Which of the following is the coding of data so that is can't be easily understood if intercepted.


Options: Barcode,    Decoder,    Encryption,    Mnemonics

Ans:C,(Canswer


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 8356 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Computer Fundamental Related questions:


In which mode can 2 or more applications be stored in memory at the same time?
Options: Segmented Mode,    Unprotected Mode,    Real Mode,    Protected Mode

Ans:D ,D


Virtual Memory is A)  Extremely Large Main memory B)  Extremely Large Secondary memory C)  An illusion of extremely large main memory D)  An illusion of extremely large secondary memory
Options:

Ans:– C ,


.Finding the location of the element with a given value is:
Options: A)Traversal b.Search c.Sort d.None of above

Ans:B,B


A Ring, refers to a record chain, the last of which refers to the first record, in the chain, is called a/an
Options: addressing,    location,    pointer,    loop

Ans:C ,C


Which option will be used with ps command to slow the entire command line of the process being run?
Options: -4,    -f,    -1,    -2

Ans:B ,B


Videotex is a combination of
Options: television,    communication,    computer technology,    All of the above

Ans:D ,D


IBM's Micro Channel Architecture (MCA) specifies which type of the following bit access widths?
Options: 8 bit & 16 bit,    16 bit & 24 bit,    16 bit & 32 bit,    32 bit & 64 bit

Ans:C ,C


How many addresses are required for 25 x 40 video RAM?
Options: 2000,    1920,    1000,    2000

Ans:C ,C


.   To give a PowerPoint presentation to a large audience, you:
Options: a. Set up your computer in a large auditorium, and click large, auditorium, OK b. Click the slide you wish the audience to see in normal view, then click the next slide, and so on. c. Choose either view, slide show or slide show, view show d. Slick slide show, OK

Ans:5 – C ,5 – C


Which symbol is used to separate more than one command in the same command line?
Options: $,    #,    :,    ;

Ans:D ,D


While working with MS-DOS, which command is used to move file from one directory to another?
Options: RENAME,    COPY,    MOVE,    CP

Ans:C ,C


. Which file keeps commands to execute automatically when OS is started?
Options: a. command . com b. any batch file c. autoexec.bat d. config.sys

Ans:9 – c ,9 – c


What layer protocol is responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management?
Options: Layer 4 protocols,    Layer 5 protocols,    Layer 6 protocols,    Layer 7 protocols

Ans:D ,D


Getting data from a cell located in a different sheet is called …
Options: a. Accessing b. Referencing c. Updating d. Functioning

Ans:#8211; b,#8211; b


Which of the following is not processing?
Options: A) arranging B) manipulating C) calculating D) gathering

Ans:-D,-D


A program that converts a high-level language program to a set of instructions that can run on a computer is called a
Options: Compiler,    Debugger,    Editor,    All of the above

Ans:A ,A


In an Entity-Relationship Diagram “Diamonds” represents
Options: Attributes B. Multi-valued attributes C. Weak entity set D. Relationship sets

Ans:– D ,


An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as
Options: Cyclic redundancy check,    Checksum,    Error detecting code,    Error rate

Ans:A ,A


Which of the following methods cannot be used to enter data in a cell
Options: a. Pressing an arrow key b. Pressing the Tab key c. Pressing the Esc key d. Clicking on the formula bar

Ans:C, Pressing the Esc key


Which of the following can store information in the form of microscopic pits on metal disks.
Options: Laser disks,    Tape cassettes,    RAM cartridge,    Punched cards

Ans:A,(Aanswer


. User action such as keystroke or mouse click are referred to as
Options: a. Interrupt b. Tasks c. Processes d. Event

Ans:3 – d ,3 – d


The most common addressing techiniques employed by a CPU is
Options: a . immediate b . direct c . indirect e . all of the above

Ans:4.e,4.e


How many characters can be typed in a single cell in Excel?
Options: a. 256 b. 1024 c. 32000 d. 65535

Ans:C,32,767


Which of the following is not the part of standard office suite?
Options:  A) Word Processor, B) Database, C) Image Editor, D) File manager, 

Ans:-D,-D


What is the name of the operating system that reads and reacts in terms of actual time.
Options: Batch system,    Quick response system,    Real time system,    Time sharing system

Ans:C ,C


End Key
Options: a. Moves the cursor end of the line b. Moves the cursor end of the document c. Moves the cursor end of the paragraph d. Moves the cursor end of the screen

Ans:–  A,–  A


The advantage of optimistic locking is that:
Options: the lock is obtained only after the transaction has processed.,    the lock is obtained before the transaction has processed.,    the lock never needs to be obtained.,    transactions that are best suited are those with a lot of activity.

