When sharing data in Office, the ________ document is the document in which the data was first entered.


Options: source B. destination C. original D. primary

Ans:– A ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 5776 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More MS-Word Related questions:


Many large organizations have information _____ where managers can use fourth-generation languages to retrieve the facts they need from online data bases, and where staff experts are available to provide PC hardware/ software guidance.
Options: expert,    centers,    control,    MIS

Ans:B ,B


. to activate the previous cell in a pre-selected range, press
Options: a. the Alt key b. the Tab key c. the Enter key d. none of above

Ans:– d,– d


Which of the following is considered to be an interface between the functional applications and the data base?
Options: management information systems,    data-base management systems,    decision-support systems,    data-processing systems

Ans:B ,B


6. Multiprogramming system
Options: a. Are easier to develop than single programming system b. Execute each job faster c. Execute more jobs in the same time period d. Are used only one large mainframe computers

Ans:Correct Answer: c,Correct Answer: c


Page stealing
Options: is a sign of an efficient system,    is taking page frames from other working sets,    should be the tuning goal,    is taking larger disk spaces for pages paged out

Ans:B ,B


Which of the following NIS clients, finds and stores information about an NIS domain and server?
Options: ypwhich,    ypbind,    ypcat,    yppoll

Ans:B ,B


The basic operations performed by a computer are
Options: Arithmetic operation B. Logical operation C. Storage and relative D. All the above

Ans:– D ,


. Holding down the Shift key and rotate the image will rotate in increments of
Options: a. 10 degrees b. 15 degrees c. 20 degrees d. 25 degrees

Ans:8 – B ,8 – B


The communication mode that supports two-way traffic but only one direction at a time is
Options: simplex,    duplex,    half duplex,    multiplex

Ans:C ,C


. The contribution of Konrad Zuse was long ignored because

Options: A) He made the computers secretly B) his computers were very complicated and it took time for the people to recognize its power C) of political reasons. He was German. D) All of the above

Ans:C,C


You have a PC with no video* Which of the following is LEAST likely to be causing the problem?
Options: defective RAM (bank zero),    defective microprocessor,    crashed hard drive,    loose video card

Ans:C ,C


The "Turing Machine" showed that you could use a/an _____ system to program any algorithmic task.
Options: binary,    electro-chemical,    recursive,    semantic

Ans:A ,A


A device that converts thermal energy to electrical energy is called a:
Options: thermocouple,    solar cell,    chemical cell,    piezoelectric devices

Ans:A ,A


A register organized to allow to move left or right operations is called a ____
Options: Counter B. Loader C. Adder D. Shift register

Ans:– D ,


The reliability life cycle of a product:
Options: has three distinct rates of failure,    cannot be predicted,    All of the above,    stays constant with environmental conditions

Ans:A ,A


. Dropcap means
Options: a. All Caps b. Small Caps c. Title case d. None of above

Ans: – D , – D


Which of the following best explains the meaning of managerial participation in effective computer utilization is MIS:
Options: managers operate the computer,    need for understanding and support from top management',    managers need to be educated about computers,    managers need to go through the computers reports.

Ans:B ,B


Which of the following cannot be toggled from View >> Toolbars?
Options: a. Control Toolbox b. Slides c. Revisions d. Reviewing

Ans:– B ,– B


. Which of the following machine was not invented by Charles Babbage?
Options: A) Tabulating Machine B) Analytical Engine C) Difference Engine D) Both C and D

Ans:A,A


Paging
Options: is a method of memory allocation by which the program is subdivided into equal portions, or pages and core is subdivided into equal portions or blocks.,    consists of those addresses that may be generated by a processor during execution of a computation.,    is a method of allocating processor time.,    allows multiple programs to reside in separate areas of core at the time.

Ans:A ,A


. Which is the first program run on a computer when the computer boots up?
Options: a. System software b. Operating system c. System operations d. None

Ans: b, b


. Which command permits to see the directory structure in DOS?
Options: a. Display structure b. Tree c. Dir/all d. All of above

Ans:0 – b ,0 – b


. Which of the following is correct regarding the Background of slides
Options: a. Background color of slides can be change b. Picture can be set as Slide Background c. Texture can be set as Slide Background d. All of the Above

Ans:1 – D ,1 – D


. An output device that uses words or messages recorded on a magnetic medium to produce audio response is
Options: A) Magnetic tape B) Voice response unit C) Voice recognition unit D) Voice band

Ans:B,B


Which of the following data structure can't store the non-homogeneous data elements?
Options: a. Arrays b. Records c. Pointers d. None

