Those microcomputers which have the same operating characteristics as the IBM microcomputers are called IBM


Options: duplicates,    clones,    copies,    look alikes

Ans:B,B


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 15941 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Computer Fundamental Related questions:


Which of the following is not true of SQL views?
Options: Oracle views cannot use the ORDER BY clause in view definitions.,    Oracle views are created using the standard SQL-92 CREATE VIEW command.,    Oracle views can by queried.,    The SQL-92 standard does not allow the use of the ORDER BY clause in view definitions.

Ans:A ,A


. Who invented punched cards?

Options: A) Charles Babbage B) Dr. Herman Hollerith C) Howard Aikin D) Joseph Jacquard

Ans:D,D


11. Word, by default, places a tab stop at every _____ mark on the ruler.
Options: a. .25″ b. .5″ c. .75″ d. 1″

Ans:– B ,– B


From which generation operating systems were developed?
Options: A) First B) Second C) Third D) Fourth

Ans:-C,-C


In the Financial Decision-Making System which of the following is not a transaction processing system input:
Options: cash receipts,    cash returns,    cash issues,    warehouse requisition slip

Ans:D ,D


A variable P is called pointer if
Options: a. P contains the address of an element in DATA. b. P points to the address of first element in DATA c. P can store only memory addresses d. P contain the DATA and the address of DATA

Ans:- a,- a


What command is used with file named 'letter' to remove the executable permission from the user and assign read permission to the group and others?
Options: chmod go + x, u - x letter,    chmod g - x, uo + r letter,    chmod go + r, u + x letter,    chmod u - x, go + r letter

Ans:D ,D


Routers operate at layer _____. LAN switches operate at layer _____. Ethernet hubs operate at layer _____. Word processing operates at layer _____.
Options: 3, 3, 1, 7,    3, 2, 1, none,    3, 2, 1, 7,    3, 3, 2, none

Ans:B ,B


. Which of the following is not input unit device?
Options: A) scanner B) camera C) plotter D) digitizer

Ans:C,C


. An IBM system/38 represents the computer class of:
Options: A) Small-scale computer B) Medium-scale computer C) Large-scale computer D) Super computer

Ans:A,A


In SQL, which command(s) is(are) used to redefine an index's future storage allocation
Options: ALTER INDEX,    REDEFINE INDEX,    MODIFY INDEX,    DO INDEX

Ans:A ,A


A register in which of the following that holds the current instruction while it is being executed is called instruction register.
Options: ALU,    CPU,    Memory,    Address

Ans:B ,B


What will be the output of the program? #include<stdio.h> int main() { char huge *near *ptr1; char huge *far *ptr2; char huge *huge *ptr3; printf("%d, %d, %d\n", sizeof(ptr1), sizeof(ptr2), sizeof(ptr3)); return 0; }
Options: 4, 4, 8,    2, 4, 4,    4, 4, 2,    2, 4, 8

Ans:B ,B


SPSS stands for
Options: Statistical Package for Systems Science,    Systems Package for Social Science,    Statistical Package for Sociai Science,    All of the above

Ans:C ,C


Different components on the motherboard of a PC processor unit are linked together by sets of parallel electrical conducting lines. What are these lines called?
Options: Conductors,    Buses,    Connectors,    Connectively

Ans:B ,B


. A character that represents one or more unknown character is
Options: a. Wildcard character b. All file name c. Extensions d. None of above

Ans:1 – a ,1 – a


A heterogeneous distributed database is which of the following?
Options: The same DBMS is used at each location and data are not distributed across all nodes.,    The same DBMS is used at each location and data are distributed across all nodes.,    A different DBMS is used at each location and data are not distributed across all nodes.,    A different DBMS is used at each location and data are distributed across all nodes.

Ans:D ,D


To connect a computer with a device in the same room, you might be likely to use
Options: a coaxial cable,    a dedicated line,    a ground station,    All of the above

Ans:A ,A


Some advantages of the database approach include all, but:
Options: minimal data redundancy.,    improved data consistency.,    improved data sharing.,    program-data dependency.

Ans:D ,D


Which layers of the OSI model are host-to-host layers?
Options: Transport, Session, Persentation, Application B. Network, Transport, Session, Presentation C. Datalink, Network, Transport, Session D. Physical, Datalink, Network, Transport

Ans:– A ,


Computer support to the manager has been least in
Options: alternative identification,    alternative selection,    problem identification,    alternative evaluation

Ans:A ,A


The radian of a number system
Options: Is variable,    Has nothing to do with digit position value,    Equals the number of its distinct counting digits,    Is always an even number

Ans:C,(Canswer


What is the result of adding an IP address to the DNS server search order
Options: It restricts browsing to that DNS server,    It overrides the local systems IP address,    It tells the DNS Server where the local system is located,    It tells the local system where the DNS Server is located

Ans:D ,D


. An Excel Workbook is a collection of …….
Options: a. Workbooks b. Worksheets c. Charts d. Worksheets and Charts

Ans:– d,– d


The computer program language which is widely used in computer science and engineering and also in business is
Options: COBOL,    FORTRAN,    PASCAL,    LISP

