What type of magnetic material is normally used in bubble memories?


Options: Magnetic core,    Cobalt,    Garnet,    Metallic

Ans:C,C


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 18726 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


.   to save a presentation you
Options: a. click save on the windows start button b. press Ctrl + F5 c. select File, Save from the menu d. click the saver button on the formatting toolbar

Ans:2 – C ,2 – C


How do you tell one cell from another?
Options: By numbers B. By letters C. By its address D. by color

Ans:– C ,


If no multivalued attributes exist in a relation, then the relation is in what normal form?
Options: First normal form,    Second normal form,    Third normal form,    Fourth normal form

Ans:A ,A


Convert the CHARI h#000F, s assembly language instructions into hexadecimal machine language:
Options: 0111EF,    9001E6,    DA000F,    40

Ans:C ,C


An attribute that names or identifies entity instances is a(n):
Options: entity.,    attribute.,    identifier.,    relationship.

Ans:C ,C


You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?
Options: You copied the wrong configuration into RAM.,    You copied the configuration into flash memory instead.,    The copy did not override the shutdown command in running-config.,    The IOS became corrupted after the copy command was initiated.

Ans:C ,C


. The …enables the user to load devices drivers and programs into upper memory area while running DOS in 386 or higher microprocessor
Options: a. Himem.sys b. Emm386.exe c. Config.sys d. All of above

Ans:6 – a ,6 – a


switching between portrait and landscape modes involves the:
Options: header and footer toolbar,print layout view, page setup dialog box, none of the above

Ans:C,page setup dialog box


What is x in the following program? #include<stdio.h> int main() { typedef char (*(*arrfptr[3])())[10]; arrfptr x; return 0; }
Options: x is a pointer,    x is an array of three pointer,    x is an array of three function pointers,    Error in x declaration

Ans:C ,C


. In copy con command, con stands for what?
Options: a. Control b. Console c. Contrast d. Contents

Ans:3 – b ,3 – b


Which of the following contains a complete record of all activity that affected the contents of a database during a certain period of time?
Options: report writer,    query language,    data manipulation language,    transaction log

Ans:D ,D


Which is built directly on the hardware?
Options: Computer Environment B. Application Software C. Operating System D. Database System

Ans:– C ,


.  In a module, the VB Name used to display a warning query icon is _______.
Options: a.            vbCritical b.           vbInformation c.           vbExclamation d.            vbQuestion

Ans:– d,– d


The Banker’s algorithm is used
Options:  to rectify deadlock B.  to detect deadlock         C.  to prevent deadlock D.  to slove deadlock

Ans:– C ,


Which of the following column properties specifies whether or not cells in a column must contain a data value?
Options: Null status,    Data type,    Default value,    Data constraints

Ans:A ,A


Which of the following occurs when one transaction reads a changed record that has not been committed to the database?
Options: Nonrepeatable read,    Phantom read,    Dirty read,    Consistent read

Ans:C ,C


Impact printers
Options: strike a ribbon against the paper to produce character images,    include ink-jet and thermal devices,    are more expensive than Laser printers,    use optical technology

Ans:A,A


The records in a file or magnetic tape
Options: can only be accessed serially,    have to be arranged in a key sequence,    are meant for backup,    cannot be transferred to a disk file

Ans:A ,A


The manager, in using the systems approach, should subdivide the firm into subsystems based on
Options: functional areas-marketing, finance, and manufacturing,    management levels-strategic, tactical, and operational,    resource flows-manpower, money, machines, and material,    any of the above represent acceptable subsystem divisions.

Ans:D ,D


Which file keeps commands to execute automatically when OS is started?
Options: command.com B. any batch file C. autoexec.bat D. config.sys

Ans:– C ,


In a transistor operates at the middle of the load line, an increase in the base resistance will move the Q point
Options: down,    up,    nowhere,    off the load line

Ans:A ,A


When a computer is first turned on or restarted, a special type of absolute loader, called a ______ is executed
Options: loader,    linker,    bootstrap loader,    None of the above

Ans:C ,C


Which of the following statements is true concerning JDBC?
Options: It is language independent.,    It is similar in concept to ODBC.,    It is useful for all object-oriented languages.,    It consists of three main layers.

Ans:B ,B


A dialog box with a bomb appears on a Macintosh screen. What type of problem has occurred?
Options: A RAM problem,    A software problem,    A ROM problem,    An ADB problem

Ans:B ,B


64. What is the default font used in MS Word 2007 document?
Options: a. Times New Roman b. Arial c. Calibri d. Preeti

Ans:– C ,– C


. You can automatically adjust the size of text in a cell if they do not fit in width by
Options: a. Double clicking on the right border of column header b. From Format choose Columns and then Autofit Selection c. From Format Cells dialog box mark Shrink to fit check box d. All of above

Ans:– c,– c


Which command will configure a switch port to use the IEEE standard method of inserting VLAN membership information into Ethernet frames?
Options: Switch(config)# switchport trunk encapsulation isl,    Switch(config)# switchport trunk encapsulation ietf,    Switch(config)# switchport trunk encapsulation dot1q,    Switch(config-if)# switchport trunk encapsulation isl