Ans:- a,- a


Suppose a voltage source has an ideal voltage of 12V and an internal resistance of 0.5W. For what values of load resistance will the voltage source appear stiff?
Options: 5 Ohm,    50 Ohm or more,    100 Ohm,    6 Ohm

Ans:B ,B


Which of the following are word processing software?
Options: a. WordPerfect b. Easy Word c. MS Word d. All of above

Ans:– D,– D


18. Which of the following command display the name of files in sorted order?
Options: a. Dir/o:n b. Dir/so c. Dir/an d. Dir/ah

Ans:Correct Answer: a,Correct Answer: a


. Referential integrity can be enforced if both _______________ belong to the same Microsoft Access database.
Options: a. queries b. fields c. records d. tables

Ans:2 – d ,2 – d


The function(s) of the Syntax phase is(are)
Options: to recognize the major constructs of the language and to call the appropriate action routines that will generate the intermediate form or matrix for these constructs.,    to build a literal table and an identifier table,    to build a uniform symbol table,    to parse the source program into the basic elements or tokens of the language.

Ans:A ,A


_____ help prevent power surges.
Options: Surge suppressor,    Spike protector,    UPS system,    High-grade multi-meter

Ans:A ,A


Punched-card equipment was first introduced in Britain in 1904 by a small company. What was the name of that company?
Options: The Tabulator Ltd.,    Tabulator Machine Company,    International Business Machines (IBM),    Accounting & Tabulating Corpn. of Great Britain

Ans:A ,A


Normalization ________ data duplication.
Options: eliminates,    reduces,    increases,    maximizes

Ans:A ,A


An information system that supplies information specifically to aid managers with decision-making responsibilities is called a
Options: DBMS,    MIS,    DSS,    DBA

Ans:B ,B


Which key do you press to check spelling?
Options: F3 B. F5 C. F7 D. F9

Ans:– C ,


The Second Generation Computer was based on ________.
Options: Vacuum Tube B. Silicon Chips C. Transistor D. Bio Chips

Ans:– C ,


The DBA is
Options: a person,    a computer device,    a communication technique,    All of the above

Ans:D ,D


The examination and changing of single bits or small groups of his within a word is called
Options: Bit,    Byte,    Bit manipulation,    Bit slice

Ans:C ,C


Bridge works in which layer of the OSI model?
Options: Appliation layer B. Transport layer                    C. Network layer D. Datalink layer

Ans:– D ,


Which of the following applies to Internal DOS commands?
Options: Internal commands can be run whenever the DOS prompt is displayed,    Internal commands are reserved for DOS-level programming,    Internal commands can only be executed from a batch file,    Internal commands are stored on disk separately from COMMAND.COM

Ans:A ,A


Which of the following is a graphic representation of the modules in the System and the interconnection between them
Options: Pie chart,    Flow chart,    Structural chart,    System chart

Ans:C ,C


Operations Research came into being due to:
Options: medical reasons,    military reasons,    educational reasons,    to improve transportation

Ans:B ,B


Which of the following is NOT a type of SQL constraint?
Options: PRIMARY KEY,    FOREIGN KEY,    ALTERNATE KEY,    UNIQUE

Ans:C ,C


Which of the following is not a logical data-base structure?
Options: tree,    relational,    network,    chain

Ans:D ,D


How does a host on an Ethernet LAN know when to transmit after a collision has occurred? In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting. You can improve the CSMA/CD network by adding more hubs. After a collision, the station that detected the collision has first priority to resend the lost data. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data.
Options: 1 and 3,    2 and 4,    1,3 and 4,    2 and 5

Ans:D ,D


. Which part of the computer is used for calculating and comparing?
Options: A) Disk unit B) Control unit C) ALU D) Modem

Ans:C,C


What is the usual number of bits transmitted simultaneously in parallel data transmission used by microcomputers?
Options: 16,    9,    8,    4

Ans:B ,B


Which of the following line spacing is invalid?
Options:  A) Single, B) Double, C) Triple, D) Multiple,

Ans:-C,-C


Assume integer is 2 bytes wide. How many bytes will be allocated for the following code? #include<stdio.h> #include<stdlib.h> #define MAXROW 3 #define MAXCOL 4 int main() { int (*p)[MAXCOL]; p = (int (*) [MAXCOL])malloc(MAXROW *sizeof(*p)); return 0; }
Options: 56 bytes,    128 bytes,    24 bytes,    12 bytes

Ans:C ,C


To autofit the width of column
Options:  A) Double click the right border of column, B) Double click the left border of column, C) Double click the column header, D) All of above,

Ans:-A,-A

www.000webhost.com