Which of the following Operating systems is better for implementing a Client-Server network


Options: MS DOS B. Windows 95     C. Windows 98 D. Windows 2000

Ans:– D ,


Description: mcqquestions

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 15086 | Level: Moderate




Got some suggestion about this question or to make this site better? Please leave your comments below.


Want to see where do you stand among other aspirants in "Computer" Category?

Click Here to take quick 5 mins MCQ test to find out.

More Operating System Related questions:


40. When the same word is used in multiple locations or a word is used that was not quite appropriate, a thesaurus can be used to look up a (n) _____ or a word similar in meaning.
Options: a. synonym b. homonym c. antonym d. metronym

Ans:– A ,– A


The digital computer was developed primarily in
Options: A) USSR B) Japan C) USA D) UK

Ans:-C,-C


A multi programming system is one that can
Options: run very fast,    share hardware resources with many programs simultaneously,    compute many programs simultaneously,    use many operating systems

Ans:B,B


. What will be the output of command prompt $l$p$g
Options: a. C:/> b. <C:> c. C:<> d. None of above

Ans:8 – b ,8 – b


In which of the following can many entity instances of one type be related to many entity instances of another type?
Options: One-to-One Relationship,    One-to-Many Relationship,    Many-to-Many Relationship,    Composite Relationship

Ans:C ,C


. When Word flags a possible spelling or grammar error, it also changes the mark on the Spelling and Grammar Status icon to a _____.
Options: a. green X b. green check mark c. red X d. red check mark

Ans:– C,– C


ARP (Address Resolution Protocol) is
Options: a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address,    a TCP/IP high level protocol for transferring files from one machine to another,    a protocol used to monitor computers,    a protocol that handles error and control messages

Ans:A ,A


Which of the following connectivity devices is used to extend a network on a purely mechanical basis?
Options: Gateway,    Switch,    Router,    Active hub

Ans:D ,D


What device separates a single network into two segments but lets the two segments appear as one to higher protocols?
Options: Switch,    Bridge,    Gateway,    Router

Ans:B ,B


Poor response times are caused by
Options: Processor busy,    High I/O rate,    High paging rates,    Any of the above

Ans:D ,D


.   Special effects used to introduce slides in a presentation are called
Options: a. Effects b. Custom animations c. Transitions d. Preset animations

Ans:4 – C ,4 – C


. What is the best way to create another copy of a slide?
Options: a.  Click the slide then press Ctrl+A and paste in new slide b.  From Insert Menu choose Duplicate Slide c.  Redo everything on a new slide that you had done on previous slide d.  None of above

Ans:4 – B ,4 – B


An excel workbook is a collection of
Options: a. Workbooks b. Worksheets c. Charts d. Worksheets and charts

Ans:#8211; d,#8211; d


An IRQ allow interface cards to:
Options: Interrupt the CPU to request service,    Pass data to the CPU to be processed,    Pass data from one card to another,    Pass data to the computers memory

Ans:A ,A


Monte Carlo is an example of a(n)
Options: static model,    deterministic model,    optimizing model,    All of the above

Ans:D ,D


The range of frequencies available for data transmission is known as
Options: Baud,    Bandwidth,    Byte,    Bits

Ans:B ,B


Which one of the following principles best describes the basic operation of a generator?
Options: Like magnetic poles repel; unlike poles attract,    Current is induced in a conductor that is moving through a magnetic field,    Like magnetic poles attract; unlike poles repel,    Current flowing through a conductor generates a magnetic field

Ans:B ,B


A type of core store that has a lower access time than the devices used for working store in the same processor is known as
Options: core memory,    buffer,    fast core,    address register

Ans:C ,C


. Which command is used to see the version of operating system?
Options: a. Vol b. Version c. Ver d. None of the above

Ans: c, c


Which of the following TCP/IP protocol is used for remote terminal connection service?
Options: TELNET,    FTP,    RARP,    UDP

Ans:A ,A


RAM is used as a short memory because it is
Options: Volatile,    Has small capacity,    Is very expensive,    Is programmable

Ans:A,(Aanswer


Which one of the following is true regarding VLANs?
Options: Two VLANs are configured by default on all Cisco switches.,    VLANs only work if you have a complete Cisco switched internetwork. No off-brand switches are allowed.,    You should not have more than 10 switches in the same VTP domain.,    VTP is used to send VLAN information to switches in a configured VTP domain.