Ans:C ,C


. What is gutter margin?
Options: a. Margin that is added to the left margin when printing b. Margin that is added to right margin when printing c. Margin that is added to the binding side of page when printing d. Margin that is added to the outside of the page when printing

Ans:– C,– C


. VGA is
Options: A) Video Graphics Array B) Visual Graphics Array C) Volatile Graphics Array D) Video Graphics Adapter

Ans:A,A


What will be the output of the program (myprog.c) given below if it is executed from the command line? cmd> myprog one two three /* myprog.c */ #include<stdio.h> int main(int argc, char *argv[]) { int i; for(i=1; i<argc; i++) printf("%c", argv[i][0]); return 0; }
Options: oot,    ott,    nwh,    eoe

Ans:B ,B


. A global join will be created automatically when using tables in a(n) _____.
Options: a. form b. report c. query d. field

Ans:1 – b ,1 – b


Which of the following is not one of the three ‘Mail Merge Helper’ steps?
Options: a. merge the two files b. create the main document c. set the mailing list parameters d. create the data source

Ans:– C,– C


The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide?
Options: A logical address that identifies the workstation,    A physical address that is randomly assigned each time the computer is started,    A physical address that is assigned by the manufacturer,    The logical domain address for the workstation

Ans:C ,C


What command is used to assign executable permission to all of the files named "report"?
Options: chmod ugo + x report,    chmod u + x report,    chmod ugo + rw report,    chmod ugo + r report

Ans:A ,A


A computer program that converts an entire program into machine language at one time is called a/an
Options: interpreter,    simulator,    compiler,    commander

Ans:C ,C


. To insert a hyperlink in a slide
Options: a.  Choose Insert >> Hyperlink b.  Press Ctrl + K c.  Hyperlinks can’t be inserted in slides d.  Both a & b

Ans:0 – D ,0 – D


Which of the following is not a requirement of structured design?
Options: It should be made up of a hierarchy of modules,    It should use many GOTO statements,    The code should be executed in a top-to-bottom fashion within each module,    Each module should be as independent as possible of all other modules, except its parent

Ans:B ,B


The command to remove rows from a table 'CUSTOMER' is:
Options: REMOVE FROM CUSTOMER ...,    DROP FROM CUSTOMER ...,    DELETE FROM CUSTOMER WHERE ...,    UPDATE FROM CUSTOMER ...

Ans:C ,C


The computer industry uses prefixes of Greek origin to measure large amounts of data. Which term describes 1024 bytes.
Options: Kilobyte,    Megabyte,    Gigabyte,    Terabyte

Ans:A ,A


When did Hewlett-Packard Inc. Introduce its first HP-110 laptop computer?
Options: 1984,    1986,    1990,    1995

Ans:A,A


. As compared to the secondary memory, the primary memory of a computer is

Options: A) Large B) Cheap C) Fast D) Slow

Ans:C,C


In the Binary numbering system, a (1) represents a jumper being shorted and a (0) represents a jumper being open. On a three-bit jumper block on a SCSI drive, how would an ID of logical 3 be set?
Options: 100,    010,    011,    . 101

Ans:C ,C


Suppose you wanted to create an AutoCorrect entry that would type the words ‘We regret to inform you that your submission has been declined’ Of the following choices, which would be the best name you could assign to this entry?
Options:  A) Regret, B) Subdual, C) We regret to inform you that your submission has been declined, D) 11,

Ans:-B,-B


Information can be transferred between the DBMS and a
Options: a. spreadsheet program b. word processor program c. graphics program d. all of the above

Ans:D,All of the above


Robots can increase productivity because:
Options: they do not take a vacation,    they do not get tired,    production quality is uniform,    All of the above

Ans:D ,D


Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is 255.255.255.224?
Options: Router(config)#ip classless,    Router(config)#no ip classful,    Router(config)#ip unnumbered,    Router(config)#ip subnet-zero

Ans:D ,D


You configure the following access list: access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtp access-list 110 deny tcp any eq 23 int ethernet 0 ip access-group 110 out What will the result of this access list be?
Options: Email and Telnet will be allowed out E0.,    Email and Telnet will be allowed in E0.,    Everything but email and Telnet will be allowed out E0.,    No IP traffic will be allowed out E0.

Ans:D ,D


Which two commands enable you to move between directories?
Options: CD,    CHDIR,    MOVE,    MOVE DIR

Ans:A ,A


Which of the following signs is used to back up over typing errors in vi?
Options: @,    #,    $,    !

Ans:B ,B


. Which tool you will use to join some cells and place the content at the middle of joined cell?
Options: a.  From Format Cells dialog box click on Merge Cells check box b.  From Format Cells dialog box select the Centered alignment c.  From Format Cells dialog box choose Merge and Center check box d.  Click on Merge and Center tool on formatting toolbar

Ans:– d,– d


Most PCs give a single beep on bootup to indicate they are ok hardware wise. You boot your PC and don
Options: system board,    RAM,    speaker,    power supply

Ans:E ,C


Which command displays the configuration register setting?
Options: show ip route,    show boot version,    show version,    show flash

Ans:C ,C

www.000webhost.com