Which of the following is not used as secondary storage


Options: Semiconductor memory,    Magnetic disks,    Magnetic drums,    Magnetic tapes

Ans:A ,A

More Computer Fundamental Related questions:


hat is the shortcut key to display field codes?
Options: Alt + F9 B. Ctrl + F9 C. Shift + F9 D. Space + F9

Ans:– A ,


229. dhaavan soda ka raasaayanik naam kya hai?
Options: NA

Ans: sodiyam kaarbonet, sodiyam kaarbonet


In a normal human being, how much time does food take to reach the end of the intestine for complete absorption?
Options: About 8 hours,    About 12 hours,    About 16 hours,    About 18 hours

Ans:B,B


Getting data from a cell located in a different sheet is called …
Options: a. Accessing b. Referencing c. Updating d. Functioning

Ans:#8211; b,#8211; b


Olympic Games after 4th century A.D. restarted from
Options: 1916,    1912,    1904,    1896

Ans:D,D


The sangam text ‘Talkappiyam’ is a work on
Options: NA

Ans:Grammar,Grammar


The heart of any computer is the
Options: CPU,    Memory,    I/O Unit,    Disks

Ans:A ,A


'Bagh', a village in Gwalior is famous for
Options: Sculptures,    Architecture,    Cave Painting,    All of the above

Ans:C,C


What is the address range of a Class B network address in binary?
Options: 01xxxxxx,    0xxxxxxx,    10xxxxxx,    110xxxxx

Ans:C ,C


5.Latency is
Options: (A)Partitioning in that the data associated with a problem is decompose(D) Each parallel task then works on a portion of the data(B) Partitioning in that, the focus is on the computation that is to be performed rather than on the data manipulated by the computation. The problem is decomposed according to the work that must be done. Each task then performs a portion of the overall work. (C) It is the time it takes to send a minimal (0 byte) message from one point to other point (D) None of these 1

Ans:15. (C),15. (C)


Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question.
Options: 192.168.10.142,    192.168.10.66,    192.168.100.254,    192.168.10.143

Ans:A ,A


“Ctrl + End” is used to
Options: a. Moves the cursor to the end of Line b. Moves the cursor to the end of Document c. Moves the cursor to the end of Paragraph d. None of the Above

Ans:–  B,–  B


Which key is used to increase left indent?
Options: Ctrl+I B. Ctrl+M C. Alt+I D. F10

Ans:– B ,


Which of the following is true of a network structure?
Options: It is a physical representation of the data,    It allows a many-to-many relationship,    It is conceptually simple,    It will be the dominant data base of the future

Ans:B ,B


High-level languages:
Options: are "procedure-oriented",    are very difficult to use,    cannot be used with automatic systems.,    require knowledge of the computer design

Ans:A ,A


Management by exception is based on a
Options: positive attitude towards problem recognition,    negative attitude toward problem recognition,    indifferent attitude toward problem recognition,    All of the above

Ans:A ,A


Most of the red, blue and purple colours of plants are due to a pigment called
Options: anthocyanin,    carotene,    chlorophyll,    xanthophylls

Ans:A,A


You can edit an embedded organization chart object by
Options: a. Clicking edit object b. Double clicking the organization chart object c. Right clicking the chart object, then clicking edit MS-Organization Chart object d. b and c both

Ans: – D , – D


. Which of the following are word processing software?
Options: a. WordPerfect b. Easy Word c. MS Word d. All of above

Ans:– D,– D


What inspired reflecting road lights to be invented?
Options: Car door reflecting mirrors,    The light a cat's eyes gave off on a fence,    Sun light on steel posts on road sides,    The sun light on the windshield

Ans:B,B


Positive testing is
Options: running the system with line data by the actual user,    making sure that the new programs do in fact process certain transactions according to Specifications,    is checking the logic of one or more programs in the candidate system,    testing changes made in an existing or a new program

Ans:B ,B


What
Options: place your PC on a rubber mat,    wear leather soled shoes,    periodically touch a safe ground point on the PC to discharge yourself,   wear an ESD wrist strap

Ans:D,wear an ESD wrist strap


short cut for chinab sub rivers
Options:

Ans:china meena ki sena,china meena ki sena


What beverage was invented by Charles Alderton in 1885 in Waco, Texas?
Options: Cream soda,    Coca-Cola,    Dr. Pepper,    Sprite

Ans:C,C


Writer of Budhist monestry in Himachal Pradesh
Options: D N majumdar, devraj sharma, O C handa , Miyan goverdhan singh

Ans:O C handa,O C handa


The command that can be used to restrict incoming messages to a user is
Options: mesg,    grep,    halt,    sleep

Ans:A ,A


Common Gateway Interface (CGI) is which of the following?
Options: An interface that accepts and returns data that may be written in SQL.,    An interface that accepts and returns data that may be written in any language that produces an executable file.,    A small program that executes within another application and is stored on the server.,    A small program that executes within another application and is stored on the client.

