Which of the following is not true of a magnetic disk?


Options: It is expensive relative to magnetic tape,    It provides only sequential access to stored data,    Users can easily update records by writing over the old data,    It does not provide an automatic audit trail

Ans:B,B


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 17269 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Computer Fundamental Related questions:


A acronym for the organisation that publishes programming language standard is
Options: ASCn,    BCD,    ANSI,    EBCDIC

Ans:C ,C


. How should you print a selected area of a worksheet, if you’ll want to print a different area next time?
Options: a. On the file menu, point to print area, and then click set print area. b. On the file menu, click print, and then click selection under print what c. On the view menu, click custom views, then click add d. All of above

Ans:– b,– b


. To open the existing presentation, press
Options: a. Ctrl + L b. Ctrl + N c. Ctrl + A d. Ctrl + O

Ans:8 – D ,8 – D


The main purpose of time sharing techniques used in computers is to make the best use of the
Options: CPU,    peripherals,    seconday storage,    floppy disks

Ans:A ,A


Which of the following subdirectory(ies) contains the device files?
Options: /dev,    /bin,    /etc,    /home

Ans:A ,A


What type of memory is not directly addressable by the CPU and requires special software called EMS (expanded memory specification)?
Options: Extended,    Expanded,    Base,    Conventional

Ans:B ,B


. While starting Window XP/7 extra booting options can be shown by pressing
Options: F1 B. F8 C. F9 D. F12

Ans:– B ,


How many bits in a byte?
Options: 16,    8,    255,    10

Ans:B ,B


The time factor when determining the efficiency of algorithm is measured by
Options: a. Counting microseconds b. Counting the number of key operations c. Counting the number of statements d. Counting the kilobytes of algorithm  

Ans:b,b


. Which of the following store command to retrieve data from database?
Options: a. Forms b. Reports c. Queries d. Tables

Ans:4 – c ,4 – c


Give me an example of a cell address.
Options: 11 25 B. 911 C. 41A D. A21

Ans:– D ,


Which of the following is true regarding VTP?
Options: All switches are VTP servers by default.,    All switches are VTP transparent by default.,    VTP is on by default with a domain name of Cisco on all Cisco switches.,    All switches are VTP clients by default.

Ans:A ,A


. What is the name of the new color laptop computer which is powered by a 386 processor at 33 MHz and is built by Epson?
Options: A) AX3/33 B) NEC-20 C) Magnum 2000 D) HCL-3000

Ans:4-A,4-A


13. Which of the following operating does not implement multitasking truly?
Options: a. Windows 98 b. Windows NT c. Windows XP d. MS DOS

Ans:Correct Answer: d,Correct Answer: d


While working with MS-DOS, which command is used to specify the size of the disk to format.
Options: FORMAT/F : size,    FORMAT/N : sector,    FORMAT/T : tracks,    FORMAT/V

Ans:A ,A


What is the power dissipation of a resistance that has 24 V dropped across it and 0.25 A flowing through it?
Options: 3 W,    6 W,    64 W,    122 W

Ans:B ,B


. Which of the following is not a form of data?
Options: A) numbers and characters B) images C) sound D) none of above

Ans:D,D


. It is possible to _______ a data source before performing a merge.
Options: a. create b. modify c. sort d. all of the above

Ans:– D,– D


What will be the output of the program? #include<stdio.h> int main() { int i; i = printf("How r u\n"); i = printf("%d\n", i); printf("%d\n", i); return 0; }
Options: How r u 7 2,    How r u 8 2,    How r u 1 1,    Error: cannot assign printf to variable

Ans:B ,B


A half byte is know is
Options: Data,    Bit,    Half byte,    Nibble

Ans:D ,D


Which selection below best describes the term data processing?
Options: The collection of information or data,    The distribution of information or data,    The manipulation of information or data,    The storage of information or data

Ans:C ,C


An enterprise data model is:
Options: a graphical model that shows the high-level entities for an organization.,    a graphical model that shows all entities for an organization.,    a non-graphical model that shows the high-level entities for an organization.,    a non-graphical model that shows the all entities for an organization.

