Which type device is a piece of equipment that receives information from a CPU?


Options: Input,    Output,    CPU,    Memory

Ans:B,B


Description:

Asked in: KCC-2018   |   JOA 556-2018  |  HRTC JTO-2017

Hits Today: 10899 | Level: Moderate


******************************************************

Want to see where do you stand among other aspirants in "Computer" category?

Click Here to take quick 10 mins MCQ test to find out.




Got some suggestion about this question or to make this site better? Please leave your comments below.




More Computer Fundamental Related questions:


Which of the following special symbol allowed in a variable name?
Options: * (asterisk),    | (pipeline),    - (hyphen),    _ (underscore)

Ans:D ,D


What command is used with vi editor to delete a single character?
Options: x,    y,    a,    z

Ans:A ,A


.   Which of the following is/are true about rulers and guides?
Options: a. Rulers and guides can be turned on or off b. Rulers and guides print on the slide c. Rulers and guides help place objects on the slide d. A and c

Ans:8 – D ,8 – D


Which command loads a new version of the Cisco IOS into a router?
Options: copy flash ftp,    copy ftp flash,    copy flash tftp,    copy tftp flash

Ans:D ,D


.  To assign a macro to an event, users need to open the form in Design View.
Options: a.            event b.            property c.           title d.           macro

Ans:– a,– a


. Which one is true for unconditional disk formatting?
Options: a. Destroys every byte of data on a disk by overwriting itwith with blank spaces b. Do not check/scan surface after format c. Transfer system files after format d. All of above

Ans: a, a


What are the main parts of an atom?
Options: Protons only,    Electrons, protons, and ions,    Electrons, ions, and neutrons,    Electrons, protons, and neutrons

Ans:D ,D


You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user exec command should you issue?
Options: Router> ping,    Router> trace,    Router> show ip route,    Router> show interface

Ans:B ,B


A person who has a high-school diploma would be least likely to obtain which of the following jobs?
Options: data-entry operator,    librarian,    computer operator,    programmer

Ans:D ,D


What is gutter margin?
Options: a. Margin that is added to the left margin when printing b. Margin that is added to right margin when printing c. Margin that is added to the binding side of page when printing d. Margin that is added to the outside of the page when printing

Ans:– C,– C


. To insert slide numbers
Options: a.  Insert a text box and select Insert >> Page Number b.  Insert a textbox and select Insert >> Number >> PageNumber c.  Choose Insert >> Slide Number d.  Insert a new text box and select Insert >> slide Number

Ans:8 – D ,8 – D


What is the name of the logic circuit which can add two binary digits?
Options: Full adder,    Half adder,    Buffer,    Register

Ans:B,B


. The page count of a report can be determined by clicking the _______ button.
Options: a. First Page b. Previous c. Next d. Last Page

Ans:9 – d ,9 – d


A problem's _____ will answer the question, "What does the user want to see either printed or displayed on the screen?"
Options: Input,    Output,    Processing,    Purpose

Ans:B ,B


The elements of an array are stored successively in memory cells because
Options: a. by this way computer can keep track only the address of the first element and the addresses of other elements can be calculated b. the architecture of computer memory does not allow arrays to store other than serially c. both of above d. none of above

Ans:a,a


The user communicates directly with the computer through its peripheral devices is known as
Options: On-line processing,    Remote-terminal processing,    Batch mode processing,    Intelligent terminal Processing

Ans:A ,A


The configuration register setting of 0x2102 provides what function to a router?
Options: Tells the router to boot into ROM monitor mode,    Provides password recovery,    Tells the router to look in NVRAM for the boot sequence,    Boots the IOS from a TFTP server

Ans:C ,C


Physical connection between Microprocessor Memory and other parts is called _________
Options: A. Path B. Hub C. Address bus D. None of the above

Ans:C,


. Which of the following machine was not invented by Charles Babbage?
Options: A) Tabulating Machine B) Analytical Engine C) Difference Engine D) Both C and D

Ans:A,A


. Which of the following are (is) considered to be video component?
Options: A) Resolution B) Color depth C) Refresh rate D) All of the alcove

Ans:8-D,8-D


Before a disk drive can access any sector record, a computer program has to provide the record's disk address. What information does this address specify?
Options: Track number,    Sector number,    Surface number,    All of the above

Ans:D ,D


During what phase, the requirement analysis is performed?
Options: system design phase,    system development phase,    system analysis phase,    system investigation phase

Ans:C ,C


A financial modeling package for a PC is similar to a spreadsheet package, but it can handle larger data files than a spreadsheet, and it has a built-in _____ seeking function.
Options: aim,    target,    goal,    plan

