The process of entering data into a storage location

Options: adds to the contents of the location,    cause variation in its address number,    is known as a readout operation,    is destructive of previous contents


More Computer Fundamental Related questions:

Guru Gobind Singh was
Options: the 10th Guru of the Sikhs,    founder of Khalsa, the inner council of the Sikhs in 1699,    author of Dasam Granth,    All the above


The generic two-level data warehouse architecture includes which of the following?
Options: At least one data mart,    Data that can extracted from numerous internal and external sources,    Near real-time updates,    All of the above.

Ans:B ,B

Which of the following characteristics is not true of NetBEUI?
Options: Highly-customizable,    Routable,    Little configuration required,    Fast for small networks to Self-tuning

Ans:B ,B

Microfilm reader is a
Options: OCR device,    COM device,    MICR device,    None of the above

Ans:B ,B

How will you free the memory allocated by the following program? #include<stdio.h> #include<stdlib.h> #define MAXROW 3 #define MAXCOL 4 int main() { int **p, i, j; p = (int **) malloc(MAXROW * sizeof(int*)); return 0; }
Options: memfree(int p);,    dealloc(p);,    malloc(p, 0);,    free(p);

Ans:D ,D

Internet-like networks between a company and its business partners. Select the best fit for answer:
Options: Bandwidth alternatives,    Switching alternating,    Inter organizational networks,    Extranets

Ans:D ,D

2. Hacktivism is
Options: (A)someone who subverts computer security without authorization or who uses technology (usually a computer or the Internet) for terrorism, vandalism (malicious destruction), credit card fraud, identity theft, intellectual property theft, or many other types of crime. (B) a person, usually not an expert in computer security, who breaks into computer systems by using prepackaged automated tools written by others. (C) hacker who utilizes technology to announce a political message. (D) None of these 2

Ans:22. (C),22. (C)

Non Tax revenues can be increased by improving the working of the
Options: State Road Transport Corporations,    electricity boards,    commercial irrigation projects,    All of the above


Conversion of an octal number 478 to its binary number is
Options: 1100112,    1001112,    1100112,    11110112

Ans:B ,B

. A(n) _____ is a control that, when clicked, executes an action or series of actions.
Options: a. combo box control b. AutoFormat c. Conditional Format d. command button

Ans:0 – d ,0 – d

Which one of the following statements applies to common auto batteries?
Options: Auto batteries are primary wet-cell batteries,    Auto batteries are secondary wet-cell batteries,    Auto batteries are secondary dry-cell batteries,    Auto batteries are primary dry-cell batteries

Ans:B ,B

Which two files are used during operation of the DBMS?
Options: query language and utilities,    data manipulation language and query language,    data dictionary and transaction log,    data dictionary and query language

Ans:C ,C

Who was the first Indian to be President of UN General Assembly?
Options: Mrs. Vijay Lakshmi Pandit,    Ramesh Bhandari,    Natwar Singh,    Krishna Menon


Which file starts MS Word?
Options: a. winword.exe b. word.exe c. msword.exe d. word2003.exe

Ans:– A,– A

A storage system for small amounts of data is
Options: Magnetic card,    Magnetic tape,    Punched card,    Optical mark reader


Which of the following occurs when a transaction rereads data and finds new rows that were inserted by a command transaction since the prior read?
Options: Nonrepeatable read,    Phantom read,    Dirty read,    Consistent read

Ans:B ,B

Inventory is also referred to as:
Options: stock,    warehouse capacity,    materials,    materials in hand

Ans:A ,A

The complete information about an entity in a database is called
Options: a. Data b. Information c. Field d. Record

Ans:ndash; d,ndash; d

Which command is used to sort the lines of data in a file in reverse order
Options: sort,    sh,    st,    sort -r

Ans:D ,D

The main factor determining a region's climate is
Options: longitude,    latitude,    temperature,    All of the above


1.In Excel divide symbol is
Options: (A)/ (B) D (C) (D) ) 7

Ans:71. (A),71. (A)

A search value can be an exact value or it can be
Options: a. Logical Operator b. Relationship c. Wild card character d. Comparison operation

Ans:ndash; c,ndash; c

'In Custody', an English novel is written by which one of the following?
Options: Anita Desai,    Vikram Seth,    Shoba De,    V.S. Naipaul


. Which of the following toolbars provides different options in various master views?
Options: a. Common tasks toolbar b. Drawing toolbar c. Formatting toolbar d. Standard toolbar

Ans:7 – A ,7 – A

Paper currency first started in India in
Options: 1861,    1542,    1601,    1880


2.In Data migration
Options: (A)Here data-flow diagram show, how data is processed at different stages in the system. (B) It registers all/ selected activities of a computer system. (C) Technique used to transform raw data into a more useful form (D) Data is shifted to modern data base management system 16

Ans:162. (D),162. (D)

. Microsoft PowerPoint can insert objects from the following add-ins?
Options: a. Equation Editor b. Organization Chart c. Photo Album d. All of these

Ans:8 – D ,8 – D

Options: NA

Ans: raashtreey bangladais 382. kya hai aur jo ise likha tha?, raashtreey bangladais 382. kya hai aur jo ise likha tha?