Ans:A ,A


Once net requirements have been calculated, the next step is to
Options: determine the production schedule,    determine machine and manpower requirements,    calculate gross requirements,    start the production process

Ans:B ,B


Which of the following is not true of the conversion phase of the development life cycle?
Options: the user and systems personnel must work closely together.,    steps must be taken to phase out the old system,    documentation should be emphasized,    the non machine components of the system should be considered

Ans:C ,C


. How to specify cell range from A9 to A99 in Excel?
Options: (A9, A99) B. (A9 to A99) C. (A9 : A99) D. (A9 – A99)

Ans:– C ,


John Napier invented Logarithm in
Options: A) 1614 B) 1617 C) 1620 D) None of above

Ans:-A,-A


. When you group worksheets
Options: a. You can enter variable data on multiple worksheets at one time b. You can print more than one worksheet at a time c. You can enter common data, formats, and formulas on multiple worksheets at one time d. b, and c

Ans:– d,– d


Considering all types of business, accounts receivable systems are not closely interrelated with the
Options: cost accounting system,    payroll system,    sales order system,    purchasing system

Ans:C ,C


. To prevent the addition and deletion of files on a disk or tape we use
Options: a. Format b. Write protect c. Create back up d. None of above

Ans:6 – b ,6 – b


Which command is used to move all files to the bin sub-directory of the parent directory?
Options: mv *.* /bin/,    mv * /bin/*,    mv * ../bin,    mv * ../bin *.*

Ans:C ,C


The bubbles in a bubble memory pack are created with the help of?
Options: Laser beam,    Magnetic field,    Electric field,    X-ray

Ans:B ,B


. Rounding errors can occur
Options: a. When you use multiplication, division or exponentiation in a formula b. When you use addition and subtraction in a formula c. Because Excel uses hidden decimal places in computation d. When you show the results of formulas with different decimal places than the calculated results

Ans:– a,– a


.   To import text from a word document that uses headings into a PowerPoint presentation:
Options: a. This cannot be done in PowerPoint b. Click Insert, Slides from Outline c. Click Import, Word Document Headings d. Click File, New, Presentation from Word Headings

Ans:2 – B ,2 – B


. Which is not executable file?
Options: a. .com b. .exe c. .bat d. .txt

Ans:3 – d ,3 – d


The key uniquely identifies each record in a table.
Options: a. primary key b. key word c. filed name d. All of above

Ans:ndash; a,ndash; a


. Registers which are partially visible to users and used to hold conditional codes (bits set by the CPU hardware as the result of operations), are known as
Options: A) PC B) Flags C) Memory Address Registers D) General Purpose Registers

Ans:B,B


Compression of digital data for efficient storage is
Options: Buffer,    CPU,    Packing,    Field

Ans:C ,C


Which command displays current directory name or change from one to another?
Options: a. Chdir b. Cd c. Mkdir d. Both a and b

Ans:d. Both a and b,d. Both a and b


Communication using a modulated carrier to apply a data signal to a transmission medium in analog form is
Options: Local area network,    Modem,    Base band networking,    Broad band networking

Ans:D ,D


An Enterprise Resource Planning application is an example of a(n) ________ .
Options: single-user database application,    multiuser database application,    e-commerce database application,    data mining database application

Ans:B ,B


Which of the following is not a valid data type in excel
Options: a. Number b. Character c. Label d. Date/time

Ans:#8211; b,#8211; b


The use of computers in data processing has had several impacts on business. Which of the following is not one of them?
Options: easier business growth,    fewer clerical workers,    increased data-processing costs,    more and better information

Ans:C ,C


. A utility that can be used to minimize the number of fragmented files and enhance the speed
Options: a. Disk space b. Defrag c. Scandisk d. Double space

Ans:4 – b ,4 – b


Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question.
Options: 192.168.10.142,    192.168.10.66,    192.168.100.254,    192.168.10.143

Ans:A ,A


One byte can be used to encode any integer between 'O' and -inclusive
Options: 16,    256,    128,    255

Ans:D ,D


. Which among the following are the best tools for fixing the errors?
Options: a. Fdisk b. Scandisk c. CHKDSK d. Fixdisk

Ans:1 – b ,1 – b


An appraisal, of a system's performance after it has been installed, is called system
Options: planning,    review,    maintenance,    batch Processing

Ans:B ,B


Is the following statement a declaration or definition? extern int i;
Options: Declaration,    Definition,    Function,    Error

Ans:A ,A


A data item which is not broken down into smaller units is _____
Options: Data element,    Elementary data item,    Data entry,    Database management

Ans:B ,B


By default, Word automatically formats each heading in a table of contents as __________
Options: bookmarks B. cross-references C. hyperlinks D. word-fields

Ans:– C ,

www.000webhost.com