 9494 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


Programs designed to perform specific tasks is called known as
Options: System software,    Application software,    Utility programs,    Operating system

Ans:B,B


One popular classification technique in Business Intelligence (BI) reporting is ________ .
Options: cluster analysis only,    regression analysis only,    RFM analysis only,    both cluster analysis and regression analysis

Ans:C ,C


. which of the following is problem oriented language?
Options: A) High level language B) Machine language C) Assembly language D) Low level language

Ans:A,A


. The operating system allows the user to organize the computer’s contents in a hierarchical structure of directories that include all of the following except:
Options: a. Files b. Folders c. Drives d. System

Ans:0 – d ,0 – d


What does COUNTA () function do?
Options: counts cells having alphabets B. counts empty cells C. counts cells having number D. counts non-empty cells

Ans:– D ,


. Hard disk is coated in both side with
Options: A) Magnetic metallic oxide B) Optical metallic oxide C) Carbon layer D) All of the above

Ans:5-A,5-A


What is the size of a sector?
Options: 512 bytes,    256 bytes,    512 Kb,    1024 bytes

Ans:A ,A


You configure the following access list: access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtp access-list 110 deny tcp any eq 23 int ethernet 0 ip access-group 110 out What will the result of this access list be?
Options: Email and Telnet will be allowed out E0.,    Email and Telnet will be allowed in E0.,    Everything but email and Telnet will be allowed out E0.,    No IP traffic will be allowed out E0.

Ans:D ,D


. When typing in Preeti font all the Ukars turn to something else? What’s the cause?
Options: a. Autotext b. Autocorrect c. Speller d. Preeti font does not work with Word

Ans:– B,– B


Which is true for the digital computer?
Options: It is less accurate than the analog computer,    It represents the decimal numbers through a string of binary digits,    It is used primarily in scientific applications,    Both (a) and (c)

Ans:B ,B


. What do you mean by a Workspace?
Options: a. Group of Columns b. Group of Worksheets c. Group of Rows d. Group of Workbooks

Ans:– d,– d


.Which of the following data structure is linear data structure?
Options: A)Trees b.Graphs c.Arrays d.None of above

Ans:C,C


Which of the following statements is true concerning subqueries?
Options: Involves the use of an inner and outer query.,    Cannot return the same result as a query that is not a subquery.,    Does not start with the word SELECT.,    All of the above.

Ans:A ,A


Which column contains all details of the permissions of a file when you issue the ls -l command?
Options: second,    fourth,    third,    first

Ans:D ,D


Which of the following is still useful for adding numbers?
Options: EDSAC,    ENIAC,    Abacus,    UNIVAC

Ans:C ,C


A devices that links two homogeneous packet-broadcast local networks, is
Options: hub,    bridge,    repeater,    gateway

Ans:B ,B


In magnetic disks, data is organized on the platter in a concentric sets of rings called
Options: sector,    track,    head,    block

Ans:B,B


How many NAND circuits are contained in a 7400 NAND IC?
Options: 1,    2,    4,    8

Ans:C ,C


. What should be the first step while OS upgrading?
Options: a. Delete old Operating System b. Backup old Operating System c. Backup Critical Data d. Format Hard Disks

Ans:1 – c ,1 – c


The terminal device that functions as a cash register, computer terminal, and OCR reader is the:
Options: Data collection terminal,    OCR register terminal,    Video display terminal,    POS terminal

Ans:D,D


Probabilities range from
Options: .00 to .1,    .00 to 1.00,    00 to 100,    All of the above

Ans:B ,B


A circuit has two different voltage sources that are connected in a series-aiding form. If the sources are rated at 6 V and 9 V, what is the total source voltage?
Options: 15 V,    16 V,    7.5 V,    8 V

Ans:A ,A


In SQL, which command is used to select only one copy of each set of duplicable rows
Options: SELECT DISTINCT,    SELECT UNIQUE,    SELECT DIFFERENT,    All of the above

Ans:A ,A


Which of the following is part of an administrative policy to secure a database?
Options: Authentication policies,    Limiting particular areas within a building to only authorized people,    Ensure appropriate responses rates are in external maintenance agreements,    All of the above.

Ans:D ,D


Which of the following is not a transmission medium?
Options: telephone lines,    coaxial cable,    modem,    microwave systems

Ans:C ,C


SQL*Plus will finish the statement and execute it when the user types in this:
Options: A left slash ( \ ) followed by [Enter].,    A colon ( : ) followed by [Enter].,    A semicolon ( ; ) followed by [Enter].,    A period ( . ) followed by [Enter].

