A 32 bit microprocessor has the word length equal to

Options: 2 bytes,    32 bytes,    4 bytes,    8 bytes


More Computer Fundamental Related questions:

0.You have got a bunch of digital holiday photo you want to put into a slide show. What the quickest method?
Options: (A)Apply a multiple-picture layout to several slides, and use the clipart icon on the slides to import your picture (B) On the insert menu, point to the picture, click from file, and select your picture in a group for each slide (C) On the insert menu, point the picture and click new photo album (D) All of the above 11

Ans:110. (A),110. (A)

The activity of a file
Options: is a low percentages of number of records added or deleted from a file,    if high, reduces processing efficiency for sequential and nonsequential files,    is a measure of the percentage of existing records updated during a run,    refers to how closely the files fits into the allocated

Ans:A ,A

The letters, "DOS" stand for...
Options: Data Out System,    Disk Out System,    Disk Operating System,    Data Operating System


A data dictionary is a special file that contains
Options: the names of all fields in all files,    the data types of all fields in all files,    the widths of all fields in all files,    All of the above

Ans:D ,D

Recession is
Options: slowing down of economic activity over a limited period,    period during which unemployment may rise and demand and output may fall, leading to slump in trade,    period that results from accumulation of unsold goods, owing to fall in demand,    All of the above


1.A vulnerability scanner is
Options: (A)a prepared application that takes advantage of a known weakness. (B) a tool used to quickly check computers on a network for known weaknesses. (C) an application that captures TCP/IP data packets, which can maliciously be used to capture passwords and other data while it is in transit either within the computer or over the network. (D) a situation in which one person or program successfully masquerades as another by falsifying data and thereby gaining illegitimate access.

Ans:. (B),. (B)

What is the literacy rate of Punjab?
Options: 63.615 per cent,    61.03 per cent,    69.95 per cent,    65.07 per cent


Which of the following device copies electrical signals from one Ethernet to another?
Options: bridge,    repeater,    hub,    passive hub

Ans:B ,B

Comments put in cells are called …..
Options: Smart Tip B. Cell Tip C. Web Tip D. Soft Tip

Ans:– B ,

The fact that the same operation may apply to two or more classes is called what?
Options: Inheritance,    Polymorphism,    Encapsulation,    Multiple classification

Ans:B ,B

What is the Demilitarized Zone?
Options: The area between firewall & connection to an external network B. The area between ISP to Military area             C. The area surrounded by secured servers D. The area surrounded by the Military

Ans:– A ,

728. gulaam vansh ka kaunasa shaasak chaugaan (polo) khelate samay ghode se girakar mrtyu ko praapt hua?
Options: NA

Ans: kutubudeen aibak, kutubudeen aibak

. Which is not utility program?
Options: a. Backup b. Scandisk c. Data recovery d. XCOPY

Ans:8 – d ,8 – d

To which country did the first Secretary-General of the UN belong?
Options: Austria,    Sweden,    Burma,    Norway


Fork is
Options: the dispatching of a task,    the creation of a new job,    the creation of a new process,    increasing the priority of a task

Ans:C ,C

in which city has the first media forum of BRICS nations opened?
Options: NA


Uppercase on Change Case dialog box and All Caps on Fonts dialog box both converts selected text into Capital Letters. What’s the difference between the two?
Options:  A) Both are same. They are only two different ways of capitalize text., B) It is faster to convert from Change Case than from Font dialog box, C) Change Case makes conversion permanent but All Caps on Font can always be reverted, D) All Caps on Font dialog box makes the change permanent where Change Case can be always reverted, 


Who is credited with the idea of using punch cards to control patterns in a weaving machine?
Options: Pascal,    Hollerith,    Babbage,    jacquard


Which of the following store command to retrieve data from database?
Options: a. Forms b. Reports c. Queries d. Tables

Ans:ndash; c,ndash; c

. Who invented the microprocessor?
Options: A) Marcian E Huff B) Herman H Goldstein C) Joseph Jacquard D) All of above


A fully functional computing device containing all the elements of a computer which is built around a MICROPROCESSOR is known as
Options: Machine-in-built computer,    Super computer,    Micro computer,    Mini computer

Ans:C ,C

who was last rular of nurpur riyasat
Options: roy hardev singh, veer singh, puran singh, pratap singh

Ans:veer singh,veer singh

where is central research centre
Options: kangra, shimla, solan, hamirpur, kullu


473. manushy ke shareer mein kitane gunasootr hote hain?
Options: NA

Ans: 23 jode ya 46, 23 jode ya 46

495. skaut end gaids’ sanstha kee sthaapana kisane kee thee?
Options: NA

Ans: robart baaden povel , robart baaden povel

. What is the shortcut key for repeat the recent find?
Options: a. CTRL + F4 b. SHIFT + F4 c. CTRL + F5 d. SHIFT + F5