Ans:D ,D


. Ctrl + H
Options: a. Open Find and Replace Dialog box with activating Replace Tab b. Open Format Dialog box activating Insert Hyper Link tab c. Open Insert Dialog box activating Insert Hyper Link Tab d. Open Insert Hyper Link Dialog box

Ans:–  A,–  A


Which command would you place on interface on a private network?
Options: ip nat inside,    ip nat outside,    ip outside global,    ip inside local

Ans:A ,A


Your customer tells you the print quality of their dot matrix printer is light then dark. Which of the following could cause the problem.
Options: Paper slippage,    Improper ribbon advancement,    Paper thickness,    Head position

Ans:B ,B


. When you point to a text entry in the Office Clipboard gallery in the Clipboard task pane, _____.
Options: a. the first several characters of text in the item display as a ScreenTip b. the text entry is deleted from the Office Clipboard gallery c. the text entry is pasted into the document at the location of the insertion point d. all of the above

Ans: – A , – A


The memory sizes in mainframe computers and advanced technology micro computers are expressed as
Options: Bytes,    Kilo-bytes,    Bits,    Megabytes

Ans:D ,D


. Which of the following is system software?
Options: a. Operating system b. Compiler c. Utilities d. All of the above

Ans: d, d


The term MIPS refers to _____
Options: millions of instructions per second,    multiple instructions per second,    megabytes of instructions per seconds,    millions input processor set

Ans:A ,A


The communication problem involves the
Options: analyst and the programmer,    manager and the analyst,    programmer and the computer,    operate and the computer

Ans:B ,B


Which header file should be included to use functions like malloc() and calloc()?
Options: memory.h,    stdlib.h,    string.h,    dos.h

Ans:B ,B


What will be the output of the program? #include<stdio.h> #define PRINT(i) printf("%d,",i) int main() { int x=2, y=3, z=4; PRINT(x); PRINT(y); PRINT(z); return 0; }
Options: 2, 3, 4,,    2, 2, 2,,    3, 3, 3,,    4, 4, 4,

Ans:A ,A


Two basic types of operating systems are:
Options: sequential and direct,    batch and timesharing,    sequential and realtime,    batch and interactive.

Ans:D ,D


The cheapest modems can transmit
Options: 300 bits per second,    1,200 bits per second,    2,400 bits per second,    4,800 bits per second

Ans:A ,A


The transistorized computer circuits were introduced in the
Options: First generation,    Second generation,    Third generation,    Fourth generation

Ans:B ,B


Can you tell what passes into and out from the computer via its ports?
Options: Data,    Bytes,    Graphics,    Pictures

Ans:B,B


1. How many different positions can you set for drop cap?
Options: a. 1 b. 2 c. 4 d. 6

Ans:#8211; B ,#8211; B


Satellite-Switched Time-Division Multiple Access (SS/TDMA) is
Options: the method of determining which device has access to the transmission medium at any time.,    a medium access control technique for multiple access transmission media,    a form of TDMA in which circuit switching is used to dynamically change the channel assignments,    All of the above

Ans:C ,C


Two main measures for the efficiency of an algorithm are
Options: a. Processor and memory b. Complexity and capacity c. Time and space d. Data and space  

Ans:c,c


Which of the following abilities is/are required for both the system programmer and the EDP auditor?
Options: knowledge in computer science,    knowledge in accounting applications,    two of the above,    knowledge in information systems

Ans:A ,A


. By default, on which page the header or the footer is printed?
Options: a. on first page b. on alternate page c. on every page d. none of the above

Ans:–  C,–  C


A memory bus is mainly used for communication between
Options: processor and memory,    processor and I/O devices,    I/O devices and memory,    input device and output device

Ans:A ,A


Which command is used to change protection mode of files starting with the string emp and ending with 1,2, or 3?
Options: chmod u+x emp[1-3],    chmod 777 emp*,    chmod u+r ??? emp,    chmod 222 emp?

Ans:A ,A


The bubbles in a bubble memory pack are created with the help of?
Options: Laser beam,    Magnetic field,    Electric field,    X-ray

Ans:B ,B


If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?
Options: access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftp access-list 111 permit ip any 0.0.0.0 255.255.255.255,    access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any,    access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp,    access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 permit ip any 0.0.0.0 255.255.255.255

Ans:D ,D


The black box concept is based on the assumption(s) that;
Options: the suprasystem is stable,    black boxes are dependent or environments,    the relationship between the inputs and output is stable,    All of the above

Ans:C ,C


Which command is used to establish a link between a source document and a destination document?
Options: Tools, Link, Documents B. Tools, Link C. Edit, Link D. Edit, Paste Special

Ans:– D ,


Identify false statement
Options: a. You can find deleted files in recycle bin b. You can restore any files in recycle bin if you ever need c. You can increase free spaceof disk by sending files in recycle bin d. You can right click and choose Empty Recycle Bin to clean it at once

Ans:c,c


In the following program where is the variable a getting defined and where it is getting declared? #include<stdio.h> int main() { extern int a; printf("%d\n", a); return 0; } int a=20;
Options: extern int a is declaration, int a = 20 is the definition,    int a = 20 is declaration, extern int a is the definition,    int a = 20 is definition, a is not defined,    a is declared, a is not defined

Ans:A ,A


Which of the following is not available on the Ruler of MS Word screen?
Options:  A) Tab stop box, B) Left Indent, C) Right Indent, D) Center Indent, E) All of them are available on ruler

Ans:-D,-D

www.000webhost.com