Ans:C ,C


Which memory system is not as a mass memory medium?
Options: semiconductor memory,    magnetic tape,    magnetic disk,    magnetic drum

Ans:A ,A


Which of the following is not a communication command.
Options: write,    mesg,    mail,    grep

Ans:D ,D


How many copies of a JSP page can be in memory at a time?
Options: One,    Two,    Three,    Unlimited

Ans:A ,A


Data Manipulation Language enables users to
Options: Retrieval of information stored in database B. Insertion of new information into the database C. Deletion of information from the database D. All of the above

Ans:– D ,


Which of the following database object produces the final result to present?
Options: a. Forms b. Reports c. Queries d. Tables

Ans:ndash; b,ndash; b


You have two switches connected together with two crossover cables for redundancy, and STP is disabled. Which of the following will happen between the switches?
Options: The routing tables on the switches will not update.,    The MAC forward/filter table will not update on the switch.,    Broadcast storms will occur on the switched network.,    The switches will automatically load-balance between the two links.

Ans:C ,C


. To access properties of an object, the mouse technique to use is __________.
Options: a. dragging b. dropping c. right-clicking d. shift-clicking

Ans:6 – c ,6 – c


Which statement(s) about IPv6 addresses are true? Leading zeros are required. Two colons (::) are used to represent successive hexadecimal fields of zeros. Two colons (::) are used to separate fields. A single interface will have multiple IPv6 addresses of different types.
Options: 1 and 3,    2 and 4,    1, 3 and 4,    All of the above

Ans:B ,B


. Each excel file is called a workbook because
Options: a. It can contain text and data b. It can be modified c. It can contain many sheets including worksheets and chart sheets d. You have to work hard to create it

Ans:– c,– c


. What’s the best place to find animated images for your PowerPoint 2002 presentation?
Options: a. Microsoft online b. Word clipart c. PowerPoint tools and ins d. All of the above

Ans:0 – B ,0 – B


. Using the keyword _______________ will return records in which the field value equals a defined text.
Options: a. Between b. Is Null c. Like d. Not

Ans:3 – c ,3 – c


When was punched-card equipment used for the first time to process the British census?
Options: 1910,    1907,    1911,    1914

Ans:C ,C


Which type of processing that produces output results immediately after input data are entered into a computer system
Options: Time-sharing,    Interactive,    Batch processing,    Real-time processing

Ans:B ,B


What expansion types do most pll/plll motherboards support?
Options: MCA, PCI,    ISA, EISA,    ISA, PCI, AGP,    ISA, VESA, PCI

Ans:C ,C


Suppose that you have a customer who has a central HQ and six branch offices. They anticipate adding six more branches in the near future. They wish to implement a WAN technology that will allow the branches to economically connect to HQ and you have no free ports on the HQ router. Which of the following would you recommend?
Options: PPP,    HDLC,    Frame Relay,    ISDN

Ans:C ,C


A single bus structure is primarily found in
Options: Main frames,    Super computers,    High performance machines,    Mini-and micro-computers

Ans:D,D


. Primary key is
Options: a. Uniquely identifies each record b. Cannot be repeated c. AutoNumber is example of Primary key d. All of the above

Ans:– d,– d


An audio transformer has a turn ratio of 9, What is its impedance ratio?
Options: 81,    85,    6,    9

Ans:A ,A


What are the stages in the compilation process?
Options:  Feasibility study, system design and testing B.  Implementation and documentation C.  Lexical Analysis, syntax analysis, and code generation D.  None of the above

Ans:– C ,


Which memory allocation policy allocate the largest hole to the process?
Options: Best-Fit B. Worst-Fit C. First-Fit D. None of them

Ans:– B ,


Which of the following is a wrong example of network layer:
Options: Internet Protocol (IP) ARPANET,    X. 25 Packet Level Protocol (PLP) - ISO,    Source routing and Domain naming - Usenet,    X.25 level 2 - ISO

Ans:D ,D


Which 32-bit microprocessor is used in IBM's PS/2 model-80 computer?
Options: 8088,    80286,    80386,    80486

Ans:C,C


What is to be use to add text in Slide?
Options: Text Box B. Note Box C. Text Layer D. Comment Box

Ans:– A ,


Which of the following helps to reduce spelling error in the document?
Options: Auto Format B. Auto Correct C. Smart Tags D. Auto Text

Ans:– B ,

www.000webhost.com