Ans:9 – B ,9 – B

Photosynthesis takes place faster in
Options: yellow light,    white light,    red light,    darkness


1.Software specification is
Options: (A)Associated with functionality of software and constraints of operations defined. (B) It consists of computer programs, configuration files that are used to set up these programs system documentation for describing to structure of the system and used documentation that describes use of the system. (C) It involves executing an implementation of the software with test data and examines the outputs of the software and its operational behavior to check that it is performing as required (D) None of these 26

Ans:261. (A),261. (A)

The main purpose of time sharing techniques used in computers is to make the best use of the
Options: CPU,    peripherals,    seconday storage,    floppy disks


3.With a segmentation, if there are 64 segments, and the maximum segment size is 512 words, the length of the logical address in bits is
Options: (A)12 (B) 14 (C) 15 (D) 16 28

Ans:283. (C),283. (C)

. When increasing the Control Padding, space is added where?
Options: a. Between the content of the controls and the outside edge of then controls b. Between all controls c. Between the control and the Form’s edge d. Between controls and gridlines

Ans:4 – b ,4 – b

Videotex is a combination of
Options: television,    communication,    computer technology,    All of the above

Ans:D ,D

ChhatRaadi mela belongs to which district?
Options: kinnaur , lahul, kullu, chamba


In Decision Tables three are:
Options: tabulated decisions,    decisions,    condition stubs and action stubs,    decision hierarchy

Ans:C ,C

8.In Excel which of these will not select all the cells in a document?
Options: (A)Clicking three times with the right mouse button in the spreadsheet (B) Using the Edit – Select All menu (C) Pressing Ctrl + A on the keyboard (D) Pressing Ctrl + A on the keyboard 14

Ans:148. (A),148. (A)

. The term GIGO is related to
Options: A) Accuracy B) Reliability C) Versatility D) Automatic


. Which of the following do you use to change margins?
Options: formatting toolbar B. page setup dialog box C. Standard toolbar D. paragraph dialog box

Ans: – B ,

. In a computer _____ is capable to store single binary bit.
Options: A) Capacitor B) Flip flop C) Register D) Inductor


Mach number is used in connection with the speed of
Options: sound,    aircraft,    spacecraft,    ships


6.Auditable is
Options: (A)Here each component has a unique name and an associated set of attribute, which differs for each version of component (B) Extent to which a software system records information concerning transactions performed against the system (C) Extent to which a system or component is operational and accessible when required for use (D) They are used to describe the over all behavior of the system 12

Ans:126. (B),126. (B)

A transformer has a primary voltage of 120 V rms and a secondary voltage of 25 V rms. If the secondary current is 1A rms, what is the primary current?
Options: 7.8 mA,    208 mA,    200 mA,    300 mA

Ans:B ,B

bauddh dharm se
Options: NA

Ans: 868. telangaana raajy kee raajadhaanee kaunasee hai?, 868. telangaana raajy kee raajadhaanee kaunasee hai?

A device that stores one item of information is
Options: Memory element,    Block Compaction,    MDR,    Memory guard

Ans:A ,A

A smart solid-state sensor is:
Options: one that integrates both logic and a solid-state sensor into one unit.,    one that has two or three substrates,    not available today,    All of the above

Ans:A ,A

309. saamaany paristhitiyon mein hava mein dhvani kee gati kitanee hotee hai?
Options: NA

Ans: 332 mee./ sekand, 332 mee./ sekand

The Parliament exercises control over council of ministers, the real executive, in several ways. Which one of the following has been wrongly listed as a method of control over executive?
Options: Questions,    Supplementary questions,    Adjournment motions,    None of the above


Which type of entity cannot exist in the database unless another type of entity also exists in the database, but does not require that the identifier of that other entity be included as part of its own identifier?
Options: Weak entity,    Strong entity,    ID-dependent entity,    ID- independent entity

Ans:A ,A

9.The word size of a microprocessor refers to:
Options: (A)the number of machine operations performed/ second (B) the amount of information that can be stored / cycle (C) the amount of information that can be stored in bytes (D) none of these 6

Ans:59. (B),59. (B)

What does PPTP stand for?
Options: Point to Point Transmission Protocol,    Point to Point Transfer Protocol,    Point to Point Tunneling Protocol,    Point to Point Traffic Protocol


The currency convertibility concept in its original form originated in
Options: Wells Agreement,    Bretton Woods Agreement,    Taylors Agreement,    None of the above