. What is System Analysis?


Options: The design of the screen the user will see and use to enter or display data B. System analysis defines the format and type of data the program will use C. System Analysis involves creating formal model of the problem to be solved D. None of the above

Ans: – C ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 16492 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Computer Fundamental Related questions:


. The octal equivalence of 111010 is
Options: A) 81 B) 72 C) 71 D) None of above

Ans:6-B,6-B


What is x in the following program? #include<stdio.h> int main() { typedef char (*(*arrfptr[3])())[10]; arrfptr x; return 0; }
Options: x is a pointer,    x is an array of three pointer,    x is an array of three function pointers,    Error in x declaration

Ans:C ,C


Which of the following is NOT a type of SQL constraint?
Options: PRIMARY KEY,    FOREIGN KEY,    ALTERNATE KEY,    UNIQUE

Ans:C ,C


Which of the following is a function of the process step of data processing?
Options: protect,    index,    retrieval,    update

Ans:C ,C


. .... is the layer of a computer system between the hardware and the user program
Options: a. Operating environment b. Operating system c. System environment d. None of these

Ans: b, b


A system program which helps the execution of user programs is known as
Options: System software,    Application program,    Batch operating system,    Utilities

Ans:C ,C


Which of the following keys is used to replace a single character with new text?
Options: S,    s,    r,    C

Ans:B ,B


Which best describes a fragmented hard drive?
Options: The platters are bad,    Data files are corrupted,    Clusters of data are damaged,    Files are not stored in consecutive clusters

Ans:D ,D


. To exit the PowerPoint application, you should
Options: a. Click the application minimize button b. Click the document close button c. Double click the application control menu icon d. Double click the document control menu icon

Ans:3 – C ,3 – C


. Which is valid statement
Options: A) 1 KB = 1024 Bytes B) 1 MB = 1024 Bytes C) 1 KB = 1000 Bytes D) 1 MB = 1000 Bytes

Ans:A,A


The device that can both feed data into and accept data from a computer is
Options: ALU,    CPU,    Input-Output device,    All of the above

Ans:C ,C


. What do you call the programs that are used to find out possible faults and their causes?

Options: A) Operating system extensions B) Cookies C) Diagnostic software D) Boot diskettes

Ans:C,C


. which of the following is problem oriented language?
Options: A) High level language B) Machine language C) Assembly language D) Low level language

Ans:A,A


The data dictionary tells the DBMS
Options: what files are in the database,    what attribute are possessed by the data,    what these files contain,    All of the above

Ans:D ,D


. Weight refers to
Options: a. The print density of characters b. The height of the printed character c. Upright or slanted shape d. The design and appearance of characters

Ans:– a,– a


Which of the following statement obtains the remainder on dividing 5.5 by 1.3 ?
Options: rem = (5.5 % 1.3),    rem = modf(5.5, 1.3),    rem = fmod(5.5, 1.3),    Error: we can't divide

Ans:C ,C


What is required to enable the PC to emulate a graphics terminal?
Options: Software,    A laser printer,    A color monitor,    A graphics board

Ans:A ,A


When the RET instruction at the end of subroutine is executed,
Options: a . the information where the stack is iniatialized is transferred to the stack pointer b . the memory address of the RET instruction is transferred to the program counter c. two data bytes stored in the top two locations of the stack are transferred to the program counter d. two data bytes stored in the top two locations of the stack are transferred to the stack pointer

Ans:8.c,8.c


Use of modern control technology in automation systems:
Options: reduces costs,    improves reliability,    increases yield,    All of the above

Ans:D ,D


Which of the following describes an industry-wide standard suite of protocols and algorithms that allows for secure data transmission over an IP-based network that functions at the layer 3 Network layer of the OSI model?
Options: HDLC,    Cable,    VPN,    IPSec

Ans:D ,D


What is a negative ion?
Options: An atom that contains more electrons than neutrons,    An atom that contains more protons than neutrons,    An atom that contains more electrons than protons,    An atom that contains more protons than electrons

Ans:C ,C


. The _____ is a short horizontal line indicating the conclusion of a document.
Options: a. insertion point b. end mark c. status indicator d. scroll box

Ans:– B,– B


The complexity of the average case of an algorithm is
Options: a. Much more complicated to analyze than that of worst case b. Much more simpler to analyze than that of worst case c. Sometimes more complicated and some other times simpler than that of worst case d. None or above  

Ans:a,a


Which of the following is not a filter command?
Options: sort,    wc,    grep,    cat