Ans:E ,E


An indexed file offers the facility of a Random file and the access method of a
Options: Sequential file,    indexed file,    direct access file,    random access file

Ans:A ,A


_____ is an application of the computer where the computer makes decisions or judgments that appear to require human intuition, reasoning and intelligence.
Options: AI,    ES,    KBS,    Base-rule

Ans:A ,A


The process of entering data into a storage location
Options: adds to the contents of the location,    cause variation in its address number,    is known as a readout operation,    is destructive of previous contents

Ans:D ,D


Which of the following medium access control technique is used for bus/tree?
Options: token ring,    token bus,    CSMA,    MAC

Ans:B ,B


Which step should you perform first before discharging a CRT?
Options: Remove the CRT from its housing,    Disconnect the CRT from the computer,    Remove the video assembly,    Turn power off before removing power source

Ans:D ,D


What is the inductive reactance of a 2-H coil operating at 60 Hz?
Options: 754 Ohm,    30 Ohm,    60 Ohm,    120 Ohm

Ans:A ,A


What is the significance of the J and K terminals on the J-K flip-flop?
Options: There is no known significance in their designations.,    The J represents "jump," which is how the Q output reacts whenever the clock goes HIGH and the J input is also HIGH.,    The letters represent the initials of Johnson and King, the co-inventors of the J-K flip-flop.,    All of the other letters of the alphabet are already in use.

Ans:A ,A


Point out the error in the following program. #include<stdio.h> #include<stdlib.h> int main() { char *ptr; *ptr = (char)malloc(30); strcpy(ptr, "RAM"); printf("%s", ptr); free(ptr); return 0; }
Options: Error: in strcpy() statement.,    Error: in *ptr = (char)malloc(30);,    Error: in free(ptr);,    No error

Ans:B ,B


What will be the output of the program? #include<stdio.h> int fun(int **ptr); int main() { int i=10; const int *ptr = &i; fun(&ptr); return 0; } int fun(int **ptr) { int j = 223; int *temp = &j; printf("Before changing ptr = %5x\n", *ptr); const *ptr = temp; printf("After changing ptr = %5x\n", *ptr); return 0; }
Options: Address of i Address of j,    10 223,    Error: cannot convert parameter 1 from 'const int **' to 'int **',    Garbage value

Ans:C ,C


Which option allows you to select line, curve, freeform or scribble tools?
Options: a. Create effect b. Insert motion path c. Draw custom path d. All of the above

Ans: – C , – C


Related fields in a data base are grouped to form
Options: data file,    data record,    menu,    bank

Ans:B ,B


How can you access the font size tool on formatting toolbar?
Options:  A) Ctrl + S, B) Ctrl + Shift + S, C) Ctrl + P, D) Ctrl + Shift + P,

Ans:-D,-D


The designer of a form includes
Options: filed designators,    prompts,    data,    both (a) and (b)

Ans:D ,D


The powerful text editor called PC-Write can be used by anybody by paying a small fee. Such programs are called
Options: Software,    Shareware,    Firmware,    Mindware

Ans:B ,B


What will be the output of the program (myprog.c) given below if it is executed from the command line? cmd> myprog 1 2 3 /* myprog.c */ #include<stdio.h> #include<stdlib.h> int main(int argc, char **argv) { int i, j=0; for(i=0; i<argc; i++) j = j+atoi(argv[i]); printf("%d\n", j); return 0; }
Options: 123,    6,    Error,    "123"

Ans:B ,B


14. While working with MS-DOS, which command is used to rename a file named file1.doc to file2.doc from a different directory called dir1?
Options: a. Ren2.doc dirfile1.doc b. Ren file1.doc file2.doc c. Ren .docdir.doc d. Ren dir1file1.doc file2.doc

Ans:Correct Answer: d,Correct Answer: d


The slowest transmission speeds are those of
Options: twisted-pair wire,    coaxial cable,    fiber-optic cable,    microwaves

Ans:A ,A


The complexity of merge sort algorithm is
Options: a. O(n) b. O(log n) c. O(n2) d. O(n log n)  

Ans:d,d


When installing PCI NICS you can check the IRQ availability by looking at
Options: dip switches,    CONFIG.SYS,    jumper settings,    motherboard BIOS

Ans:D ,D


The imitation of one device or system by another is
Options: Simulation,    Emulation,    Resilience,    Compaction

Ans:B ,B


_____________ refers to the correctness and completeness of the data in a database?
Options: Data security B. Data integrity C. Data constraint D. Data independence

Ans:– B ,


    In Ms-Dos what command you will use to display system date?
Options: a.    Date command b.    Ver command c.    Disk command d.    Format command

Ans:.e,Correct Answer: a. Date command


. If the cell B1 contains the formula = $A$1, which of the following statements is true
Options: There is a relative reference to cell A1 B. There is an absolute reference to cell A1 C. Further changes in value of A1 will not affect the value of B1 D. Further changes in value of B1 will affect the value of A1

Ans:– B ,

www.000webhost.com