What does DMA stand for?


Options: Distinct Memory Access B. Direct Memory Access C. Direct Module Access D. Direct Memory Allocation

Ans:– B ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 18193 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


A computer program that converts assembly language to machine language is
Options: Compiler,    Interpreter,    Assembler,    Comparator

Ans:C ,C


Top-down programming is
Options: a group of related fields,    a map of the programmer's view of the data,    an approach in which the top module is first tested then program modules are added from the highest level to the lowest level,    a series or group of components that perform one or more operations of a more complex system

Ans:C ,C


. You can activate a cell by
Options: a. Pressing the Tab key b. Clicking the cell c. Pressing an arrow key d. All of above

Ans:– d,– d


Which of the following items would require you t.o comply with EPA disposal guidelines?
Options: Keyboard,    System board,    Power supply,    Battery

Ans:D ,D


System programs such as Compilers are designed so that they are
Options: reenterable,    non reusable,    serially usable,    recursive

Ans:A ,A


_____ use standardized symbols to represent an algorithm.
Options: Flowcharts,    Flow diagrams,    IPO charts,    Pseudocharts

Ans:A ,A


The ALU of a computer responds to the commands coming from
Options: primary memory,    control section,    external memory,    cache memory

Ans:B,B


Which type of processing that produces output results immediately after input data are entered into a computer system
Options: Time-sharing,    Interactive,    Batch processing,    Real-time processing

Ans:B ,B


. … controls the way in which the computer system functions and provides a means by which users can interact with the computer
Options: a. The platform b. The operating system c. Application software d. The motherboard

Ans:1 – b ,1 – b


A language which is close to that used within the computer is
Options: High-level language,    Assembly language,    Low-level language,    All of the above

Ans:C ,C


Sometime data are gathered over a period of time and collected into a group before entering them into a computer for processing. What type of processing is it called?
Options: Interactive processing,    Sequential processing,    Batch processing,    Group processing

Ans:A ,A


. The _____, or typeface, defines the appearance and shape of letters, numbers, and special characters.
Options: a. font b. font size c. point d. paragraph formatting

Ans:– A,– A


In Inkjet technology the droplets of ink are deflected by?
Options: multi directional nozzles,    electronically charged plates,    high pressure plates,    electro static absorbtion

Ans:A ,A


How will you free the memory allocated by the following program? #include<stdio.h> #include<stdlib.h> #define MAXROW 3 #define MAXCOL 4 int main() { int **p, i, j; p = (int **) malloc(MAXROW * sizeof(int*)); return 0; }
Options: memfree(int p);,    dealloc(p);,    malloc(p, 0);,    free(p);

Ans:D ,D


. Except for the …… function, a formula with a logical function shows the word “TRUE” or “FALSE” as a result
Options: a. IF b. AND c. OR d. NOT

Ans:– a,– a


When you create a subdirectory within a directory, the process is known as _____
Options: directing,    making,    backing,    nesting

Ans:D ,D


Which of the following is considered to be the destination host before translation?
Options: Inside local,    Outside local,    Inside global,    Outside global

Ans:B ,B


Pick the correct choice for the 8088 CPU.
Options: 16 bit word size, 8 bit data path,    8 bit word size, 8 bit data path,    16 bit word size, 16 bit data path,    4 bit word size, 8 bit data path

Ans:A ,A


Bandlimited signal is
Options: transmission of signals without modulation,    a signal all of whose energy is contained within a finite frequency range,    simultaneous transmission of data to a number of stations,    All of the above

Ans:B ,B


What kind of battery is most likely included in a cordless electric knife?
Options: Zinc-carbon battery,    Mercury-cell battery,    Nicad battery,    Lead-acid battery

Ans:B ,B


Which command will display all the EIGRP feasible successor routes known to a router?
Options: show ip routes *,    show ip eigrp summary,    show ip eigrp topology,    show ip eigrp adjacencies

Ans:C ,C


. Which is true when you insert an excel worksheet into a word document?
Options: a. word is the destination document b. excel is the destination document c. the worksheet is the destination document d. the document is the source document

Ans: –  A , –  A


Research scientists all over the world are taking steps towards building computers with circuits patterned after the complex inter connections existing among the human brain's nerve cells. What name is given to such type of computers?
Options: Intelligent computers,    Supercomputers,    Neural network computers,    Smart computers

Ans:C ,C


11. Word, by default, places a tab stop at every _____ mark on the ruler.
Options: a. .25″ b. .5″ c. .75″ d. 1″

Ans:– B ,– B


Which of the following represents processor activities, methods, and procedures in a data flow diagram?
Options: datagram,    actigram,    feed back,    flow chart