Ans:D ,D


A computer file can be best described as
Options: a single data item,    a general collection of data items,    an orderly collection of data items,    a random collection of data items

Ans:C ,C


Is the following statement a declaration or definition? extern int i;
Options: Declaration,    Definition,    Function,    Error

Ans:A ,A


_____ formatting is the process of changing the way letters, numbers, punctuation marks, and symbols appear on the screen and in print.
Options: a. Document b. Character c. Paragraph d. Object

Ans:– B,– B


Storage on PC allows you to store files until something erases it, but memory loses its contents whenever its _____ is lost
Options: static,    disk space,    power,    both a and b above

Ans:C ,C


Which of the following is used for modulation and demodulation?
Options: modem,    protocols,    gateway,    multiplexer

Ans:A ,A


Compilers and interpreters are themselves
Options: High-level language,    Codes,    Programs,    Mnemonics

Ans:C ,C


Which of the following uses network address translation?
Options: Routers,    Network adapter drivers,    Hubs,    Windows 95

Ans:B ,B


Which of the following is not true about indexes?
Options: Indexes are created to enforce uniqueness on columns.,    Indexes are created to enable fast retrieval by column values.,    Columns that are frequently used with equal conditions in WHERE clauses are good candidates for indexes.,    Indexes are created with the ALTER TABLE command.

Ans:D ,D


. Which of the following is the part of the operating system?
Options: a. Cell b. FAT c. Kernel d. Disk

Ans:2 – c ,2 – c


The command used to remove the directory is;
Options: rmdir,    rd,    remove,    rdir

Ans:A ,A


A system has two IDE hard drives that are each divided into primary and extended partitions, which drive letter is assigned to the primary partition of the second drive?
Options: C,    D,    E,    F

Ans:B ,B


Which command will be used with vi editor to append text at end of line?
Options: A,    a,    i,    I

Ans:A ,A


. If you will be displaying or printing your document on another computer, you’ll want to make sure and select the _____________ option under the ‘Save’ tab.
Options: a. Embed Fonts b. Embed True Type Fonts c. Save True Type Fonts d. Save Fonts

Ans:– B,– B


. To change the screen saver you can go from
Options: a. Control panel display b. Right click in desktop and properties c. Both of above d. None of these

Ans:0 – c ,0 – c


. Which characteristic of computer distinguishes it from electronic calculators?

Options: A) Accuracy B) Storage C) Versatility D) Automatic

Ans:C,C


Compression of digital data for efficient storage is
Options: Buffer,    CPU,    Packing,    Field

Ans:C,(Canswer


. Which of the following is a way to access secondary memory?

Options: A) Random access memory B) Action method C) Transfer method D) Density method

Ans:A,A


What are lines, curve, freeform, and scribble?
Options: a. Emphasis effects that can be applied to animations b. Types of custom motion paths c. Predefined entrance and exit effects d. All of the above

Ans: – B , – B


Strong AI is
Options: the embodiment of human intellectual capabilities within a computer.,    a set of computer programs that produce output that would be considered to reflect intelligence if it were generated by humans.,    the study of mental faculties through the use of mental models implemented on a computer.,    All of the above

Ans:A ,A


. Selecting the Rows 5 & 6 then choose Insert->Row. What will happen?
Options: 2 Rows will be inserted after Row 4 B. 2 Rows will be inserted after Row 5 C. 2 Rows will be inserted after Row 6 D. 2 Rows will be inserted after Row 7

Ans:– A ,


. … are list of commands that appear on the screen
Options: a. GUIS b. Icons c. Menus d. Windows

Ans:6 – c ,6 – c


In LISP, the function assigns the symbol x to y is
Options: (setq y x),    (set y = 'x'),    (setq y = 'x'),    (setq y 'x')

Ans:D ,D


How can you find rows that do not match some specified condition?
Options: EXISTS,    Double use of NOT EXISTS,    NOT EXISTS,    None of the above is correct.

Ans:B ,B


. Most of the first generation computers were
Options: A) Special purpose computers B) General purpose computers C) Both of above D) None of above

Ans:A,A


. Repeater operates in which layer of the OSI model?
Options: Physical layer B. Data link layer C. Network layer D. Transport layer

Ans: – A ,


Features of XML include which of the following?
Options: The tags are used to describe the appearance of the content.,    Addresses the structuring and manipulation of the data involved.,    Governs the display of information in a Web browser.,    All of the above.

Ans:B ,B

www.000webhost.com