Which access method is used for obtaining a record from a cassette tape?


Options: Direct,    Sequential,    Random,    All of the above

Ans:B,(Banswer


Description:






More Computer Fundamental Related questions:


Ctrl + C
Options: Copy the selected text B. Cut the selected text C. Print the selected text D. Paste the selected text

Ans:– A ,


Terminal Table
Options: a permanent table which lists all key words and special symbols of the language in symbolic form,    a permanent table of decision rules in the form of patterns for matching with the uniform symbol table to discover syntactic structure,    consists of a full or partial list of the tokens as they appear in the program. Created by Lexical analysis and used for syntax analysis and interpretation,    contains all constants in the program

Ans:A ,A


To install a second IDE drive into a computer, you must:
Options: Set the master-slave jumper to slave on the second drive,    Use the IDE configuration software to set the new drive as slave,    Verify that you define the new drive as D: in the CMOS setup,    Verify that you attach the drive to the connector at the end of the ribbon cable

Ans:A ,A


The SQL keyword BETWEEN is used:
Options: for ranges.,    to limit the columns displayed.,    as a wildcard.,    None of the above is correct.

Ans:A ,A


Which is a semi conductor memory?
Options:  Dynamic B.  Static C.  Bubble D.  Both a & b

Ans:– D ,


A computer system consisting of its processor, memory and I/O devices accepts data, processes it and produces the output results. Can you tell in which component is the raw data fed?
Options: Mass Memory,    Main memory,    Logic unit,    Arithmetic unit

Ans:B,B


The Third Generation Computer was made with ________.
Options: Vacuum Tube B. Discrete Components C. IC D. Bio Chips

Ans:– C ,


In a synchronous modem, the digital-to-analog converter transmits signal to the
Options: equalizer,    modulator,    demodulator,    terminal

Ans:A ,A


What will be the output of the program? #include<stdio.h> #include<stdlib.h> int main() { union test { int i; float f; char c; }; union test *t; t = (union test *)malloc(sizeof(union test)); t->f = 10.10f; printf("%f", t->f); return 0; }
Options: 10,    Garbage value,    10.100000,    Error

Ans:C ,C


Which of the following is true?
Options: Fields are composed of bytes,    Files are composed of records,    Fields are composed of characters,    Records are composed of fields

Ans:E ,E


How should a router that is being used in a Frame Relay network be configured to keep split horizon issues from preventing routing updates?
Options: Configure a separate subinterface for each PVC with a unique DLCI and subnet assigned to the subinterface.,    Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.,    Configure many subinterfaces in the same subnet.,    Configure a single subinterface to establish multiple PVC connections to multiple remote router interfaces.

Ans:A ,A


. Which of the following option is not available in Paste Special dialog box?
Options: a.  Add b.  Subtract c.  Divide d.  SQRT

Ans:– d,– d


When was Apple Macintosh II microcomputer introduced in the market?
Options: 1964,    1970,    1983,    1986

Ans:C,C


. We can save and protect the workbook by
Options: a. Write Reservation Password b. Protection Password c. Read-only Recommended d. Any of the above

Ans:– d,– d


What is the type of Oracle backup in which all uncommitted changes have been removed from the datafiles?
Options: Full backup,    Consistent backup,    Inconsistent backup,    Differential backup

Ans:B ,B


A high speed device used in CPU for temporary storage during processing is called
Options: A register,    A bus,    A databus,    All of the above

Ans:A ,A


What will be the output of the program in Turbo C? #include<stdio.h> int main(int argc, char *argv, char *env[]) { int i; for(i=1; i<argc; i++) printf("%s\n", env[i]); return 0; }
Options: List of all environment variables,    List of all command-line arguments,    count of command-line arguments,    Error: cannot have more than two arguments in main()

Ans:A ,A


One popular classification technique in Business Intelligence (BI) reporting is ________ .
Options: cluster analysis only,    regression analysis only,    RFM analysis only,    both cluster analysis and regression analysis

Ans:C ,C


What does the command o/r 0x2142 provide?
Options: It is used to restart the router.,    It is used to bypass the configuration in NVRAM.,    It is used to enter ROM Monitor mode.,    It is used to view the lost password.

Ans:B ,B


A common way to take x, y coordinates off a drawing is to use a
Options: light pen,    digitiser,    Direct view storage tube (DVST),    Tablet

Ans:B ,B


Which of the following statements are correct about the program? #include<stdio.h> int main() { printf("%p\n", main()); return 0; }
Options: It prints garbage values infinitely,    Runs infinitely without printing anything,    Error: main() cannot be called inside printf(),    No Error and print nothing

Ans:B ,B


9. What is the name of the batch file that is automatically run when MSDOS is booted?
Options: a. Run.bat b. Config.sys c. Config.bat d. Autoexec.bat

Ans:Correct Answer: d ,Correct Answer: d


Skipping every other line and picking up the skipped lines on the second pass is called:
Options: interlacing,    refresh-vector,    raster-scan,    stroke writing

Ans:A ,A


If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?
Options: Discard it and send an error message back to the originating host,    Flood the network with the frame,    Add the source address and port to the MAC address table and forward the frame out the destination port,    Add the destination to the MAC address table and then forward the frame