Ans:A ,A


Which of the following is not information you can specify using the solver?
Options: a. Input cells b. Constraints c. Target cell d. Changing cells

Ans:#8211; a,#8211; a


A data warehouse is which of the following?
Options: Can be updated by end users.,    Contains numerous naming conventions and formats.,    Organized around important subject areas.,    Contains only current data.

Ans:C ,C


Where was the India's first computer installed and when?
Options: Institute of Social Science, Agra, 1955,    Indian Institute of Statistics, Delhi, 1957,    Indian Statistical Institute, Calcutta, 1955,    Indian Institute of Science, Bangalore, 1971

Ans:C ,C


In SQL, the CREATE VIEW command is used
Options: to recompile view,    to define a view of one or more tables or views,    to recompile a table,    to create a trigger

Ans:B ,B


In addition to I/O port addresses, SCSI adapters also use a range of ROM addresses for their onboard BIOS.
Options: True,    False,    ,    

Ans:A ,A


Which of the following command lists the last 10 lines of a file?
Options: grep,    tail,    head,    cat

Ans:B ,B


. Which of the following statements about a tab control in a form is incorrect?
Options: a. It can contain only one object. b. It defines a layered space. c. It is a control object. d. It is created in multipage forms.

Ans:– a,– a


Each time you turn the power switch on, which control files will the computer check?
Options: COMMAND.COM, IO.SYS,    COMMAND.COM, DATE.COM, TIME.COM,    C0MMAND.COM, IO.SYS, MSDOS.SYS,    CHKDSK.EXE

Ans:C ,C


The standard suit of protocols used by the Internet, intranets, extranets, and some other networks.
Options: TCP/IP,    Protocol,    Open Systems,    Internetwork processor

Ans:A ,A


What command can be used to get information about yourself?
Options: which,    pwd,    i /4,    who am i

Ans:D ,D


An object can have which of the following multiplicities?
Options: Zero,    One,    More than one,    All of the above.

Ans:D ,D


. Which of the following is a class of computers based on model?
Options: A) Digital Computer B) Hybrid Computers C) Analog Computers D) AT Computers

Ans:D,D


. High level language is also called
Options: A) Problem oriented language B) Business oriented language C) Mathematically oriented language D) All of the above

Ans:D,D


In computer terminology a compiler means
Options: a person who computes source programs,    the same thing as a programmer,    key punch operator,    a program which translates source program into object program

Ans:D ,D


On a dot matrix printer, you should never lubricate which part?
Options: carriage rails,    printhead pins,    paper advance bearings,    carriage bearings

Ans:B ,B


Which of the following position is not available for fonts on MS Word?
Options:  A) Normal, B) Raised, C) Lowered, D) Centered, 

Ans:-D,-D


The amount of uncertainty in a system of symbol is called
Options: Bandwidth,    Entropy,    loss,    Quantum

Ans:B ,B


The difference between a multiplexer and a statistical multiplexer is
Options: Statistical multiplexers need buffers while multiplexers do not need buffers,    Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol,    Multiplexers often waste the output link capacity while statistical multiplexers optimize its use,    Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM)

Ans:A ,A


A systems theory of organization sees the firm as a
Options: network of resource flows,    system transforming inputs into outputs,    physical system managed by a manager using a conceptual system,    All of the above

Ans:D ,D


Whenever a peripheral is being controlled by the CPU, it is said to be online. If additionally, the computer files are updated as soon as any change takes place, the system is called
Options: quick processing system,    batch processing system,    real time system,    remote processing system

Ans:C ,C


Human beings are referred to as Homosapiens. Which device is called Silico sapiens?
Options: Monitor,    Hardware,    Robot,    Computer

Ans:D ,D


. A 32 bit microprocessor has the word length equal to
Options: A) 2 byte B) 32 byte C) 4 byte D) 8 byte

Ans:C,C


Which of the following is not a font style?
Options: a. Bold b. Italics c. Regular d. Superscript

Ans:– D,– D

www.000webhost.com