The symbols used in an assembly language are

Options: Codes,    Mnemonics,    Assembler,    All of the above


More Computer Fundamental Related questions:

Nepal brought a computer for census of 2028 BS. This computer was of
Options: A) first generation B) second generation C) third generation D) fourth generation


Options: synchronize critical resources to prevent deadlock,    synchronize critical resources to prevent contention,    are used to do I/O,    are used for memory management

Ans:A ,A

. Which of the following views is used to graphically summarize and analyze data in a recordset?
Options: a. Datasheet b. Form c. PivotChart d. PivotTable

Ans:9 – c ,9 – c

A server cannot serve on which of the following levels?
Options: Client Layer,    Business Layer,    Database Layer,    All of the above.

Ans:A ,A

Which of the following is true concerning personal computers?
Options: They decrease the demand for mainframe computers,    They have been most successful in the home,    The electronic spreadsheet has been a primary reason for their popularity,    Their future is not so bright owning to the improved cost-performance ratio of minis and mainframes

Ans:C ,C

If the base supply voltage increases, the Q point moves
Options: down,    up,    nowhere,    off the load line

Ans:A ,A

Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size?
Options: 4,    8,    15,    16

Ans:C ,C

Actuators are used to:
Options: sense an object,    activate a chemical,    make a mechanical movement,    All of the above

Ans:C ,C

. Unicode standard is
Options: a. Keyboard layout b. Software c. Font d. Character encoding system

Ans:5 – d ,5 – d

Which command is used to remove the read permission of the file 'note' from both the group and others?
Options: chmod go+r note,    chmod go+rw note,    chmod go-x note,    chmod go-r note

Ans:D ,D

Which functional component of a computer is responsible for the computing?
Options: Input,    Output,    CPU,    Memory

Ans:C ,C

Sending data from one place to another, by physical or electronic means is
Options: E-mail,    Internet,    Data transmission,    Distributed processing.

Ans:C ,C

. Edit >> Delete command
Options: a.  Deletes the content of a cell b.  Deletes Formats of cell c.  Deletes the comment of cell d.  Deletes selected cells

Ans:– d,– d

. A name or number used to identify a storage location is called
Options: A) A byte B) A record C) An address D) All of above


Which of the following network types have a designated router and a backup designated router assigned? Broadcast Point-to-point NBMA NBMA point-to-point
Options: 1, 2 and 3,    1 and 3,    3 and 4,    All of the above

Ans:B ,B

An optical input device that interprets pencil marks on paper media is
Options: O.M.R,    Punch card reader,    Optical scanners,    Magnetic tape


Pictographs, called _____ help systems to be more user friendly.
Options: people,    icons,    information system,    on-line

Ans:B ,B

ART (Automatic Reasoning Tool) is designed to be used on:
Options: LISP machines,    personal computers,    microcomputers,    All of the above

Ans:A ,A

A transitive dependency is which of the following?
Options: A functional dependency between two or more key attributes.,    A functional dependency between two or more nonkey attributes.,    A relation that is in first normal form.,    A relation that is in second normal form.

Ans:B ,B

99. How can you access the font size tool on formatting toolbar?
Options: a. Ctrl + S b. Ctrl + Shift + S c. Ctrl + P d. Ctrl + Shift + P

Ans:– D ,– D

What are the different types of real data type in C ?
Options: float, double,    short int, double, long int,    float, double, long double,    double, long int, float

Ans:C ,C

Where can you find the horizontal split bar on MS Word screen?
Options: a. On the left of horizontal scroll bar b. On the right of horizontal scroll bar c. On the top of vertical scroll bar d. On the bottom of vertical scroll bar

Ans:– C,– C

The technique, for sharing the time of a computer among several jobs. Which switches jobs so rapidly such that each job appears to have the computer to itself:
Options: time sharing,    time out,    time domain,    FIFO

Ans:A ,A

"The three most important inventions of this century are the nuclear bomb, the high yield hybrid speed, and the computer". Can you name the person who made this statement?
Options: Harry R Jordan,    Buckminster Fuller,    Jack Smith,    Jan Timmer

Ans:B ,B

. When you open my computer on desktop you see the information of
Options: a. Hard disk b. CD c. Removable disk d. All of the above

Ans:0 – d ,0 – d

A part of database that stores only  one type of data is
Options: a. Report b. Field c. Query d. Record

Ans:ndash; b,ndash; b

. What does Belady’s Anomaly related to?
Options: a. Page Replacement Algorithm b. Memory Management Algorithm c. Deadlock Prevention Algorithm d. Disk Scheduling Algorithm

Ans:6 – a ,6 – a

Which utility is useful for finding the local host name?
Options: NBTSTAT,    Netstat,    PING,    Hostname

Ans:D ,D

Which of the following usually receives formal education on their role in the MIS
Options: government,    stockholders,    both (a) and (b),    neither (a) nor (b)