Ans:B ,B


The Register - to - Register (RR) instructions
Options: have both their operands in the main store.,    which perform an operation on a register operand and an operand which is located in the main store, generally leaving the result in the register, except in the case of store operation when it is also written into the specified storage location.,    which perform indicated operations on two fast registers of the machine and leave the result in one of the registers.,    all of the above

Ans:C ,C


What is the method of handling deadlocks?
Options: Use a protocol to ensure that the system will never enter a deadlock state. B. Allow the system to enter the deadlock state and then recover. C. Pretend that deadlocks never occur in the system. D. All of the Above

Ans:– D ,


Subedaar Vijay Kumar
Options:

Ans:Hamirpur,Hamirpur


Locks placed by command are called ________ .
Options: implicit locks,    explicit locks,    exclusive locks,    shared locks

Ans:B ,B


Copy and Xcopy are same in the sense
Options: a. Both are internal command of DOS b. Both are external commands of DOS c. Both can be used to copy file or group of files d. Both a and b

Ans:Correct Answer: c ,Correct Answer: c


You want to run the new 802.1w on your switches. Which of the following would enable this protocol?
Options: Switch(config)# spanning-tree mode rapid-pvst,    Switch# spanning-tree mode rapid-pvst,    Switch(config)# spanning-tree mode 802.1w,    Switch# spanning-tree mode 802.1w

Ans:A ,A


parvati jalvidut pariyojna is situated in which district in HP?
Options: bilaspur, kangra, kullu, mandi

Ans:kullu,kullu


What is the name of the visible silver rectangle which separates the take-up portion of the magnetic tape from the data recording portion?
Options: Load maker,    Load marker,    Tape separator,    Tape marker

Ans:B ,B


Corporate modeling languages often do provide for
Options: model definition,    DML commands,    editing,    report specification

Ans:A ,A


Relocation bits used by relocating loader are specified (generated) by
Options: Relocating loader itself,    Linker,    Assembler or translator,    Macro processor

Ans:B ,B


. The maximum size of a write file is limited to only
Options: a. Name of the file b. Extension of the file c. The amount of memory in your computer d. All of above

Ans: c, c


7.In Access to increase the width of the selected control
Options: (A)SHIFT+RIGHT ARROW (B) SHIFT+DOWN ARROW (C) DOWN ARROW or CTRL+DOWN ARROW (D) None of these 5

Ans:57. (A),57. (A)


The knee voltage of a diode is approximately equal to the
Options: Applied voltage,    Barrier potential,    Breakdown voltage,    Forward voltage

Ans:B ,B


Which of the following allows devices on one network to communicate with devices on another network?
Options: multiplexer,    gateway,    t-switch,    modern

Ans:B ,B


Tipu sultan was the ruler of
Options: Hyderabad,    Madurai,    Mysore,    Vijayanagar

Ans:C,C


. What happens when you press Ctrl + X after selecting some cells in Excel?
Options: a.  The cell content of selected cells disappear from cell and stored in clipboard b.  The cells selected are marked for cutting c.  The selected cells are deleted and the cells are shifted left d.  The selected cells are deleted and cells are shifted up

Ans:– b,– b


What type of addressing format is used by Class A network.
Options: Net.Net.Net.Node,    Net.Net.Node.Node,    Net.Node.Net.Node,    Net.Node.Node.Node

Ans:D ,D


72. Microsoft Office Word is a (n) _____.
Options: a. area in the computer’s main memory in which Microsoft Office text files are stored temporarily b. program included with Windows 2000 that can be used only to create or edit text files, smaller than 64K, that do not require formatting c. classified password that prevents unauthorized users from accessing a protected Microsoft Office item or document d. full-featured word processing program that can be used to create and revise professional looking documents easily

Ans:– D ,– D


A zener diode has a voltage of 10 V and a current of 20 mA. What is the power dissipation?
Options: 200 mW,    300 mW,    20 mW,    10 mW

Ans:A ,A


Which of the following technique is used for encapsulation?
Options: a technique used in best-effort delivery systems to avoid endlessly looping packets.,    a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame.,    One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size,    All of the above

Ans:B ,B


Which of the following refers to the terms "residual error rate"?
Options: the number of bit errors per twenty four hours of continuous operation on an asynchronous line,    The probability that one or more errors will be undetected when an error detection scheme is used,    the probability that one or more errors will be detected when an error detection mechanism is used,    signal to noise ratio divided by the ratio of energy per bit to noise per hertz

Ans:B ,B


. Which command is used to see the version of operating system?
Options: a. Vol b. Version c. Ver d. None of the above

Ans: c, c


. In databases, Locking level is also called as
Options: a. Granularity b. S lock c. X lock d. Dead lock

Ans:– a,– a

www.000webhost.com