Ans:C ,C


What is modified when changing the system start-up boot sequence?
Options: BIOS/CMOS,    CONFIG.SYS,    autoexec.bat,    COMMAND.COM

Ans:A ,A


A file that is organized in uniform format is formally referred to as a _____ or a database file.
Options: Document,    Database,    Record,    Structured data file

Ans:D ,D


Which one of the following principles best describes the basic operation of a generator?
Options: Like magnetic poles repel; unlike poles attract,    Current is induced in a conductor that is moving through a magnetic field,    Like magnetic poles attract; unlike poles repel,    Current flowing through a conductor generates a magnetic field

Ans:B ,B


Related fields in a data base are grouped to form
Options: data file,    data record,    menu,    bank

Ans:B ,B


You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?
Options: access-list 10 deny 172.16.48.0 255.255.240.0,    access-list 10 deny 172.16.144.0 0.0.7.255,    access-list 10 deny 172.16.64.0 0.0.31.255,    access-list 10 deny 172.16.136.0 0.0.15.255

Ans:B ,B


In a punched card system, data is processed by a
Options: keypunch machine, sorter, and posting machine,    accounting machine, posting machine, and billing machine,    sorter, posting machine, and billing machine,    accounting machine, keypunch machine, and sorter

Ans:D,D


System programs such as Compilers are designed so that they are
Options: reenterable,    non reusable,    serially usable,    recursive

Ans:A ,A


The Ziegler-Nichols method:
Options: is a graphical solution method,    can be used to determine gain factors of a PI loop,    is a method of control,    a and b above

Ans:D ,D


. Worksheet can be renamed by 
Options: a. Adding ? symbol at the end of filename while saving workbook b. Click on Worksheet tab by Holding CTRL Key and type new name c. Double Click on the Worksheet tab and type new name d. Worksheet cannot renamed

Ans:– c,– c


. Desktop is a
Options: a. Provides workspace b. Screen saver c. Display program d. Working with my document

Ans:0 – a ,0 – a


If the memory slots have 30 pins then the chip is a?
Options: DIMM,    SIMM,    SDRAM,    All of the above

Ans:B ,B


The mouse pointer moves erratically, what is the possible cause? The mouse
Options: ball is dirty,    is not connected,    driver is not installed properly,    has an incorrect IRQ setting

Ans:A ,A


Your company is running IGRP using an AS of 10. You want to configure EIGRP on the network but want to migrate slowly to EIGRP and don't want to configure redistribution. What command would allow you to migrate over time to EIGRP without configuring redistribution?
Options: router eigrp 11,    router eigrp 10,    router eigrp 10 redistribute igrp,    router igrp combine eigrp 10

Ans:B ,B


Bold, Italic, Regular are known as
Options:  A) font styles, B) font effects, C) word art, D) text effects, 

Ans:-A,-A


What will be the output of the program in Turbo C? #include<stdio.h> int main() { char near *near *ptr1; char near *far *ptr2; char near *huge *ptr3; printf("%d, %d, %d\n", sizeof(ptr1), sizeof(ptr2), sizeof(ptr3)); return 0; }
Options: 4, 4, 8,    4, 4, 4,    2, 4, 8,    2, 4, 4

Ans:D ,D


. You can not link Excel worksheet data to a Word document
Options: a. With the right drag method b. With a hyperlink c. With the copy and paste special commands d. With the copy and paste buttons on the standard toolbar

Ans:– d,– d


The ATAPI compliance is stands for?
Options: CDROM,    Bus mastering,    Mass storage device,    All of the above

Ans:C ,C


The approach used in top-down analysis and and design is
Options: to prepare flowcharts after programming has been completed,    to identify a top level function and then create a hierarchy of lower level modules and components,    to identify the top level functions by combining many smaller components into a single entity.,    All of the above

Ans:B ,B


.   To adjust the width of table columns, you
Options: a. Click table menu. Column width, then make adjustments b. Drag the vertical gridline between two columns c. Drag the column markers on the table ruler bar d. b and c

Ans:7 – D ,7 – D


Which of the following is not a characteristic of a daisy chaining priority control scheme?
Options: priority is programmable,    it is relatively easy to add more devices to the chain,    the failure of one device may affect other devices on the chain,    the number of control lines is independent of the number of devices on the chain

Ans:A ,A


What is the use of “Hide Slide” option?
Options: to hide the selected slides during Presentation B. to hide the selected slides during Editing C. to hide the selected slides during Printing D. to hide the selected slides during Deleting

Ans: – A ,


Which of the following are types of flow control? Buffering Cut-through Windowing Congestion avoidance
Options: 1 and 2,    1, 3 and 4,    2 only,    3 only

Ans:B ,B


. Which of the following methods cannot be used to edit the content of cell?
Options: a. Pressing the Alt key b. Clicking the formula bar c. Pressing F2 d. Double clicking the cell

Ans:– a,– a


How many columns can you insert in a word document in maximum?
Options:  A) 35, B) 45, C) 55, D) 65,

Ans:-B,-B


A greater proportion of time is spent in planning on the
Options: top management level,    middle management level,    lower management level,    All of the above

Ans:A ,A


.   Which of the following you must first complete in order to delete an object?
Options: a. Double click the image b. Select the image c. Resize the image d. Move the image to a new location

Ans:6 – B ,6 – B

www.000webhost.com