Ans:C ,C


The situation when in a linked list START=NULL is
Options: a. underflow b. overflow c. housefull d. saturated  

Ans:a,a


How many bit code is used by Murray code for TELEPRINTER machines.
Options: 4,    5,    9,    25

Ans:B,(Banswer


. ENIAC uses
Options: A) Decimal Numbering System B) Octal Numbering System C) Binary Numbering System D) Hexadecial Numbering System

Ans:A,A


Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer:
Options: Network Server,    Virtual Private Network,    Network operating system,    OSI

Ans:B ,B


The coordinating procedure set in an order processing system is
Options: custom production planning,    warehouse,    product allocation,    All of the above

Ans:E ,E


The relational model consists of:
Options: data in the form of tables.,    data redundancy.,    operations using non-SQL languages.,    unorganized data.

Ans:A ,A


MLMenu, a natural language interface for the TI Explorer, is similar to:
Options: Ethernet,    NaturalLink,    PROLOG,    the Personal Consultant

Ans:B ,B


“Ctrl + Down Arrow” is used to
Options: a. Moves the cursor one paragraph down b. Moves the cursor one line down c. Moves the cursor one page down d. Moves the cursor one screen down

Ans:–  A,–  A


Which command is used to remove the read permission of the file 'note' from both the group and others?
Options: chmod go+r note,    chmod go+rw note,    chmod go-x note,    chmod go-r note

Ans:D ,D


Which command is used to extract specific columns from the file?
Options: cat,    cut,    grep,    paste

Ans:B ,B


A venturi tube:
Options: is extremely difficult to use,    is made only of metal,    measures the presence of a liquid,    can be used to measure gas or liquid flow rates

Ans:D ,D


Stored procedures have which of the following advantages?
Options: It takes a longer time to write them as compared to writing Visual Basic.,    Network traffic increases,    Data integrity improves as multiple applications access the same stored procedure.,    Result in thicker client and thinner database server.

Ans:C ,C


. Which of the following is invalid statement?
Options: a. Sheet tabs can be colored b. Some picture can be applied as a background of a sheet c. You can set the column width automatically fit the amount of text d. The width of a row and be specified manually or fit automatically

Ans:– d,– d


In geosynchronous orbit, satellite
Options: remains in a fixed position so that as earth rotates, it can fully cover the earth,    remains in a fixed position related to points on earth,    moves faster than the earth's rotation so that it can cover larger portion of earth.,    moves simultaneously

Ans:A ,A


. In the third Generation of computers

Options: A) Distributed data processing first became popular B) An operating system was first developed C) High level procedural language were first used D) Online real time systems first become popular

Ans:B,B


When did John Napier develop logarithm?
Options: 1416 B. 1614 C. 1641 D. 1804

Ans:– B ,


Which term is used to describe RAM?
Options: Dynamic RAM (DRAM),    Static RAM (SRAM),    Video RAM (VRAM),    All of the above

Ans:D ,D


7. …is the first program run on a computer when the computer boots up
Options: a. System software b. Operating system c. System operations d. None

Ans:Correct Answer: b,Correct Answer: b


In a synchronous modem, the digital-to-analog converter transmits signal to the
Options: equalizer,    modulator,    demodulator,    terminal

Ans:A ,A


A lock that allows concurrent transactions to access different rows of the same table is known as a
Options: Field-level lock B. Row-level lock C. Table-level lock D. Database-level lock

Ans:– A ,


A couple
Options: is a data item that moves from one module to another,    is represented by a line joining two modules,    means that the upper module has the capability of calling the lower module,    none of the above

Ans:A ,is a data item that moves from one module to another


The total impedance of a parallel RLC circuit:
Options: always increases as the applied frequency increases,    is equal to the sum of the values of resistance, inductive reactance and capacitive reactance,    always decreases as the applied frequency increases,    is maximum at the resonant frequency

Ans:D ,D


What is placed to the left of horizontal scroll bar
Options: a. Tab stop buttons b. View buttons c. Split buttons d. Indicators

Ans:– B,– B


Which command will configure a switch port to use the IEEE standard method of inserting VLAN membership information into Ethernet frames?
Options: Switch(config)# switchport trunk encapsulation isl,    Switch(config)# switchport trunk encapsulation ietf,    Switch(config)# switchport trunk encapsulation dot1q,    Switch(config-if)# switchport trunk encapsulation isl

Ans:E ,E


. Which statement is valid about magnetic tape?
Options: A) It is a plastic ribbon B) It is coated on both sides with iron oxide C) It can be erased and reused D) All of above

Ans:9-D,9-D

www.000webhost.com