Ans:D ,D

An electronic circuit with about 20 transistors fabricated on a silicon chip is known as
Options: SSI,    MSI,    DPS,    RJE

Ans:A ,A

Which files will get closed through the fclose() in the following program? #include<stdio.h> int main() { FILE *fs, *ft, *fp; fp = fopen("A.C", "r"); fs = fopen("B.C", "r"); ft = fopen("C.C", "r"); fclose(fp, fs, ft); return 0; }
Options: "A.C" "B.C" "C.C",    "B.C" "C.C",    "A.C",    Error in fclose()

Ans:D ,D

Which of the following statement is correct?
Options: Buffering is the process of temporarily storing the data to allow for small variation in device speeds,    Buffering is a method to reduce cross-talks,    Buffering is a method to reduce the routing overhead,    Buffering is storage of data within the transmitting medium until the receiver is ready to receive

Ans:A ,A

    Which of the following extensions suggest that the file is a backup copy
Options: a.    Bak b.    Bas c.    Com d.    Txt

Ans:.a,Correct Answer: a. Bak

A data dictionary is a special file that contains
Options: the names of all fields in all files,    the data types of all fields in all files,    the widths of all fields in all files,    All of the above

Ans:D ,D

The branch logic that provides decision making capabilities in the control unit is known as
Options: a . controlled transfer b . conditional transfer c . unconditional transfer d . none of above


One of the following is not considered a method of input control in a CAD system.
Options: Joystick,    Programmable function box,    Plotter,    Touch terminal

Ans:C ,C

. Linux isa(n) ... operating system
Options: a. Open source b. Microsoft c. Windows d. Mac

Ans: a, a

A couple:
Options: is a data item that moves from one module to another,    is represented by a line joining two modules,    means that the upper module has the capability of calling the lower module,    none of the above

Ans:A ,A

The selection of the solution technique to the implemented by a computing system should be made by
Options: an operations research expert,    a computer programmer,    system analysts,    a computing system user

Ans:D ,D

. List Box and Text box
Options: a.  Are some other than that in a list box the bullets are enabled b.  Are different. List boxes are used to present lists and can’t be created with text boxes. c.  Both of above d.  None of above

Ans:1 – A ,1 – A

Which of the following method can insert a new slide in current presentation?
Options: a. Right click on the Slide panel and choose New Slide b. From Insert menu choose New Slide c. Click on New Slide button on toolbar d. All of above

Ans: – D , – D

Business Intelligence (BI) reporting analyses can be performed using ________ .
Options: standard SQL only,    extensions to SQL only,    OLAP only,    both standard SQL and extensions to SQL

Ans:A ,A

What will be the output of the program ? #include<stdio.h> int main() { static int a[2][2] = {1, 2, 3, 4}; int i, j; static int *p[] = {(int*)a, (int*)a+1, (int*)a+2}; for(i=0; i<2; i++) { for(j=0; j<2; j++) { printf("%d, %d, %d, %d\n", *(*(p+i)+j), *(*(j+p)+i), *(*(i+p)+j), *(*(p+j)+i)); } } return 0; }
Options: 1, 1, 1, 1 2, 3, 2, 3 3, 2, 3, 2 4, 4, 4, 4,    1, 2, 1, 2 2, 3, 2, 3 3, 4, 3, 4 4, 2, 4, 2,    1, 1, 1, 1 2, 2, 2, 2 2, 2, 2, 2 3, 3, 3, 3,    1, 2, 3, 4 2, 3, 4, 1 3, 4, 1, 2 4, 1, 2, 3

Ans:C ,C

. To show/hide the grid lines in Microsoft Excel 2007
Options: a. Page Layout -> Grid lines -> View b. Insert -> Grid lines -> View c. View -> Grid lines -> View d. Edit -> Grid lines -> View

Ans:– a,– a

A dialog box with a bomb appears oh a Macintosh screen. What type of problem has occurred?
Options: A RAM problem,    A software problem,    A ROM problem,    An ADB problem

Ans:B ,B

. Which computers used operating systems by Microsoft?
Options: A) IBM PCs B) Apple/Macintosh PCs C) IBM Compatibles D) Both A & C


Which three commands can be used to check LAN connectivity problems on a router? show interfaces show ip route tracert ping dns lookups
Options: 1 ,2 and 4,    2 and 5,    3 and 5,    None of the above

Ans:A ,A

4. Which command is used to provide access to files located in other directories or disks?
Options: a. Tree b. Path c. Dir d. Cd

Ans:Correct Answer: b ,Correct Answer: b

The ALU and control unit of most of the microcomputers are combined and manufactured on a single silicon chip. What is it called?
Options: Monochip,    Microprocessor,    ALU,    Control Unit

Ans:B ,B

A good business rule is which of the following?
Options: Declarative,    Imprecise,    Redundant,    Compound

Ans:A ,A