Which device is used to backup the data?


Options: Floppy Disk B. Tape C. Network Drive D. All of the above

Ans:– D ,






More Computer Fundamental Related questions:


0. Windows displays various options to shutdown. Which is suitable at the end ofday?
Options: a. Shut Down b. Restart c. Sleep d. Hibernate

Ans: - a, - a


95. What is the shortcut key to Update Formula in a table?
Options: a. F9 b. Alt + F9 c. Ctrl + F9 d. Shift + F9

Ans:–  A ,–  A


Which of the following is characteristic of an operating system?
Options: resource management,    error recovery,    memory management,    All the above

Ans:D ,D


What is the name of the memory card which is conceptually related to the smart card but is similar to the video disk?
Options: Laser card,    Master card,    Visa,    Optical card

Ans:A ,A


A magnetic tape volume that is used on a data processing operation without any change to its contents is
Options: Magnetic disk,    Punched paper tape,    Master tape,    Card reader

Ans:C ,C


On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses?
Options: /27,    /28,    /29,    /30

Ans:D ,D


.   To create a PowerPoint presentation from a template
Options: a. Click File, New, select the presentations tab and choose a template b. Click File, New Template and choose a template c. Import a presentation template from PowerPoint’s template wizard d. Click Create Template from scratch, Now

Ans:1 – A ,1 – A


13. Which command can be used to create the disk’s tracks and sectors?
Options: a. Fdisk b. Format c. Chkdsk d. Attrib

Ans:Correct Answer: b ,Correct Answer: b


. Ctrl + W
Options: Save and Print the Document B. Save and Close Word Application C. Save and Close document D. Without Save, Close Document

Ans:– C ,


A large computer information system maintains many different computer files. Which amongst them is called a perpetual file?
Options: Specialized file,    Log file,    Master file,    Update file

Ans:C ,C


. In Windows,start button is used to
Options: a. Run applications b. Device setting c. Turn off the system d. All of above

Ans: d, d


Which of these schools was not among the early leaders in AI research?
Options: Dartmouth University,    Harvard University,    Massachusetts Institute of Technology,    Stanford University

Ans:B ,B


How many characters can be typed in a single cell in Excel?
Options: a. 256 b. 1024 c. 32000 d. 65535

Ans:C,32,767


Pick the correct choice for the 8088 CPU.
Options: 16 bit word size, 8 bit data path,    8 bit word size, 8 bit data path,    16 bit word size, 16 bit data path,    4 bit word size, 8 bit data path

Ans:A ,A


Which command is used to display and create files?
Options: cat,    vi,    ed,    lyrix

Ans:A ,A


. Which one is true for unconditional disk formatting?
Options: a. Destroys every byte of data on a disk by overwriting itwith with blank spaces b. Do not check/scan surface after format c. Transfer system files after format d. All of above

Ans: a, a


Which major development led to the production of microcomputers?
Options: Magnetic disks,    Floppy disks,    Logic gates,    Integrated circuits

Ans:D ,D


. A number system that has eight different symbols to represent any quantity is known as

Options: A) Binary B) Octal C) Decimal D) Hexadecimal

Ans:B,B


. Which command is used to undelete a bunch of files withextension .doc that you have just deleted?
Options: a. Undelete b. Undelete/all c. Undelete *.doc d. All of above

Ans:- c,- c


Database Management Systems are featured with:
Options: a. The facility to easy editing, spelling check, auto pagination, lay out and printing reports b. The ability to store large amount of data to facilitate easy update, sort and retrieval c. The ability to calculate efficiently with the help of built-in functions and analyze d. All of above

Ans:ndash; b,ndash; b


A relation in this form is free of all modification anomalies.
Options: First normal form,    Second normal form,    Third normal form,    Domain/key normal form

Ans:D ,D


What is the port number for HTTP?
Options: 99,    86,    80,    23

Ans:C ,C


. A 32 bit microprocessor has the word length equal to
Options: A) 2 byte B) 32 byte C) 4 byte D) 8 byte

Ans:C,C


. Which of the following is correct full form of BCD?
Options: A) Binary Coded Decimal B) Bit Coded Decimal C) Binary Coded Digit D) Bit Coded Digit

Ans:4-A,4-A


A general purpose single-user microcomputer designed to be operated by one person at a time is
Options: Special-purpose computer,    KIPS,    M,    PC

Ans:D ,D


End-to-end connectivity is provided from host-to-host in:
Options: Network layer,    Session layer,    Data link layer,    Transport layer