When desk-checking an algorithm, you should set up a table that contains _____.
Options: One column for each input item,    One column for each output item,    One column for each processing item,    Both a and b

Ans:E ,E

. Can you set 0.5 inch left indentation for a cell in Excel?
Options: a. Excel does not have indentation feature b. You can specify indentation only if you turn the rulers on c. Indentation can be set from Format Cells dialog box d. The indentation can be specified only when printing

Ans:– c,– c

where is nar singh mandir in hp
Options: kinnaur , lahul, kullu, chamba


If odd parity is used for ASCII error detection, the number of 0s per eight-bit symbol is _____.
Options: even,    odd,    indeterminate,    42

Ans:B ,B

An oval represents which of the following in an EER?
Options: Attribute,    Entity,    Optional One,    Relationship

Ans:A ,A

Which of the following Operating systems is better for implementing a Client-Server network
Options: MS DOS B. Windows 95     C. Windows 98 D. Windows 2000

Ans:– D ,

Which key do you press to check spelling?
Options: F3 B. F5 C. F7 D. F9

Ans:– C ,

The maximum count which a 6-bit binary word can represent is
Options: 36,    64,    63,    65

Ans:C ,C

Who invented the microprocessor?
Options: Marcian E Hoff,    Herman H Goldstein,    Joseph Jacquard,    All of the above

Ans:A ,A

Ustad Mansur was a famous painter in the region of
Options: Shajahan,    Akbar,    Humayun,    Jahangir


. What happens when a user double-clicks an object in the Project pane of the Visual Basic Editor?
Options: a.            The associated code is displayed in the Code pane. b.           The associated code is displayed in a new window. c.           The object is deleted from the Project pane. d.            The object’s property sheet opens.

Ans:– a,– a

8.In system buffer cache, used in UNIX, following not true
Options: (A)It is a disk cache (B) It is not a disk cache (C) Data transfer between buffer cache and user process space always occurs using DMA. (D) I/O operations with disk are handled through buffer code. 14

Ans:148. (B),148. (B)

What is the best data type definition for Oracle when a field is alphanumeric and has a fixed length?
Options: VARCHAR2,    CHAR,    LONG,    NUMBER

Ans:B ,B

Which of the following addressing modes, facilitates access to an operand whose location is defined relative to the beginning of the data structure in which it appears?
Options: ascending,    sorting,    index,    indirect

Ans:C ,C

A hardware device that is capable of executing a sequence of instructions, is known as
Options: CPU,    ALU,    CU,    Processor

Ans:D ,D

You need to create an access list that will prevent hosts in the network range of to Which of the following lists will you use?
Options: access-list 10 deny,    access-list 10 deny,    access-list 10 deny,    access-list 10 deny

Ans:C ,C

An astable multivibrator is a circuit that:
Options: has two stable states,    is free-running,    produces a continuous output signal,    is free-running and produces a continuous output signal

Ans:C ,C

If attributes A and B determine attribute C, then it is also true that:
Options: A → C.,    B → C.,    (A,B) is a composite determinant.,    C is a determinant.

Ans:C ,C

Satellite-Switched Time-Division Multiple Access (SS/TDMA) is
Options: the method of determining which device has access to the transmission medium at any time.,    a medium access control technique for multiple access transmission media,    a form of TDMA in which circuit switching is used to dynamically change the channel assignments,    All of the above

Ans:C ,C

It is easier to roll a stone up a sloping road than to lift it vertical upwards because
Options: work done in rolling is more than in lifting,    work done in lifting the stone is equal to rolling it,    work done in both is same but the rate of doing work is less in rolling,    work done in rolling a stone is less than in lifting it


What is the default subnet mask for a class A network?

Ans:B ,B

The core of an electromagnet is said to be in saturation when:
Options: the core is permitted to move freely within the coil,    an increase in current through the coil causes no further increase in the mmf,    frequent changes in the direction of current through the coil causes heating effects in the core material,    changing the polarity of the current in the coil changes the polarity of the magnetic field around the core

Ans:B ,B