Ans:C ,C


What protocols are used to configure trunking on a switch? VLAN Trunking Protocol VLAN 802.1Q ISL
Options: 1 and 2,    3 and 4,    1 only,    2 only

Ans:B ,B


Which of the following can you use to add times to the slides in a presentation?
Options: a. Slide show menu b. Rehearse timings button c. Slide transition button d. All of the above

Ans: – B , – B


. Which one of the following key is used to refresh the active window?
Options: a. F7 b. F8 c. F9 d. F5

Ans:6 – d ,6 – d


Which of the following is a system programming language for micro-computers in the Intel family.
Options: LOGO,    SNOBOL,    PCM,    PL/1

Ans:C ,C


Which of the following is not a Storage Manager Component?
Options: Transaction Manager B. Logical Manager C. Buffer Manager D. File Manager

Ans:– B ,


. Number crunchier is the informal name for
Options: A) Mini computer B) Super computer C) Microcomputer D) Mainframe computer

Ans:b,b


An extranet is which of the following?
Options: The use of Internet protocols with limited access to company data by the company's customers and suppliers.,    The use of Internet protocols with unlimited access to company data by the company's customers and suppliers.,    The use of Internet protocols with limited access to company data by people within an organization.,    The use of Internet protocols with unlimited access to company data by people within an organization.

Ans:A ,A


A multifield transformation does which of the following?
Options: Converts data from one field into multiple fields,    Converts data from multiple fields into one field,    Converts data from multiple fields into multiple fields,    All of the above

Ans:D ,D


Alice is setting up a small network in her home so that she can study for her MCSE exams. She doesn't have a lot of money to spend on hardware, so she wants to use a network topology that requires the least amount of hardware possible. Which topology should she select?
Options: Star,    Right,    Token-Ring,    Ethernet

Ans:E ,E


What is the inductive reactance of a 0.1-H coil that is operating at 1000 Hz?
Options: 100 Ohm,    Less than 1 Ohm,    628 Ohm,    444 Ohm

Ans:C ,C


Binary numbers need more places for counting because
Options: They are always big numbers,    Any no. of 0's can be added in front of them,    Binary base is small,    0's and l's have to be properly spaced apart

Ans:C,(Canswer


Supervisor state is
Options: never used,    entered by programs when they enter the processor,    required to perform any I/O,    only allowed to the operating system

Ans:D ,D


The communication mode that supports two-way traffic but only one direction at a time is
Options: simplex,    duplex,    half duplex,    multiplex

Ans:C ,C


Upper Memory blocks are located where?
Options: Conventional Memory,    Extended Memory,    Expanded memory,    Reserved Memory

Ans:D ,D


. From which menu you can access Picture, Test Box, Chart etc?
Options: a.  File b.  Edit c.  Insert d.  View

Ans:5 – C ,5 – C


How can you totally protect a PC from damage during an electrical storm?
Options: Disconnect the AC power cable,    Disconnect all external cables and power cords,    Use a surge protector,    Turn off the AC power

Ans:A ,A


Quantitative techniques used to solve business problems are called
Options: operations management,    operations science,    operations research,    management operations

Ans:C ,C


Which key is used to increase left indent?
Options: Ctrl+I B. Ctrl+M C. Alt+I D. F10

Ans:– B ,


. An output device that uses words or messages recorded on a magnetic medium to produce audio response is
Options: A) Magnetic tape B) Voice response unit C) Voice recognition unit D) Voice band

Ans:B,B


what is full form of ENIAC
Options:

Ans:Electronic Numerical Integrator and Computer,


Which symbol must all formula begin with?
Options: a. = b. + c. ( d. @

Ans:#8211; a,#8211; a


Which language was devised by Dr. Seymour Aubrey Papert?
Options: APL,    COBOL,    LOGO,    FORTRAN

Ans:C ,C


When referring to instruction words, a mnemonic is:
Options: a short abbreviation for the operand address,    a short abbreviation for the operation to be performed,    a short abbreviation for the data word stored at the operand address,    shorthand for machine language

Ans:B ,B


How could you install the file ipchains-1.3.9-5.i386.rpm?
Options: rpm -qip ipchains,    rpm -Uvh ipchains,    rpm -i ipchains* .i386.rpm,    rpm -e ipchains-1.3.9-5.i386.rpm

Ans:C ,C


The SQL command to create a table is:
Options: MAKE TABLE.,    ALTER TABLE.,    DEFINE TABLE.,    CREATE TABLE.

Ans:D ,D


Fifth generation computers are likely to exhibit
Options: artificial intelligence,    heuristic behaviour,    advanced parallel processing,    All of the above

Ans:D ,D


A mechanism for arranging controlled access to a shared resource is
Options: Retrieving,    Sorting,    Balleting,    Lock-out

Ans:D ,D

www.000webhost.com