Ans:D ,D


To organize files on a disk, MS-DOS separates them into areas called _____
Options: directories,    buckets,    areas,    area directories

Ans:A ,A


If delays are recorded as 10 bit numbers in a 50 router network, and delay vectors are exchanged twice a second, how much bandwidth per fill duplex line is occupied by the distributed routing algorithm?
Options: 500 bps,    1500 bps,    5 bps,    1000 bps

Ans:D ,D


. An operating system is a program or a group of programs that
Options: a. Helps in checking the spelling of Word b. Maintain the relationship in Database c. Manages the resources of the Computer d. Performs the calculations of cells in Excel

Ans:2 – c ,2 – c


The memory address of fifth element of an array can be calculated by the formula
Options: a. LOC(Array[5]=Base(Array)+w(5-lower bound), where w is the number of words per memory cell for the array b. LOC(Array[5])=Base(Array[5])+(5-lower bound), where w is the number of words per memory cell for the array c. LOC(Array[5])=Base(Array[4])+(5-Upper bound), where w is the number of words per memory cell for the array d. None of above  

Ans:a,a


A problem's _____ will answer the question, "What does the user want to see either printed or displayed on the screen?"
Options: Input,    Output,    Processing,    Purpose

Ans:B ,B


Communication network is
Options: one or more conductors that serve as a common connection for a related group of devices,    a continuous frequency capable of being modulated or impressed with a second signal,    the condition with two or more stations attempt to use the same channel at the same time,    a collection of interconnected functional units that provides a data communications service among stations attached to the network

Ans:D ,D


A greater proportion of time spent in directing on the
Options: top management level,    middle management level,    lower management level,    All of the above

Ans:C ,C


In which tcp_wrappers file can you specify to allow all connections from all hosts?
Options: /etc/hosts.allow,    /etc/hosts.deny,    /etc/hosts,    /etc/tcp.conf

Ans:A ,A


Which of the following is not currently a topic in computer science?
Options: Speech recognition,    Artificial intelligence,    Thermodynamics,    Multiprocessing

Ans:C ,C


Alice is setting up a small network in her home so that she can study for her MCSE exams. She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select?
Options: Star,    Right,    Token-Ring,    Ethernet

Ans:E ,E


Which of the following is not applications software?
Options: Word processing,    Spreadsheet,    UNIX,    Desktop publishing

Ans:C ,C


How many layers are in the TCP/IP model?
Options: 4 layers B. 5 layers C. 6 layers D. 7 layers

Ans:– A ,


Which of the following is not a basic step in creating a worksheet?
Options: a. Save workbook b. Modifiy the worksheet c. Enter text and data d. Copy the worksheet

Ans:8211; d,8211; d


The seventh field of /etc/password is
Options: password,    login,    shell,    home

Ans:C ,C


_____ means that the manager spends his or her time dealing with exceptions or those situations which are out of control
Options: relevant,    management by exception,    predictive reports,    control

Ans:B ,B


Which standard library function will you use to find the last occurance of a character in a string in C?
Options: strnchar(),    strchar(),    strrchar(),    strrchr()

Ans:D ,D


What are the two types of Semaphore?
Options: Digital Semaphores and Binary Semaphores B. Analog Semaphores and Octal Semaphores          C. Counting Semaphores and Binary Semaphores D. Critical Semaphores and System Semaphores

Ans:– C ,


Documentation should include
Options: a. Destination and users of the output data b. Source of input data c. Information on the purpose of the workbook d. All of the above

Ans:#8211; d,#8211; d


The table created by lexical analysis to describe all literals used in the source program, is
Options: Terminal table,    Literal table,    Identifier table,    Reductions

Ans:B ,B


Backward recovery is which of the following?
Options: Where the before-images are applied to the database,    Where the after-images are applied to the database,    Where the after-images and before-images are applied to the database,    Switching to an existing copy of the database

Ans:A ,A


What operates in the Data Link and the Network layer?
Options: NIC,    Bridge,    Brouter,    Router

Ans:C ,C


An audio transformer has a turn ratio of 9, What is its impedance ratio?
Options: 81,    85,    6,    9

Ans:A ,A


The organization and interconnection of the various components of a computer system is
Options: Architecture,    Networks,    Graphics,    Designing

Ans:A ,A


What SQL structure is used to limit column values of a table?
Options: The LIMIT constraint,    The CHECK constraint,    The VALUE constraint,    None of the above is correct.

Ans:B ,B

www.000webhost.com