The transistorized computer circuits were introduced in the


Options: First generation,    Second generation,    Third generation,    Fourth generation

Ans:B,B


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 8145 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Computer Fundamental Related questions:


Which command below will instruct DOS to do a "quick format".
Options: FORMAT A: /QUICK,    FORMAT A: /Q,    FORMAT A: /QU,    FORMAT A: /QF

Ans:B ,B


. Which of the following is correct regarding Underline in MS-Word?
Options: a. Color of Underline can be change b. Style of Underline can be change c. Underline can be set using by shortcut key d. All of the above

Ans: –  D , –  D


How can you disable extended selection mode?
Options:  A) Press F8 again to disable, B) Press Del to disable, C) Press Esc to disable, D) Press Enter to disable,

Ans:-C,-C


Which of the following commands is used to copy a file wb from the programs directory into a file called wbx in the misc directory?
Options: copy programs/wb misc/wbx,    cp programs/wb misc/wbx,    tar programs/wb misc/wbx,    copy a:programs/wb b:misc/wbx

Ans:B ,B


A primary use of decision support system (DSS) is to simulate an experiment over by using different parameters and assumptions. What is it called?
Options: Artificial intelligence,    What if analysis,    Exception report,    Computer assisted experimenting

Ans:D ,D


Which command is used with file named 'note' to remove the executable permission from the user and assign read permission to the group and others?
Options: chmod u-x, go+r note,    chmod go+r, u+x note,    chmod g-x, uo+r note,    chmod go+x, u-x note

Ans:A ,A


A family of polynomial block codes designed to correct burst errors is known as
Options: Bar codes,    Gray codes,    Fire codes,    mnemonics codes

Ans:C ,C


The study project proposal
Options: estimates the effect the MIS will have on company profits,    estimate the costs of studying the feasibility of an MIS in detail,    both (a) and (b),    neither (a) nor (b)

Ans:C ,C


Inheritance is which of the following?
Options: When a supertype entity inherits values of the subtype attribute,    When a subtype entity inherits values of the supertype attribute,    When a supertype entity inherits values of another supertype attribute,    When a subtype entity inherits values of another subtype attribute

Ans:B ,B


The "F" in RFM analysis stands for ________ .
Options: frequently,    freshness,    fast food,    fantasy

Ans:A ,A


A rectangle represents which of the following in an EER?
Options: Attribute,    Entity,    Optional One,    Relationship

Ans:B ,B


. Which of the following command is an internal command?
Options: a. Del b. Scandisk c. CHKDSK d. Deltree

Ans:0 – a ,0 – a


Bug means
Options: A logical error in a program,    A difficult syntax error in a program,    Documenting programs using an efficient documentation tool,    All of the above

Ans:A ,A


Producer consumer problem can be solved using
Options: semaphores,    event counters,    monitors,    all of the above

Ans:D ,D


Does there any function exist to convert the int or float to a string?
Options: Yes,    No,    ,    

Ans:A ,A


.   Which of the following is not one of PowerPoint’s views?
Options: a. Slide show view b. Slide view c. Presentation view d. Outline view

Ans:7 – C ,7 – C


Point out the error in the program? typedef struct data mystruct; struct data { int x; mystruct *b; };
Options: Error: in structure declaration,    Linker Error,    No Error,    None of above

Ans:C ,C


Which of the following are often used to ensure that data has been accurately input to the computer?
Options: digitizers,    light pens,    keyboards,    input controls

Ans:D ,D


When you copy a formula
Options: a. Excel erases the original copy of the formula b. Excel edits cell references in the newly copied formula c. Excel adjusts absolute cell references d. Excel doesn’t adjust relative cell references

Ans:#8211; b,#8211; b


ow to remove all character formats?
Options: Shift + Spacebar B. Shift + Enter C. Ctrl + Spacebar D. Ctrl + Enter

Ans:– C ,


Which of the following correctly shows the hierarchy of arithmetic operations in C?
Options: / + * -,    * - / +,    + - / *,    / * + -

Ans:D ,D


Which is the most widely used semiconductor?
Options: Copper,    Silicon,    Germanium,    All of the above

Ans:B ,B


The process of writing computer instructions in a programming language is known as
Options: Coding,    Processing,    Programming,    File

Ans:A ,A


. An IBM system/38 represents the computer class of:
Options: A) Small-scale computer B) Medium-scale computer C) Large-scale computer D) Super computer

