Compilers and interpreters are themselves


Options: High-level language,    Codes,    Programs,    Mnemonics

Ans:C,(Canswer

More Computer Fundamental Related questions:


The velocity of sound in air (under normal condition) is
Options: 30 m/sec,    320 m/sec,    343 m/sec,    3,320 m/sec

Ans:C,C


Which of the following commands sets a trunk port on a 2960 switch?
Options: trunk on,    trunk all,    switchport trunk on,    switchport mode trunk

Ans:D ,D


.   in order to edit a chart, you can
Options: a. triple click the chart object b. click and drag the chart object c. double click the chart object d. click the chart objects

Ans:9 – C ,9 – C


What is the benefit of the Networking?
Options: File Sharing B. Easier access to Resources C. Easier Backups D. All of the Above

Ans:– D ,


Which one of the following is a search engine?
Options: Macromedia Flash,    Google,    Netscape,    Librarians’ Index to the Internet

Ans:B,B


Which of the following are the best units of data on an external storage device?
Options: Bits B. Bytes C. Hertz D. Clock cycles

Ans:8 – B ,


To consider the large number of agenda items, General Assembly has how many main committees?
Options: Five,    Seven,    Nine,    Fifteen

Ans:B,B


How can you disable extended selection mode?
Options:  A) Press F8 again to disable, B) Press Del to disable, C) Press Esc to disable, D) Press Enter to disable,

Ans:-C,-C


A machine that connects to two or more electronic mail systems and transfers mail messages among them is known as
Options: Gateways,    mail gateway,    bridges,    User Agent

Ans:B ,B


Tripitakas are sacred books of
Options: Buddhists,    Hindus,    Jains,    None of the above

Ans:A,A


When using SQL*Plus, Oracle commands, column names, table names and all other database elements:
Options: are case insensitive.,    are case sensitive.,    must always be in lower case.,    must always be in upper case.

Ans:A ,A


Suitable impurities are added to a semiconductor depending on its use. This is done in order to
Options: increase its life,    enable it to withstand higher voltages,    increase its electrical conductivity,    increase its electrical resistivity

Ans:C,C


Any data that are entered into the computer, for the first time, will go through the process of
Options: System testing,    Sequential testing,    String testing,    Validation

Ans:D ,D


B7:B9 indicates:
Options: Cells B7 and cell B9 only. B. Cells B7 through B9. C. Cell B8 only. D. None of the above.

Ans:– B ,


1.All of the following terms are related to computerized databases except which one?
Options: (A)Search (B) Sort (C) Field names (D) Record grab 1

Ans:11. (A),11. (A)


sundaraban delta mein 400 duniya ke sabase bade delta, jo nadiyon banaata hai?
Options: NA

Ans: ganga-brahmaputr, ganga-brahmaputr


64. raashtragaan gaane kee avadhi kitanee hai ?
Options: NA

Ans: 52 sekand, 52 sekand


A capacitor is measured in which of the following units?
Options: Volts,    Ohms,    Farads,    Resistance

Ans:C ,C


Updating a database means
Options: revising the file structure,    reorganizing the database,    modifying or adding record occurrences,    All of the above

Ans:C ,C


The transistorized computer circuits were introduced in the
Options: First generation,    Second generation,    Third generation,    Fourth generation

Ans:B,B


Capacitance is measured in units of:
Options: volts,    amps,    farads,    neutrinos

Ans:C ,C


The rate at change of temperature is called
Options: temperature difference,    temperature gradient,    isotherm,    None of the above

Ans:B,B


Which of the following word processors came first?
Options: WordPerfect,    Lotus Notes,    MS Word,    WordStar

Ans:D,D


Microsoft Word, Microsoft Excel, and Microsoft PowerPoint are the part of
Options: (A) Microsoft Office Suite (B) Microsoft Windows (C) Mac OS X (D) None of these 4..