Ans:A,A


Which of the following TCP/IP protocol is used for transferring files from one machine to another?
Options: RARP,    ARP,    TCP,    FTP

Ans:D ,D


What is the language used by most of the DBMSs for helping their users to access data?
Options: a. High level language b. SQL c. Query Language d. 4GL

Ans:. c ,. c


The fact that the same operation may apply to two or more classes is called what?
Options: Inheritance,    Polymorphism,    Encapsulation,    Multiple classification

Ans:B ,B


. The maximum size of a write file is limited to only
Options: a. Name of the file b. Extension of the file c. The amount of memory in your computer d. All of above

Ans: c, c


In ODBC, a data source that is local to a single computer is called a:
Options: system data source.,    file data source.,    user data source.,    SQL text file.

Ans:A ,A


The Turnaround is
Options: the elapsed time between the receipt of the input and the availability of the output,    a group of related fields,    the key information of programming,    a program statement that violates one or more rules of the language in which it is written

Ans:A ,A


. The OS used to operate the mobile phone is a
Options: a. Smart card OS b. Embedded OS c. Multiuser OS d. None of above

Ans:1 – b ,1 – b


The engineering change control system makes changes in the
Options: operations file,    production schedule,    work force data,    All of the above

Ans:A ,A


Piece of code that only one thread can execute at a time is called
Options: Mutual Exclusion B. Critical Section C. Synchronization D. All of them

Ans:– B ,


Which of the following is used to insure the high quality of computer output?
Options: computer output microfilm,    output controls,    voice output systems,    liquid crystal display

Ans:B,B


A systems theory of organization sees the firm as a
Options: network of resource flows,    system transforming inputs into outputs,    physical system managed by a manager using a conceptual system,    All of the above

Ans:D ,D


In simplex transmission
Options: Data format is simple,    Data transmission is one way,    Data can be transmitted to small distances only,    All of the above

Ans:B,B


Which of the following is an advantage of using an expert system development tool?
Options: imposed structure,    knowledge engineering assistance,    rapid prototyping,    All of the above

Ans:D ,D


. The key F12 opens a
Options: a. Save As dialog box b. Open dialog box c. Save dialog box d. Close dialog box

Ans:– A,– A


. The first microprocessor built by the Intel corporation was called
Options: A) 8008 B) 8080 C) 4004 D) 8800

Ans:C,C


  Power Point presentation is a collection of ________
Options: Slides and Handouts B. Speaker’s notes C. Outlines D. All of the above

Ans:– D ,


If both inputs of an S-R NAND latch are LOW, what will happen to the output?
Options: The output would become unpredictable.,    The output will toggle.,    The output will reset.,    No change will occur in the output.

Ans:A ,A


The function(s) performed by the paging software is (are)
Options: Implementation of the access environment for all programs in the system,    Management of the physical address space,    Sharing and protection,    All of the above

Ans:D ,D


Which command is used to display the top of the file?
Options: cat,    head,    more,    grep

Ans:B ,B


You have a network ID of 134.57.0.0 with 8 subnets. You need to allow the largest possible number of host IDs per subnet. Which subnet mask should you assign?
Options: 255.255.224.0,    255.255.240.0,    255.255.248.0,    255.255.252.0

Ans:B ,B


. To instruct Word to stop bulleting paragraphs, do any of the following except _____.
Options: a. press the enter key twice b. click the Undo button on the Standard toolbar c. press the backspace key to remove the bullet d. click the Bullets button on the Formatting toolbar

Ans:– B,– B


What is the impedance of a circuit composed of a 100 ohm resistor connected in parallel with a capacitor that has a reactance of 100 ohm?
Options: 60 Ohm,    99.3 Ohm,    250 Ohm,    70.7Ohm

Ans:D ,D


.   A chart can be put as a part of the presentation using
Options: a. Insert -> Chart b. Insert -> Pictures -> Chart c. Edit -> Chart d. View -> Chart

Ans:9 – B ,9 – B


Your switch has a port status LED that is alternating between green and amber. What could this indicate?
Options: The port is experiencing errors.,    The port is shut down.,    The port is in STP blocking mode.,    Nothing; this is normal.

Ans:A ,A


A model in which one physical property is used to represent another physical property is known as:
Options: analog model,    deterministic model,    iconic model,    decision theory model

Ans:A ,A


The basic operations performed by a computer are
Options: A) Arithmetic operation B) Logical operation C) Storage and relative D) All the above

Ans:D,D

www.000webhost.com