Ans:3. (A),3. (A)


. To change the volume label
Options: a. Vol b. Label c. Scandisk d. None

Ans:5 – b ,5 – b


The function(s) performed by the paging software is (are)
Options: Implementation of the access environment for all programs in the system,    Management of the physical address space,    Sharing and protection,    All of the above

Ans:D ,D


The COPY command of MS-DOS, is used to:
Options: copying files from one floppy disk to another floppy disk,    copying one or more files on the same disk or directory,    copying two or more files into a single file,    All of the above

Ans:D ,D


You have run an SQL statement that asked the DBMS to display data in a table named USER_TABLES. The results include columns of data labeled "TableName," "NumberOfColumns" and "PrimaryKey." You are looking at ________ .
Options: user data.,    metadata,    A report,    indexes

Ans:B ,B


54. If the number of columns is selected 1 and the line between check box is marked, where is the line drawn?
Options: a. in the left margin b. in the right margin c. both in left and right margin d. None of Above

Ans:– D ,– D


Which file executes commands in DOS?
Options: MS-DOS.SYS,    CONFIG.SYS,    COMMAND.COM,    SYSTEM.INI

Ans:C ,C


The Board of Industrial and Financial Reconstruction (BIFR) came into existence in
Options: 1984,    1986,    1987,    1989

Ans:C,C


Which access method is used for obtaining a record from a cassette tape?
Options: Direct,    Sequential,    Random,    All of the above

Ans:B,(Banswer


What data most likely would not be keyed into the order entry subsystem?
Options: item quantity,    customer number,    item number,    item cost

Ans:D ,D


Conversion of hexadecimal number 93FA16 to it's binary number equivalent is
Options: 10010011111110102,    100100111111101112,    1100111111100112,    1111100001112

Ans:A ,A


203. doorand kap ka sambandh kis khel se hai ?
Options: NA

Ans: phutabol, phutabol


What is a NIC?
Options: Netware Intranet Controller,    No Internet Connection,    Network Interface Card,    Network Interference Control

Ans:C,C


. Which of the following is not the user file extension?
Options: a. .ppt b. .xls c. .sys d. .#do

Ans:7 – c ,7 – c


A double sided magnetic disk pack has six disks. Can you tell how many surfaces of this pack are normally used?
Options: 10,    12,    6,    9

Ans:A,A


What is the standard code the computer industry created to represent characters?
Options: DASI,    ASSH,    ASCII,    BASCII

Ans:C ,C


'Alice in Wonderland' the famous TV serial is based on a book written by
Options: Father Discoste,    Thomas Hardy,    Charles Dickens,    Lewis Caroll

Ans:D,D


A database management system based on the concept of ownership is
Options: Network topology,    Network layer,    Network database system,    Network license system

Ans:C ,C


A vertically aligned set of tracks on a disk pack is known as
Options: Cluster,    Surface,    Cylinder,    Panel

Ans:C ,C


. Which of the following statements about a tab control in a form is incorrect?
Options: a. It can contain only one object. b. It defines a layered space. c. It is a control object. d. It is created in multipage forms.

Ans:– a,– a


5.In Excel which of the following is not a worksheet design criterion
Options: (A)Efficiency (B) Auditability (C) Description (D) Clarity Correct Answer: 2

Ans:25. (C),25. (C)


Needing to using more complicated SQL in database applications is a(n) ________ of normalization.
Options: advantage,    disadvantage,    either an advantage or disadvantage,    neither an advantage nor disadvantage

Ans:B ,B


11. gautam buddh ka bachapan ka naam kya tha ?
Options: NA

Ans: siddhaarth, siddhaarth


In which of the following activities silicon carbide is used?
Options: Making cement and glass,    Disinfecting water of ponds,    cutting very hard substances,    Making casts for statues

Ans:C,C


Thrashing can be avoided if
Options: the pages, belonging to the working set of the programs, are in main memory,    the speed of CPU is increased,    the speed of I/O processor is increased,    all of the above

Ans:A ,A


What is the Demilitarized Zone?
Options: The area between firewall & connection to an external network B. The area between ISP to Military area             C. The area surrounded by secured servers D. The area surrounded by the Military

Ans:– A ,


A program component that allows structuring of a program in an unusual way is known as
Options: Correlation,    Coroutine,    Diagonalization,    Quene

Ans:B ,B

www.000webhost.com